Download as pdf or txt
Download as pdf or txt
You are on page 1of 1994

Title page

1350 OMS | 9.6


1350 OMS PKT Guide
8DG42227DAAA
Issue 3 | December 2012
Legal notice

Legal notice

Alcatel, Lucent, Alcatel-Lucent and the Alcatel-Lucent logo are trademarks of Alcatel-Lucent. All other trademarks are the property of their respective
owners.

The information presented is subject to change without notice. Alcatel-Lucent assumes no responsibility for inaccuracies contained herein.
Copyright © 2012 Alcatel-Lucent. All rights reserved.

Notice

Every effort was made to ensure that the information in this document was complete and accurate at the time of printing. However, information is subject to
change.

Warranty

Alcatel-Lucent provides a limited warranty for this product. For more information, consult your local Alcatel-Lucent customer support team.

Ordering information

The ordering number for this document is 8DG42227DAAA. To order 1350 OMS information products, contact your local Alcatel-Lucent customer support
team.

Technical support

For technical support, contact your local customer support team. You can reach them through the Web at the Alcatel-Lucent Customer Support web site
(http://www. alcatel-lucent.com/support) or the customer support telephone number listed at the Alcatel-Lucent Contact Us web site (http://www.alcatel-
lucent.com/contact).

Information product support

For questions or concerns about this or any other Alcatel-Lucent information product, please contact us at one of the following numbers: (888) 727-3615 (for
the continental United States), +1 (630) 713-5000 (for all countries).
Contents

About this document


Purpose ......................................................................................................................................................................................... lxix
lxix

Reason for reissue ..................................................................................................................................................................... lxix


lxix

Safety information .................................................................................................................................................................... lxix


lxix

Intended audience ...................................................................................................................................................................... lxx


lxx

How to use this information product ................................................................................................................................... lxx

Related documentation ......................................................................................................................................................... lxxiii


lxxiii

Ordering information ............................................................................................................................................................ lxxiii


lxxiii

How to comment .................................................................................................................................................................... lxxiv


lxxiv

Part I: Introduction

1 Product Overview

Overview ...................................................................................................................................................................................... 1-1


1-1

1350 OMS Overview ............................................................................................................................................................... 1-2


1-2

1350 OMS Modules for System Resiliency and Northbound Communication ................................................. 1-5
1-5

2 Introduction to Administration

Application Administration ................................................................................................................................................... 2-1


2-1

View Application Release Information ............................................................................................................................. 2-4


2-4

Part II: Administration

3 1350 OMS PKT Configuration

Overview ...................................................................................................................................................................................... 3-1


3-1

1350 OMS PKT Configuration ............................................................................................................................................ 3-2


3-2

Access the System Configuration Window and Configure 1350 OMS PKT ..................................................... 3-3
3-3
....................................................................................................................................................................................................................................
1350 OMS iii
8DG42227DAAA 9.6
Issue 3 December 2012
Contents

....................................................................................................................................................................................................................................
Integrate the 1350 OMS PKT with Other NMSs .......................................................................................................... 3-8
3-8

Integrate 1350 OMS PKT Client Workstations with the Master Workstation .................................................... 3-9
3-9

4 1350 OMS PKT Process Monitoring

Overview ...................................................................................................................................................................................... 4-1


4-1

Process Monitoring Overview .............................................................................................................................................. 4-2


4-2

Run Levels ................................................................................................................................................................................... 4-5


4-5

5 1350 OMS PKT User Management

Overview ...................................................................................................................................................................................... 5-1


5-1

User Profiles ............................................................................................................................................................................... 5-2


5-2

Construction Macro Functions and Default User Profiles ......................................................................................... 5-3


5-3

MPLS Macro Functions and Default User Profiles ...................................................................................................... 5-7


5-7

Ethernet Macro Functions and Default User Profiles .................................................................................................. 5-9


5-9

6 1350 OMS PKT System Log Management

Overview ...................................................................................................................................................................................... 6-1


6-1

SMF/Commands/Event Log File Overview ................................................................................................................... 6-2


6-2

Failure Management Log File Overview ......................................................................................................................... 6-5


6-5

Trace Management Overview .............................................................................................................................................. 6-6


6-6

7 1350 OMS PKT Parameters

Overview ...................................................................................................................................................................................... 7-1


7-1

Parameter Overview ................................................................................................................................................................ 7-2


7-2

1350 OMS PKT Parameters for Core NMA ................................................................................................................... 7-3


7-3

1350 OMS PKT Parameters for GUI NMA .................................................................................................................... 7-4


7-4

1350 OMS PKT Parameters for MW-INT ....................................................................................................................... 7-5


7-5

1350 OMS PKT Parameters for Oracle Management ................................................................................................. 7-6


7-6

Set PKT Parameters ................................................................................................................................................................. 7-7


7-7

1350 OMS PKT Parameter List ........................................................................................................................................... 7-9


7-9

8 1350 OMS PKT Ethernet Multi-Manager Management Configurations

Overview ...................................................................................................................................................................................... 8-1


8-1

....................................................................................................................................................................................................................................
iv 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Contents

....................................................................................................................................................................................................................................
Multi-Manager Management Overview ........................................................................................................................... 8-2
8-2

Operational Guidelines ........................................................................................................................................................... 8-3


8-3

9 1350 OMS PKT MIB Realignment and the ISA Board

Overview ...................................................................................................................................................................................... 9-1


9-1

MIB Alignment and ISA Board Overview ...................................................................................................................... 9-2


9-2

Realign an ISA Board MIB ................................................................................................................................................... 9-4


9-4

10 1350 OMS PKT AlignDBSDHPathID Tool

Overview ................................................................................................................................................................................... 10-1


10-1

AlignDBSDHPathID Overview ........................................................................................................................................ 10-2


10-2

Run AlignDBSDHPathID Tool ......................................................................................................................................... 10-3


10-3

Part III: Basic Functions

11 Generalities

Overview ................................................................................................................................................................................... 11-1


11-1

About 1350 OMS PKT application

Main features ............................................................................................................................................................................ 11-3


11-3

Management Layers .............................................................................................................................................................. 11-5


11-5

Main concepts .......................................................................................................................................................................... 11-6


11-6

Network architecture overview ......................................................................................................................................... 11-7


11-7

Ethernet Services Attributes ............................................................................................................................................. 11-12


11-12

Classification of Ethernet Services ................................................................................................................................ 11-15


11-15

Definition of Ethernet Services by MEF ..................................................................................................................... 11-27


11-27

Network Topology Description ....................................................................................................................................... 11-30


11-30

How to access the application

Web access .............................................................................................................................................................................. 11-38


11-38

The graphical interface (MS-GUI) ................................................................................................................................ 11-39


11-39

Confirm the action ............................................................................................................................................................... 11-40


11-40

The application interfaces

Software interfaces .............................................................................................................................................................. 11-42


11-42

....................................................................................................................................................................................................................................
1350 OMS v
8DG42227DAAA 9.6
Issue 3 December 2012
Contents

....................................................................................................................................................................................................................................
Multi-Manager environment ............................................................................................................................................ 11-44
11-44

Functional Domain

Overview about functional domains ............................................................................................................................. 11-45


11-45

Network Topology Construction .................................................................................................................................... 11-47


11-47

Traffic Management ............................................................................................................................................................ 11-53


11-53

MPLS Management ............................................................................................................................................................ 11-65


11-65

Maintenance Management ................................................................................................................................................ 11-69


11-69

User Profile Management ................................................................................................................................................. 11-71


11-71

12 Managing your Network

Overview ................................................................................................................................................................................... 12-1


12-1

Network configuration

Create the network objects .................................................................................................................................................. 12-3


12-3

External Network Reference ............................................................................................................................................ 12-14


12-14

Create Physical Connection ............................................................................................................................................. 12-20


12-20

Create LAG ............................................................................................................................................................................ 12-24


12-24

Create Domain

Create Domain ...................................................................................................................................................................... 12-27


12-27

Assign resource to Domain .............................................................................................................................................. 12-31


12-31

Define NE ............................................................................................................................................................................... 12-35


12-35

Traffic categories

Create Traffic Descriptor ................................................................................................................................................... 12-39


12-39

Create Traffic Classifier ..................................................................................................................................................... 12-43


12-43

L2 Encapsulation .................................................................................................................................................................. 12-46


12-46

NML-EML synchronization

1350 OMS PKT resynchronization ............................................................................................................................... 12-60


12-60

Alignment after deletion and recreation of SDH Path ............................................................................................ 12-61


12-61

VPWS Ethernet PM management procedure

PM feature for the ISA ES1 1.0 board ......................................................................................................................... 12-62


12-62

....................................................................................................................................................................................................................................
vi 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Contents

....................................................................................................................................................................................................................................
Provider network operating as a distributed MAC Bridge ................................................................................... 12-67
12-67

Single-Customer, No-VLAN, RSTP provisioning .................................................................................................. 12-69


12-69

Provisioning procedure (MAC-SC-NV-RSTP) ........................................................................................................ 12-70


12-70

VLAN configuration scenario

VLAN configuration ........................................................................................................................................................... 12-75


12-75

MAC Bridge Network Configuration

MAC Bridge Basics ............................................................................................................................................................ 12-77


12-77

13 Network Organization Management

Overview ................................................................................................................................................................................... 13-1


13-1

Managing Subnetworks

Overview about Subnetworks ............................................................................................................................................ 13-5


13-5

View the list of subnetworks .............................................................................................................................................. 13-7


13-7

Create a Subnetwork ............................................................................................................................................................. 13-8


13-8

Modify a Subnetwork ......................................................................................................................................................... 13-10


13-10

Delete a Subnetwork ........................................................................................................................................................... 13-13


13-13

View the details of the subnetworks ............................................................................................................................. 13-14


13-14

Managing Domains

Overview about Domains ................................................................................................................................................. 13-15


13-15

View the list of Domains ................................................................................................................................................... 13-17


13-17

Description of the list of Domains ................................................................................................................................. 13-18


13-18

Create a Domain ................................................................................................................................................................... 13-20


13-20

Modify a Domain ................................................................................................................................................................. 13-22


13-22

Delete a Domain ................................................................................................................................................................... 13-24


13-24

View the details of the domain ........................................................................................................................................ 13-25


13-25

Details of a Domain ............................................................................................................................................................ 13-26


13-26

Assign resources to a Domain ......................................................................................................................................... 13-27


13-27

Assign a NE to a Domain .................................................................................................................................................. 13-29


13-29

Deassign a NE from a Domain ....................................................................................................................................... 13-30


13-30

....................................................................................................................................................................................................................................
1350 OMS vii
8DG42227DAAA 9.6
Issue 3 December 2012
Contents

....................................................................................................................................................................................................................................
View the inventory of NE in a Domain ....................................................................................................................... 13-31
13-31

View the inventory of Transport Links in a Domain .............................................................................................. 13-32


13-32

View the inventory of VT Queue Profiles in a Domain ......................................................................................... 13-33


13-33

Create Topological View in a Domain ......................................................................................................................... 13-34


13-34

Assign an Ethernet Physical Port to a Domain ......................................................................................................... 13-35


13-35

Deassign an Ethernet Physical Port from a Domain ............................................................................................... 13-36


13-36

Managing service nodes

Overview about service nodes ........................................................................................................................................ 13-37


13-37

View the inventory of NE in a Service Node ............................................................................................................ 13-38


13-38

View the list of service nodes .......................................................................................................................................... 13-39


13-39

Managing Network Elements

Overview about Network Elements .............................................................................................................................. 13-40


13-40

View the list of Network Elements ................................................................................................................................ 13-42


13-42

Define a NE ............................................................................................................................................................................ 13-43


13-43

Add a NE to a Subnetwork ............................................................................................................................................... 13-46


13-46

Modify a NE .......................................................................................................................................................................... 13-49


13-49

View the details of the NEs .............................................................................................................................................. 13-52


13-52

View the list of available Network Elements ............................................................................................................. 13-53


13-53

Upload the Ethernet physical ports ............................................................................................................................... 13-54


13-54

Upload the TDM terminations ........................................................................................................................................ 13-57


13-57

Upload the Links Over TDM ........................................................................................................................................... 13-59


13-59

Audit the TDM terminations ............................................................................................................................................ 13-62


13-62

Synchronize the TDM terminations .............................................................................................................................. 13-64


13-64

View the list of TDM terminations ................................................................................................................................ 13-66


13-66

View the details of the TDM terminations .................................................................................................................. 13-67


13-67

Acknowledge the NE LAC state .................................................................................................................................... 13-68


13-68

Show the equipment view ................................................................................................................................................. 13-70


13-70

View the inventory of VT Queue Profiles in a NE .................................................................................................. 13-73


13-73

Upload the Links Over Cable .......................................................................................................................................... 13-74


13-74
....................................................................................................................................................................................................................................
viii 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Contents

....................................................................................................................................................................................................................................
Upload the Radio Ports ...................................................................................................................................................... 13-75
13-75

Create VT Queue Profile ................................................................................................................................................... 13-76


13-76

Create Topological View from NE or ENE ................................................................................................................ 13-77


13-77

Managing External Network Elements

Overview about External Network Elements ............................................................................................................ 13-78


13-78

View the list of External Network Elements .............................................................................................................. 13-80


13-80

Description of the list of ENE ......................................................................................................................................... 13-81


13-81

Create an ENE ....................................................................................................................................................................... 13-82


13-82

Modify an ENE ..................................................................................................................................................................... 13-85


13-85

Delete an ENE ....................................................................................................................................................................... 13-87


13-87

View the details of the ENEs ........................................................................................................................................... 13-88


13-88

Details of an ENE ................................................................................................................................................................ 13-89


13-89

View the list of ETPs .......................................................................................................................................................... 13-90


13-90

Description of the list of ETPs ........................................................................................................................................ 13-91


13-91

Create an ETP ....................................................................................................................................................................... 13-92


13-92

Delete an ETP ....................................................................................................................................................................... 13-94


13-94

Managing Ethernet Physical ports

View the list of Ethernet Physical ports ....................................................................................................................... 13-96


13-96

Description of the list of Ethernet physical ports ..................................................................................................... 13-97


13-97

Configure an Ethernet physical port ............................................................................................................................. 13-99


13-99

Modify an Ethernet Physical Port .............................................................................................................................. 13-104


13-104

Assign a Port to Network Access Domain ............................................................................................................... 13-106


13-106

View the details of the Ethernet physical ports ...................................................................................................... 13-108


13-108

Details of an Ethernet Physical Port ........................................................................................................................... 13-109


13-109

View the list of Equipment ports .................................................................................................................................. 13-111


13-111

Description of the list of Equipment ports ............................................................................................................... 13-112


13-112

Managing Link Aggregation (LAG) ports

Description of Link Aggregation (LAG) function ................................................................................................. 13-113


13-113

View the list of LAG ports ............................................................................................................................................. 13-116


13-116
....................................................................................................................................................................................................................................
1350 OMS ix
8DG42227DAAA 9.6
Issue 3 December 2012
Contents

....................................................................................................................................................................................................................................
Description of the list of LAG ports ........................................................................................................................... 13-117
13-117

Create a LAG port ............................................................................................................................................................. 13-118


13-118

Modify a LAG port ........................................................................................................................................................... 13-120


13-120

Assign LAG port to Network Access Domain ....................................................................................................... 13-125


13-125

View the details of the LAG ports ............................................................................................................................... 13-126


13-126

Details of a LAG port ...................................................................................................................................................... 13-127


13-127

View the ports member of a LAG ............................................................................................................................... 13-128


13-128

Description of the list of LAG ports ........................................................................................................................... 13-129


13-129

Network Access Domain (NAD) Management

View the list of NADs ...................................................................................................................................................... 13-130


13-130

Description of the list of NADs ................................................................................................................................... 13-131


13-131

Create a NAD ..................................................................................................................................................................... 13-132


13-132

Modify a NAD .................................................................................................................................................................... 13-133


13-133

Delete a NAD ..................................................................................................................................................................... 13-134


13-134

Managing Jumbo Frames (through NAV)

Overview about Jumbo Frames .................................................................................................................................. 13-135


13-135

Workflow to configure Interfaces for Jumbo Traffic ............................................................................................ 13-137


13-137

Particular configuration procedures

Managing ports on 1678MCC Network Elements ................................................................................................ 13-140


13-140

ISA BCE Ethernet Board ................................................................................................................................................ 13-146


13-146

14 Transport Link Management

Overview ................................................................................................................................................................................... 14-1


14-1

Overview about Transport links

Transport link definition ...................................................................................................................................................... 14-4


14-4

Transport link classification ............................................................................................................................................... 14-5


14-5

Concatenated VC management ....................................................................................................................................... 14-11


14-11

Setting parameters of Transport Links ......................................................................................................................... 14-12


14-12

Implicit configuration ......................................................................................................................................................... 14-14


14-14

....................................................................................................................................................................................................................................
x 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Contents

....................................................................................................................................................................................................................................
Managing Links Over TDM

Overview ................................................................................................................................................................................. 14-17


14-17

Introduction ............................................................................................................................................................................ 14-18


14-18

View the list of Links Over TDM .................................................................................................................................. 14-19


14-19

Create Link Over TDM ..................................................................................................................................................... 14-21


14-21

Delete a Link Over TDM .................................................................................................................................................. 14-24


14-24

Configure a Link Over TDM ........................................................................................................................................... 14-25


14-25

Get the Link Over TDM Extremities ............................................................................................................................ 14-27


14-27

Remove inconsistent TDM paths ................................................................................................................................... 14-29


14-29

Assign a Link Over TDM to a Domain ....................................................................................................................... 14-30


14-30

Deassign a Link Over TDM from a Domain ............................................................................................................. 14-31


14-31

Assign NAccess Domain .................................................................................................................................................. 14-32


14-32

View the details of the Links Over TDM .................................................................................................................... 14-34


14-34

Get the Fault Localization ................................................................................................................................................ 14-36


14-36

Managing Links Over Cable

Overview about Link Over Cables ................................................................................................................................ 14-38


14-38

View the list of Links Over Cables ................................................................................................................................ 14-41


14-41

Create a Link Over Cable ................................................................................................................................................. 14-42


14-42

Modify a Link Over Cable ............................................................................................................................................... 14-44


14-44

Delete a Link Over Cable ................................................................................................................................................. 14-46


14-46

Get the Link Over Cable extremities ............................................................................................................................ 14-48


14-48

View the details of the Link Over Cables ................................................................................................................... 14-50


14-50

Link Over Cable Split/Join ............................................................................................................................................... 14-52


14-52

Configure Split/Join ............................................................................................................................................................ 14-54


14-54

Configure a Link Over Cable .......................................................................................................................................... 14-57


14-57

Assign NAD ........................................................................................................................................................................... 14-58


14-58

Get the Fault Localization ................................................................................................................................................ 14-59


14-59

Assign a Link Over Cable to a Domain ....................................................................................................................... 14-60


14-60

Deassign a Link Over Cable from a Domain ............................................................................................................. 14-61


14-61
....................................................................................................................................................................................................................................
1350 OMS xi
8DG42227DAAA 9.6
Issue 3 December 2012
Contents

....................................................................................................................................................................................................................................
Managing LAG Links Over Cable

View the list of LAG Links Over Cables .................................................................................................................... 14-62


14-62

Create a LAG Link Over Cable from extremities .................................................................................................... 14-63


14-63

Create a LAG Link Over Cable from Links ............................................................................................................... 14-66


14-66

Create a LAG Link VCG from extremities ................................................................................................................ 14-69


14-69

Create a LAG Link VCG from Links ........................................................................................................................... 14-72


14-72

Modify a LAG Link Over Cable .................................................................................................................................... 14-75


14-75

Delete a LAG Link Over Cable ...................................................................................................................................... 14-77


14-77

Get the LAG Link Over Cable extremities ................................................................................................................. 14-79


14-79

View the details of the LAG Link Over Cables ........................................................................................................ 14-80
14-80

Details of the list of LAG Link Over Cables ............................................................................................................. 14-81


14-81

Managing links over WDM

Overview about links over WDM .................................................................................................................................. 14-82


14-82

View the list of links over WDM ................................................................................................................................... 14-83


14-83

Get the Link Over WDM extremities ........................................................................................................................... 14-84


14-84

Description of a Link Over WDM Extremities ......................................................................................................... 14-85


14-85

View the details of the links over WDM ..................................................................................................................... 14-86


14-86

Managing links over MPLS

Overview about links over MPLS ................................................................................................................................. 14-88


14-88

View the list of links over MPLS ................................................................................................................................... 14-89


14-89

Get the Link Over MPLS extremities ........................................................................................................................... 14-90


14-90

View the details of the links over MPLS ..................................................................................................................... 14-91


14-91

Managing Link over Radio

View the list of links over Radio .................................................................................................................................... 14-93


14-93

Managing links over T-MPLS

Overview about links over T-MPLS ............................................................................................................................. 14-94


14-94

View the list of links over T-MPLS ............................................................................................................................... 14-95


14-95

Get the Link Over T-MPLS extremities ....................................................................................................................... 14-96


14-96

View the details of the links over T-MPLS ................................................................................................................ 14-97


14-97
....................................................................................................................................................................................................................................
xii 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Contents

....................................................................................................................................................................................................................................
Managing MPLS/T-MPLS infrastructure

Overview about MPLS/T-MPLS infrastructure ........................................................................................................ 14-99


14-99

View the list of T-MPLS sections ................................................................................................................................ 14-100


14-100

Get the T-MPLS section extremities ........................................................................................................................... 14-101


14-101

View the details of the links over T-MPLS .............................................................................................................. 14-102


14-102

Managing Transport Links by Domain

View the list of Transport Links ................................................................................................................................... 14-104


14-104

15 MPLS Provisioning Management

Overview ................................................................................................................................................................................... 15-1


15-1

Managing Traffic Descriptors (MPLS)

....................................................................................................................................................................................................... 15-4
15-4

Overview about Traffic Descriptors (MPLS) ............................................................................................................... 15-5


15-5

View the list of Traffic Descriptors (MPLS) ................................................................................................................ 15-6


15-6

Description of the list of Traffic Descriptors ................................................................................................................ 15-7


15-7

Create a Traffic Descriptor (MPLS) ................................................................................................................................ 15-8


15-8

Modify a Traffic Descriptor (MPLS) ............................................................................................................................ 15-12


15-12

Delete a Traffic Descriptor (MPLS) .............................................................................................................................. 15-15


15-15

View the details of the Traffic Descriptors (MPLS) ................................................................................................ 15-16


15-16

Details of a Traffic Descriptor ......................................................................................................................................... 15-17


15-17

Get the Traffic Descriptor inventory list (MPLS) .................................................................................................... 15-18


15-18

Description of the Traffic Descriptor inventory ....................................................................................................... 15-19


15-19

Managing Transport Links (MPLS)

Overview ................................................................................................................................................................................. 15-20


15-20

Overview about Transport Links .................................................................................................................................... 15-21


15-21

View the list of Transport Links ..................................................................................................................................... 15-23


15-23

Define the Transport Link characteristics ................................................................................................................... 15-25


15-25

Get the Transport Link extremities ................................................................................................................................ 15-28


15-28

Description of the list of Transport Link Extremities ............................................................................................. 15-30


15-30

....................................................................................................................................................................................................................................
1350 OMS xiii
8DG42227DAAA 9.6
Issue 3 December 2012
Contents

....................................................................................................................................................................................................................................
View the details of the Transport Links ....................................................................................................................... 15-31
15-31

Details of a Transport Link ............................................................................................................................................... 15-32


15-32

View the bandwidth load of Transport Links ........................................................................................................... 15-33


15-33

View the inventory of Transport Links ........................................................................................................................ 15-36


15-36

Description of the Transport Link Inventory ............................................................................................................. 15-38


15-38

Managing LSP Tunnels (MPLS)

Overview ................................................................................................................................................................................. 15-39


15-39

Overview about LSP Tunnels .......................................................................................................................................... 15-40


15-40

View the list of LSP tunnels ............................................................................................................................................. 15-41


15-41

Description of the list of LSP Tunnels ......................................................................................................................... 15-42


15-42

Create an LSP tunnel .......................................................................................................................................................... 15-43


15-43

Modify an LSP tunnel ........................................................................................................................................................ 15-45


15-45

Delete an LSP tunnel .......................................................................................................................................................... 15-47


15-47

Allocate LSP tunnel ............................................................................................................................................................ 15-48


15-48

Deallocate LSP tunnel ........................................................................................................................................................ 15-51


15-51

List the constraints of an LSP tunnel ........................................................................................................................... 15-53


15-53

Description of constraints of LSP tunnel .................................................................................................................... 15-55


15-55

Add a constraint to an LSP tunnel ................................................................................................................................. 15-56


15-56

Delete a constraint from an LSP tunnel ....................................................................................................................... 15-58


15-58

View the details of the LSP tunnel constraints .......................................................................................................... 15-60


15-60

Details of a LSP Tunnel Constraint ............................................................................................................................... 15-62


15-62

View the list of cross connections .................................................................................................................................. 15-63


15-63

Description of the list of LSP cross connections ...................................................................................................... 15-64


15-64

Implement an LSP tunnel .................................................................................................................................................. 15-65


15-65

Get the LSP tunnel extremities ....................................................................................................................................... 15-67


15-67

Description of the list of LSP Tunnel Extremities .................................................................................................. 15-69


15-69

View the details of the LSP tunnels ............................................................................................................................... 15-70


15-70

Details of a LSP Tunnel ..................................................................................................................................................... 15-71


15-71

View the inventory of VC-LSPs ..................................................................................................................................... 15-72


15-72
....................................................................................................................................................................................................................................
xiv 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Contents

....................................................................................................................................................................................................................................
Description of the LSP Tunnel Inventory ................................................................................................................... 15-73
15-73

View the bandwidth load of LSPs .................................................................................................................................. 15-74


15-74

View the route of LSP Tunnels ...................................................................................................................................... 15-77


15-77

View the list of the Transport Links related to an LSP Tunnel ........................................................................... 15-79
15-79

Description of the LSP Tunnel inventory .................................................................................................................... 15-80


15-80

Managing VC-LSP (MPLS)

Overview ................................................................................................................................................................................. 15-81


15-81

Overview about VC-LSP .................................................................................................................................................. 15-82


15-82

View the list of VC-LSPs .................................................................................................................................................. 15-83


15-83

Description of the list of VC-LSPs ................................................................................................................................ 15-84


15-84

Create a VC-LSP .................................................................................................................................................................. 15-85


15-85

Modify a VC-LSP ................................................................................................................................................................ 15-89


15-89

Delete a VC-LSP .................................................................................................................................................................. 15-91


15-91

Implement a VC-LSP ......................................................................................................................................................... 15-92


15-92

De-implement a VC-LSP .................................................................................................................................................. 15-94


15-94

Commission a VC-LSP ...................................................................................................................................................... 15-96


15-96

De-commission a VC-LSP ............................................................................................................................................... 15-98


15-98

Get the VC-LSP extremities ............................................................................................................................................. 15-99


15-99

Description of the list of VC-LSP Extremities ....................................................................................................... 15-101


15-101

View the details of the VC-LSPs ................................................................................................................................. 15-102


15-102

Details of a VC-LSP ......................................................................................................................................................... 15-103


15-103

16 T-MPLS Provisioning Management

Overview ................................................................................................................................................................................... 16-1


16-1

Managing T-MPLS PHB profile

Overview about PHB profile management .................................................................................................................. 16-5


16-5

View the list of PHB profiles (T-MPLS) ....................................................................................................................... 16-6


16-6

Description of the list of T-MPLS PHB Profiles ........................................................................................................ 16-7


16-7

Create a PHB profile (T-MPLS) ....................................................................................................................................... 16-8


16-8

Modify a PHB profiles (T-MPLS) ................................................................................................................................... 16-9


16-9
....................................................................................................................................................................................................................................
1350 OMS xv
8DG42227DAAA 9.6
Issue 3 December 2012
Contents

....................................................................................................................................................................................................................................
Delete a PHB profile (T-MPLS) ..................................................................................................................................... 16-11
16-11

View the details of the PHB profiles (T-MPLS) ...................................................................................................... 16-13


16-13

Managing Transport Links (T-MPLS)

Overview about Transport Links .................................................................................................................................... 16-14


16-14

View the list of Transport Links ..................................................................................................................................... 16-16


16-16

Description of the list of T-MPLS Transport Links ................................................................................................. 16-17


16-17

Define the Transport Link characteristics ................................................................................................................... 16-18


16-18

Get the Transport Link extremities ................................................................................................................................ 16-20


16-20

Description of the list of Transport Link Extremities ............................................................................................. 16-22


16-22

View the details of the Transport Links ....................................................................................................................... 16-23


16-23

Details of a T-MPLS Transport Link ............................................................................................................................ 16-24


16-24

View the bandwidth load of Transport Links ........................................................................................................... 16-25


16-25

View the inventory of Transport Links ........................................................................................................................ 16-28


16-28

Description of the inventory of Transport Links ...................................................................................................... 16-30


16-30

Managing Virtual Transport (T-MPLS)

Overview about Virtual Transports ............................................................................................................................... 16-31


16-31

View the list of Virtual Transports ................................................................................................................................. 16-33


16-33

Description of the list of Virtual Transports ............................................................................................................... 16-34


16-34

Create a Virtual Transport ................................................................................................................................................. 16-35


16-35

Modify a Virtual Transport ............................................................................................................................................... 16-37


16-37

Delete a Virtual Transport ................................................................................................................................................. 16-39


16-39

View the details of the Virtual Transport ..................................................................................................................... 16-40


16-40

Details of a Virtual Transport .......................................................................................................................................... 16-41


16-41

Configuration of a Virtual Transport ........................................................................................................................... 16-42


16-42

Implement a Virtual Transport ........................................................................................................................................ 16-44


16-44

De-implement a Virtual Transport ................................................................................................................................. 16-46


16-46

View the Virtual Transport extremities ........................................................................................................................ 16-48


16-48

Description of the list of Virtual Transports ............................................................................................................... 16-49


16-49

....................................................................................................................................................................................................................................
xvi 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Contents

....................................................................................................................................................................................................................................
Managing Pseudo Wires (T-MPLS)

Overview about Pseudo Wires ........................................................................................................................................ 16-50


16-50

View the list of Pseudo Wires .......................................................................................................................................... 16-51


16-51

Description of the list of Pseudo Wires ........................................................................................................................ 16-52


16-52

Create a Pseudo Wire .......................................................................................................................................................... 16-53


16-53

Modify a PseudoWire ......................................................................................................................................................... 16-55


16-55

Delete a Pseudo Wire .......................................................................................................................................................... 16-57


16-57

View the details of the Pseudo Wires ........................................................................................................................... 16-58


16-58

Details of a Pseudo Wire ................................................................................................................................................... 16-59


16-59

Configuration of the route of a Pseudo Wire ............................................................................................................. 16-60


16-60

Delete a constraint from a Pseudo Wire ...................................................................................................................... 16-62


16-62

Configuration of PHB profile of a Pseudo Wire ....................................................................................................... 16-64


16-64

Configuration of Layer-2 encapsulation of a Pseudo Wire ................................................................................... 16-66


16-66

Allocate Pseudo Wire ......................................................................................................................................................... 16-67


16-67

De-allocate Pseudo Wire ................................................................................................................................................... 16-70


16-70

Implement a Pseudo Wire ................................................................................................................................................. 16-72


16-72

De-implement a Pseudo Wire .......................................................................................................................................... 16-74


16-74

List the constraints of a Pseudo Wire .......................................................................................................................... 16-76


16-76

Description of the list of Pseudo Wire Constraints .................................................................................................. 16-77


16-77

View the details of the Pseudo Wire constraints ....................................................................................................... 16-78


16-78

Details of a Pseudo Wire Constraint ............................................................................................................................. 16-79


16-79

View the list of cross connections .................................................................................................................................. 16-80


16-80

Description of the list of PW Cross Connections ..................................................................................................... 16-81


16-81

View the Pseudo Wire extremities ................................................................................................................................. 16-82


16-82

Description of the list of PW Extremities ................................................................................................................... 16-83


16-83

View the section inventory from Pseudo Wire .......................................................................................................... 16-84


16-84

Description of the T-MPLS section Inventory .......................................................................................................... 16-85


16-85

View the bandwidth load of Pseudo Wire ................................................................................................................... 16-86


16-86

View the route of Pseudo Wires .................................................................................................................................... 16-87


16-87
....................................................................................................................................................................................................................................
1350 OMS xvii
8DG42227DAAA 9.6
Issue 3 December 2012
Contents

....................................................................................................................................................................................................................................
View the Pseudo Wires crossing a Pseudo Wire ....................................................................................................... 16-88
16-88

Description of the list of Pseudo Wires ........................................................................................................................ 16-89


16-89

T-MPLS tunnel schema

T-MPLS tunnel schema ..................................................................................................................................................... 16-90


16-90

Ethernet Services in the T-MPLS Domain ................................................................................................................ 16-93


16-93

Managing T-MPLS tunnels

T-MPLS tunnel description .............................................................................................................................................. 16-97


16-97

View the list of T-MPLS tunnels .................................................................................................................................... 16-99


16-99

Description of the list of T-MPLS tunnels ............................................................................................................... 16-100


16-100

Create a T-MPLS tunnel .................................................................................................................................................. 16-101


16-101

Modify a T-MPLS tunnel ................................................................................................................................................ 16-104


16-104

Delete a T-MPLS tunnel .................................................................................................................................................. 16-106


16-106

View the details of the T-MPLS tunnels ................................................................................................................... 16-107


16-107

Details of a T-MPLS tunnel ........................................................................................................................................... 16-108


16-108

Configuration of the route of a T-MPLS tunnel ..................................................................................................... 16-109


16-109

Delete a constraint from a T-MPLS tunnel ............................................................................................................... 16-111


16-111

Configuration of PHB profile of a T-MPLS tunnel ............................................................................................... 16-113


16-113

Configuration of Layer-2 encapsulation of a tunnel ............................................................................................. 16-115


16-115

Allocate T-MPLS tunnel ................................................................................................................................................. 16-117


16-117

De-allocate T-MPLS tunnel ........................................................................................................................................... 16-120


16-120

Implement a T-MPLS tunnel ......................................................................................................................................... 16-122


16-122

De-implement a T-MPLS tunnel .................................................................................................................................. 16-124


16-124

List the constraints of a T-MPLS tunnel .................................................................................................................. 16-126


16-126

Description of the list of T-MPLS tunnel Constraints .......................................................................................... 16-127


16-127

View the details of the T-MPLS tunnel constraints ............................................................................................... 16-128


16-128

Details of a T-MPLS tunnel Constraint ..................................................................................................................... 16-129


16-129

View the list of cross connections ............................................................................................................................... 16-130


16-130

Description of the list of T-MPLS tunnel Cross Connections ........................................................................... 16-131


16-131

View the T-MPLS tunnel extremities ......................................................................................................................... 16-132


16-132
....................................................................................................................................................................................................................................
xviii 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Contents

....................................................................................................................................................................................................................................
Description of the list of T-MPLS tunnel Extremities ......................................................................................... 16-133
16-133

View the section inventory from T-MPLS tunnel .................................................................................................. 16-134


16-134

Description of the Inventory of sections ................................................................................................................... 16-135


16-135

View the bandwidth load of T-MPLS tunnel ........................................................................................................... 16-136


16-136

View the route of T-MPLS tunnels ............................................................................................................................ 16-137


16-137

View the Pseudo Wires crossing a T-MPLS tunnel ............................................................................................... 16-138


16-138

Description of the list of Pseudo Wires ..................................................................................................................... 16-139


16-139

Tunnel protection

Tunnel protection create .................................................................................................................................................. 16-140


16-140

T-MPLS Routing display ................................................................................................................................................ 16-144


16-144

Tunnel switch commands ............................................................................................................................................... 16-147


16-147

Other info on T-MPLS routing display ...................................................................................................................... 16-152


16-152

MAC Flushing Protection

Overview .............................................................................................................................................................................. 16-156


16-156

MAC flushing protection description ........................................................................................................................ 16-157


16-157

MAC flushing protection creation ............................................................................................................................... 16-158


16-158

MAC flushing protection list ........................................................................................................................................ 16-160


16-160

Attributes of MAC-flushing protection ..................................................................................................................... 16-161


16-161

Interconnection Scheme list ........................................................................................................................................... 16-162


16-162

Attributes of Interconnection Schemes ..................................................................................................................... 16-163


16-163

TMPLS EVC: Force MAC flushing ........................................................................................................................... 16-164


16-164

Tunnel Redundancy

Overview .............................................................................................................................................................................. 16-165


16-165

Description ........................................................................................................................................................................... 16-166


16-166

Create one-to-one-open protection .............................................................................................................................. 16-173


16-173

Create Dual-point-to-point Protection ....................................................................................................................... 16-175


16-175

Create MAC Flushing Protection Schema .............................................................................................................. 16-177


16-177

EVC setup ............................................................................................................................................................................ 16-178


16-178

....................................................................................................................................................................................................................................
1350 OMS xix
8DG42227DAAA 9.6
Issue 3 December 2012
Contents

....................................................................................................................................................................................................................................
17 EVC over T-MPLS

Overview ................................................................................................................................................................................... 17-1


17-1

Create T-MPLS Structure

Create Link over Cable ........................................................................................................................................................ 17-2


17-2

T-MPLS tunnel create ........................................................................................................................................................ 17-14


17-14

T-MPLS-Create PW ............................................................................................................................................................ 17-21


17-21

EVC on T-MPLS

Create EVC over T-MPLS wizard ................................................................................................................................. 17-27


17-27

List the T-MPLS EVC ........................................................................................................................................................ 17-32


17-32

Description of the list of T-MPLS EVC ...................................................................................................................... 17-33


17-33

Create EVC over T-MPLS EVPL bottom up ............................................................................................................. 17-34


17-34

Create EVC over T-MPLS EVPL top down ............................................................................................................... 17-55


17-55

Create EVC over T-MPLS EVPLAN ........................................................................................................................... 17-72


17-72

Create EVC over T-MPLS BTV ..................................................................................................................................... 17-86


17-86

Create EVC over T-MPLS HSI ....................................................................................................................................... 17-90


17-90

Alarms EVC T-MPLS ........................................................................................................................................................ 17-94


17-94

Delete NE with EVC over T-MPLS

What to do deleting a NE .................................................................................................................................................. 17-97


17-97

Delete NE detailed procedure .......................................................................................................................................... 17-98


17-98

Verify create EVC over T-MPLS

Verify create EVC over T-MPLS ................................................................................................................................. 17-114


17-114

18 End to End Ethernet Provisioning Management

Overview ................................................................................................................................................................................... 18-1


18-1

IP DSCP/TOS and EtherType

Classification of the frames ................................................................................................................................................ 18-6


18-6

Managing Customer

Overview about Customer .................................................................................................................................................. 18-8


18-8

Display the Customer List ................................................................................................................................................... 18-9


18-9

....................................................................................................................................................................................................................................
xx 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Contents

....................................................................................................................................................................................................................................
Description of the list of Customers ............................................................................................................................. 18-10
18-10

Create a Customer ................................................................................................................................................................ 18-11


18-11

Modify a Customer ............................................................................................................................................................. 18-12


18-12

Delete a Customer ............................................................................................................................................................... 18-14


18-14

Get Details of the Customer ............................................................................................................................................. 18-15


18-15

Details of a Customer ......................................................................................................................................................... 18-16


18-16

Managing Ethernet Services

Overview about Ethernet Services ................................................................................................................................ 18-17


18-17

Display the Service List ..................................................................................................................................................... 18-20


18-20

Description of the list of Services .................................................................................................................................. 18-21


18-21

Create a Service .................................................................................................................................................................... 18-22


18-22

Service Setup ......................................................................................................................................................................... 18-24


18-24

Modify a Service .................................................................................................................................................................. 18-30


18-30

Delete a Service .................................................................................................................................................................... 18-32


18-32

Get details of the Service .................................................................................................................................................. 18-33


18-33

Details of a Service ............................................................................................................................................................. 18-35


18-35

Display the Services of a Customer .............................................................................................................................. 18-36


18-36

Managing ETS Ethernet Virtual Connections (EVC)

Overview about ETS Ethernet Virtual Connections ................................................................................................ 18-37


18-37

Resource Reservation for Private Services ................................................................................................................. 18-39


18-39

Display the list of Connection Oriented EVC ........................................................................................................... 18-42


18-42

Description of the list of EVCs ....................................................................................................................................... 18-43


18-43

Create a Connection Oriented EVC .............................................................................................................................. 18-44


18-44

Modify an ETS EVC .......................................................................................................................................................... 18-47


18-47

Delete an ETS EVC ............................................................................................................................................................ 18-49


18-49

Get the EVC properties ...................................................................................................................................................... 18-51


18-51

Details of a EVC .................................................................................................................................................................. 18-53


18-53

Allocate ETS EVC .............................................................................................................................................................. 18-54


18-54

Deallocate ETS EVC .......................................................................................................................................................... 18-55


18-55
....................................................................................................................................................................................................................................
1350 OMS xxi
8DG42227DAAA 9.6
Issue 3 December 2012
Contents

....................................................................................................................................................................................................................................
Implement ETS EVC .......................................................................................................................................................... 18-56
18-56

Deimplement ETS EVC .................................................................................................................................................... 18-57


18-57

Commission ETS EVC ...................................................................................................................................................... 18-58


18-58

Decommission ETS EVC ................................................................................................................................................. 18-59


18-59

List the EVC terminations ................................................................................................................................................ 18-60


18-60

Description of the list of terminations .......................................................................................................................... 18-61


18-61

Delete an EVC Termination ............................................................................................................................................. 18-62


18-62

Get the EVC termination properties .............................................................................................................................. 18-63


18-63

Details of a Termination .................................................................................................................................................... 18-65


18-65

Add an EVC termination ................................................................................................................................................... 18-66


18-66

EVC Fault Localization ..................................................................................................................................................... 18-68


18-68

Description of the list of Fault Localization .............................................................................................................. 18-69


18-69

Description of the list of Alarms .................................................................................................................................... 18-70


18-70

Start PM on an EVC ........................................................................................................................................................... 18-71


18-71

Stop PM on an EVC ............................................................................................................................................................ 18-72


18-72

Synchronize PM on an EVC ............................................................................................................................................ 18-73


18-73

Show PM on an EVC ......................................................................................................................................................... 18-74


18-74

View the Routing Display on an EVC ......................................................................................................................... 18-75


18-75

Managing End-to-End Ethernet Virtual Connections (E2E EVC)

Overview about E2E Ethernet Virtual Connections ................................................................................................ 18-76


18-76

Display the list of E2E EVC ............................................................................................................................................ 18-78


18-78

Description of the list of EVCs ....................................................................................................................................... 18-79


18-79

Create an E2E EVC ............................................................................................................................................................. 18-80


18-80

Create a full E2E EVC ....................................................................................................................................................... 18-84


18-84

Create a raw E2E EVC ...................................................................................................................................................... 18-86


18-86

Modify a full E2E EVC ..................................................................................................................................................... 18-87


18-87

Join E2E EVC ....................................................................................................................................................................... 18-89


18-89

Managing an E2E EVC ..................................................................................................................................................... 18-91


18-91

....................................................................................................................................................................................................................................
xxii 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Contents

....................................................................................................................................................................................................................................
EVC over SDH

Structure for EVC over SDH ........................................................................................................................................... 18-93


18-93

Assign ports to domain .................................................................................................................................................... 18-102


18-102

EVC over SDH ................................................................................................................................................................... 18-106


18-106

Alarms EVC T-MPLS ...................................................................................................................................................... 18-118


18-118

Full EVC Takeover

Overview about Full EVC Takeover procedure ..................................................................................................... 18-121


18-121

Full EVC Takeover Procedure ...................................................................................................................................... 18-122


18-122

T-MPLS Takeover

T-MPLS Takeover description ...................................................................................................................................... 18-130


18-130

Takeover procedure for T-MPLS ................................................................................................................................. 18-131


18-131

Managing Color Profiles

Overview about Color Profiles ..................................................................................................................................... 18-133


18-133

Display the Color Profile list ......................................................................................................................................... 18-134


18-134

Create a Color Profile ...................................................................................................................................................... 18-135


18-135

Modify a Color Profile .................................................................................................................................................... 18-136


18-136

Delete a Color Profile ...................................................................................................................................................... 18-139


18-139

Get the Color Profile Properties ................................................................................................................................... 18-140


18-140

Managing Traffic Descriptors

Overview about Traffic Descriptor ............................................................................................................................. 18-142


18-142

Display the Traffic Descriptor list ............................................................................................................................... 18-144


18-144

Description of the list of Traffic Descriptors ........................................................................................................... 18-145


18-145

Create a Traffic Descriptor ............................................................................................................................................. 18-146


18-146

Modify a Traffic Descriptor ........................................................................................................................................... 18-149


18-149

Delete a Traffic Descriptor ............................................................................................................................................. 18-152


18-152

Get the Traffic Descriptor Properties ......................................................................................................................... 18-153


18-153

Details of a Traffic Descriptor ...................................................................................................................................... 18-155


18-155

....................................................................................................................................................................................................................................
1350 OMS xxiii
8DG42227DAAA 9.6
Issue 3 December 2012
Contents

....................................................................................................................................................................................................................................
Managing Traffic Classifiers

Overview about Traffic Classifiers ............................................................................................................................. 18-156


18-156

Display the Traffic Classifier list ................................................................................................................................. 18-158


18-158

Description of the list of Traffic Classifiers ............................................................................................................. 18-159


18-159

Create a Traffic Classifier ............................................................................................................................................... 18-160


18-160

Modify a Traffic Classifier ............................................................................................................................................. 18-162


18-162

Delete a Traffic Classifier ............................................................................................................................................... 18-164


18-164

Get the Traffic Classifier Properties ........................................................................................................................... 18-165


18-165

Details of a Traffic Classifier ........................................................................................................................................ 18-167


18-167

Managing Ethernet ETS Edge Physical Ports

Overview about Ethernet edge physical ports ....................................................................................................... 18-168


18-168

Display the ETS edge port list ...................................................................................................................................... 18-169


18-169

Modify an edge port ......................................................................................................................................................... 18-170


18-170

Configure an ETS Edge Port ......................................................................................................................................... 18-172


18-172

Get the ETS Edge Port Properties ............................................................................................................................... 18-175


18-175

Display the traffic parameter list .................................................................................................................................. 18-177


18-177

Description of the list of Traffic Parameters ........................................................................................................... 18-178


18-178

Details of Traffic Parameters ......................................................................................................................................... 18-179


18-179

Navigation to equipment ................................................................................................................................................. 18-180


18-180

Show PM on an Edge Port ............................................................................................................................................. 18-182


18-182

Show External Termination Point ............................................................................................................................... 18-183


18-183

Managing Ethernet Transport Links

Overview about Ethernet Transport Links ............................................................................................................... 18-184


18-184

Display the Ethernet ETS Transport Link list ......................................................................................................... 18-186


18-186

Description of the list of ETS Transport Links ....................................................................................................... 18-187


18-187

Configure an ETS Transport Link ............................................................................................................................... 18-188


18-188

Get the Transport Link extremities ............................................................................................................................. 18-190


18-190

Get the Transport Link properties ............................................................................................................................... 18-193


18-193

Details of ETS Transport Links .................................................................................................................................... 18-195


18-195
....................................................................................................................................................................................................................................
xxiv 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Contents

....................................................................................................................................................................................................................................
Display the Transport Link bandwidth load ............................................................................................................ 18-196
18-196

Managing Ethernet Segments

Overview about Ethernet Segments ........................................................................................................................... 18-197


18-197

Display the Ethernet Segment list ............................................................................................................................... 18-199


18-199

Description of the list of Ethernet Segments ........................................................................................................... 18-200


18-200

Create an Ethernet Segment .......................................................................................................................................... 18-202


18-202

Modify an Ethernet Segment ........................................................................................................................................ 18-205


18-205

Delete an Ethernet Segment .......................................................................................................................................... 18-208


18-208

Associate a Traffic Classifier to an Ethernet Segment ......................................................................................... 18-209


18-209

Disassociate a Traffic Classifier to an Ethernet Segment ................................................................................... 18-211


18-211

Add a constraint to an Ethernet Segment ................................................................................................................. 18-213


18-213

List the constraints related to an Ethernet Segment .............................................................................................. 18-216


18-216

Description of the list of Constraints .......................................................................................................................... 18-217


18-217

Delete an Ethernet Segment Constraint .................................................................................................................... 18-218


18-218

Get the Ethernet Segment Constraint Properties .................................................................................................... 18-219


18-219

Details of an Ethernet Segment Constraint .............................................................................................................. 18-221


18-221

Modify a Constraint .......................................................................................................................................................... 18-222


18-222

VLAN Push/Pop at ETS NNI Interface .................................................................................................................... 18-225


18-225

Allocate an Ethernet Segment ....................................................................................................................................... 18-226


18-226

Deallocate an Ethernet Segment ................................................................................................................................. 18-227


18-227

Implement an Ethernet Segment .................................................................................................................................. 18-229


18-229

Deimplement an Ethernet Segment ............................................................................................................................ 18-231


18-231

Configure an Ethernet Segment ................................................................................................................................... 18-233


18-233

Get the Ethernet Segment extremities ........................................................................................................................ 18-235


18-235

Description of the list of Ethernet Segment Extremities ..................................................................................... 18-239


18-239

Get the Ethernet Segment properties .......................................................................................................................... 18-240


18-240

Details of an Ethernet Segment .................................................................................................................................... 18-241


18-241

Display the route of an Ethernet Segment ................................................................................................................ 18-242


18-242

Display the connectivity view of an Ethernet Segment ....................................................................................... 18-244


18-244
....................................................................................................................................................................................................................................
1350 OMS xxv
8DG42227DAAA 9.6
Issue 3 December 2012
Contents

....................................................................................................................................................................................................................................
Managing VLAN types

Overview about VLAN types ....................................................................................................................................... 18-246


18-246

Display the VLAN type list ........................................................................................................................................... 18-247


18-247

Create a VLAN type ......................................................................................................................................................... 18-248


18-248

Modify a VLAN type ....................................................................................................................................................... 18-251


18-251

Delete a VLAN type ......................................................................................................................................................... 18-253


18-253

19 Bridge Network Management

Overview ................................................................................................................................................................................... 19-1


19-1

Connection Less Networks

Bridge Network Management ............................................................................................................................................ 19-4


19-4

Bridge Traffic Management ................................................................................................................................................ 19-6


19-6

Spanning Tree Instance Management ............................................................................................................................. 19-8


19-8

VLAN management ............................................................................................................................................................ 19-10


19-10

EVC Data Plane .................................................................................................................................................................... 19-11


19-11

The EVC life cycle .............................................................................................................................................................. 19-13


19-13

Layer-2 Control Protocol Processing ............................................................................................................................ 19-16


19-16

Bandwidth Profile per UNI .............................................................................................................................................. 19-18


19-18

View the list of bridge NEs .............................................................................................................................................. 19-22


19-22

Description of the list of Bridge NEs ........................................................................................................................... 19-23


19-23

View the list of bridge ENEs ........................................................................................................................................... 19-24


19-24

Description of the list of Bridge ENEs ........................................................................................................................ 19-25


19-25

View the Provider Bridge Flows of an EVC .............................................................................................................. 19-26


19-26

Connection Less Transport Link Management

Display the Ethernet Bridge Transport Link list ....................................................................................................... 19-27


19-27

Description of the list of Bridge Transport Links .................................................................................................... 19-29


19-29

Configure a transport Link ............................................................................................................................................... 19-30


19-30

Get the Transport Link extremities ................................................................................................................................ 19-34


19-34

Description of the list of Transport Link extremities .............................................................................................. 19-37


19-37

Get the Transport Link properties .................................................................................................................................. 19-38


19-38
....................................................................................................................................................................................................................................
xxvi 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Contents

....................................................................................................................................................................................................................................
Details of an ETB Transport Link .................................................................................................................................. 19-40
19-40

Activate a Bridge Transport Link ................................................................................................................................... 19-41


19-41

Deactivate a Bridge Transport Link .............................................................................................................................. 19-42


19-42

View the list of Bridge Edge Ports ................................................................................................................................ 19-43


19-43

Description of the list of Bridge Edge Ports .............................................................................................................. 19-44


19-44

Activate a Bridge Edge Port ............................................................................................................................................ 19-45


19-45

Deactivate a Bridge Edge Port ........................................................................................................................................ 19-46


19-46

Connection Less EVC Management

View the Connection Less EVC list .............................................................................................................................. 19-47


19-47

Description of the list of Bridge EVCs ........................................................................................................................ 19-48


19-48

Create a Bridge EVC .......................................................................................................................................................... 19-49


19-49

Modify a Bridge EVC ........................................................................................................................................................ 19-53


19-53

Delete a Bridge EVC .......................................................................................................................................................... 19-56


19-56

Get the EVC properties ...................................................................................................................................................... 19-58


19-58

Details of a Bridge EVC .................................................................................................................................................... 19-60


19-60

Configure a Bridge or an ETS EVC .............................................................................................................................. 19-61


19-61

Add bridge Transport Link to EVC ............................................................................................................................... 19-62


19-62

Remove bridge Transport Link to EVC ....................................................................................................................... 19-63


19-63

Inventory of bridge Transport Links of an EVC ....................................................................................................... 19-64


19-64

EVC Fault Localization ..................................................................................................................................................... 19-65


19-65

Description of the list of Fault Localization .............................................................................................................. 19-68


19-68

Description of the list of Alarms .................................................................................................................................... 19-69


19-69

Navigation to AS .................................................................................................................................................................. 19-70


19-70

Bridge EVC Termination Management

View the list of EVC terminations ................................................................................................................................. 19-72


19-72

Description of the list of EVC Terminations ............................................................................................................. 19-73


19-73

Add Connection Less EVC Termination ..................................................................................................................... 19-74


19-74

Delete a Bridge EVC Termination ................................................................................................................................. 19-81


19-81

Configure a Bridge EVC Termination .......................................................................................................................... 19-83


19-83
....................................................................................................................................................................................................................................
1350 OMS xxvii
8DG42227DAAA 9.6
Issue 3 December 2012
Contents

....................................................................................................................................................................................................................................
Get the EVC termination properties .............................................................................................................................. 19-85
19-85

Details of an EVC Termination ....................................................................................................................................... 19-87


19-87

Workflow for Bridge Management

Overview about Workflow .............................................................................................................................................. 19-88


19-88

Create a Domain ................................................................................................................................................................... 19-90


19-90

Add NE to a Domain .......................................................................................................................................................... 19-91


19-91

Domain Configuration ....................................................................................................................................................... 19-94


19-94

Domain Modification ......................................................................................................................................................... 19-96


19-96

Configure a Network Element ........................................................................................................................................ 19-98


19-98

Link Over TDM configuration ..................................................................................................................................... 19-100


19-100

NE Ethernet Physical Port Configuration ................................................................................................................. 19-102


19-102

Create a Customer ............................................................................................................................................................. 19-104


19-104

Create an Ethernet Service ............................................................................................................................................. 19-107


19-107

Traffic Descriptor Definition ......................................................................................................................................... 19-109


19-109

EVC Allocation and Implementation ......................................................................................................................... 19-111


19-111

EVC Bandwidth Management

Dynamic change capability ............................................................................................................................................ 19-112


19-112

Function Description ........................................................................................................................................................ 19-113


19-113

Service Delimiting

Vlan Push/Pop On Provider Bridge UNI/IWI Management ............................................................................. 19-117


19-117

Spanning Tree

Show the Spanning Tree Instance of EVC ............................................................................................................... 19-119


19-119

Show the Spanning Tree Instance ............................................................................................................................... 19-120


19-120

Spanning Tree Instance configuration ....................................................................................................................... 19-121


19-121

Spanning Tree Instance Implementation ................................................................................................................... 19-123


19-123

Spanning Tree Instance Deimplementation ............................................................................................................. 19-124


19-124

20 Provider Backbone Bridge Network Management

Overview ................................................................................................................................................................................... 20-1


20-1

....................................................................................................................................................................................................................................
xxviii 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Contents

....................................................................................................................................................................................................................................
Provider Backbone Bridge (PBB) Networks

Provider Backbone Bridge Management ....................................................................................................................... 20-5


20-5

PBB EVC provisioning ........................................................................................................................................................ 20-8


20-8

Ethernet Ring Protocol (ERP) ......................................................................................................................................... 20-10


20-10

Network Configuration

Network Configuration ...................................................................................................................................................... 20-11


20-11

PBB Domain Create ............................................................................................................................................................ 20-12


20-12

Define NE ............................................................................................................................................................................... 20-14


20-14

Provisioning

Provisioning hardware reference .................................................................................................................................... 20-17


20-17

Transport link ....................................................................................................................................................................... 20-20


20-20

Create Ethernet Physical Connection ........................................................................................................................... 20-21


20-21

Assign Link over Cable to PBB domain ..................................................................................................................... 20-24


20-24

ERP configuration

Create ERP Ring .................................................................................................................................................................. 20-30


20-30

Create an ERP Instance ...................................................................................................................................................... 20-38


20-38

Backbone VLAN ID

B-VID configuration ........................................................................................................................................................... 20-46


20-46

EVC-EVPLAN Service in PBB/ERP

Additional Info on PBB/ERP Service .......................................................................................................................... 20-52


20-52

PBB EVC Termination Management

Add PBB EVC Termination ............................................................................................................................................. 20-56


20-56

Remove PBB EVC Termination ..................................................................................................................................... 20-59


20-59

Provider Backbone Bridge EVC Management

Overview ................................................................................................................................................................................. 20-60


20-60

View the PBB EVC list ...................................................................................................................................................... 20-61


20-61

Description of the list of PBB EVCs ............................................................................................................................ 20-62


20-62

Create PBB EVC .................................................................................................................................................................. 20-63


20-63

....................................................................................................................................................................................................................................
1350 OMS xxix
8DG42227DAAA 9.6
Issue 3 December 2012
Contents

....................................................................................................................................................................................................................................
Allocate PBB EVC .............................................................................................................................................................. 20-65
20-65

Deallocate PBB EVC ......................................................................................................................................................... 20-67


20-67

Implement PBB EVC ......................................................................................................................................................... 20-68


20-68

Deimplement PBB EVC .................................................................................................................................................... 20-70


20-70

Add Termination on implemented PBB EVC ........................................................................................................... 20-71


20-71

Remove Termination on implemented EVC .............................................................................................................. 20-72


20-72

Configure PBB EVC .......................................................................................................................................................... 20-73


20-73

Bridge Flows of PBB EVC .............................................................................................................................................. 20-74


20-74

PBB EVC Broadcast Domain Containment ............................................................................................................... 20-76


20-76

Enable Broadcast Domain Containment ..................................................................................................................... 20-77


20-77

Disable Broadcast Domain Containment .................................................................................................................... 20-78


20-78

Automatic association UNI port - default VT ........................................................................................................... 20-79


20-79

Manual association UNI port - user VT ...................................................................................................................... 20-80


20-80

Configuration of the DEI bit ............................................................................................................................................ 20-81


20-81

B-VID Management

Overview ................................................................................................................................................................................. 20-82


20-82

View the B-VID list ............................................................................................................................................................ 20-83


20-83

Create PBB B-VID .............................................................................................................................................................. 20-84


20-84

Delete PBB B-VID .............................................................................................................................................................. 20-86


20-86

Allocate PBB B-VID .......................................................................................................................................................... 20-87


20-87

Deallocate PBB B-VID ...................................................................................................................................................... 20-88


20-88

Implement PBB B-VID ..................................................................................................................................................... 20-89


20-89

Deimplement PBB B-VID ................................................................................................................................................ 20-91


20-91

Domain Wide VID distribution ....................................................................................................................................... 20-93


20-93

Ring Association to a B-VID ........................................................................................................................................... 20-95


20-95

Ring Dissociation from B-VID ....................................................................................................................................... 20-97


20-97

Change ERP of a B-VID ................................................................................................................................................... 20-99


20-99

List ERP instances of a B-VID ..................................................................................................................................... 20-101


20-101

Association of Transport Link to B-VID .................................................................................................................. 20-102


20-102
....................................................................................................................................................................................................................................
xxx 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Contents

....................................................................................................................................................................................................................................
Dissociation of Transport Link to B-VID ................................................................................................................. 20-104
20-104

Ethernet Ring Protection (ERP) Management

Overview .............................................................................................................................................................................. 20-107


20-107

View the ERP ring list ..................................................................................................................................................... 20-108


20-108

Description of the list of ERP ....................................................................................................................................... 20-109


20-109

Create/delete ERP Ring ................................................................................................................................................... 20-110


20-110

Implement/deimplement the ERP ............................................................................................................................... 20-112


20-112

ERP Switch Command .................................................................................................................................................... 20-113


20-113

ERP Switch Command From Port ............................................................................................................................... 20-114


20-114

Add/remove Transport Link in a Ring ....................................................................................................................... 20-115


20-115

Add/remove Node in a Ring .......................................................................................................................................... 20-116


20-116

Create/delete ERP Ring bundle .................................................................................................................................... 20-117


20-117

Add/remove ERP Ring in a bundle ............................................................................................................................. 20-118


20-118

ERP Instance Management

Overview .............................................................................................................................................................................. 20-120


20-120

View the ERP instance list ............................................................................................................................................. 20-121


20-121

Description of the list of ERP instances .................................................................................................................... 20-122


20-122

Create/delete ERP instance ............................................................................................................................................ 20-123


20-123

Implement/deimplement the ERP instance ............................................................................................................. 20-125


20-125

Associate OAM to the ERP instance ......................................................................................................................... 20-126


20-126

Get a graphical view of the ERP instance ............................................................................................................... 20-127


20-127

Modify Defined ERP instance ...................................................................................................................................... 20-129


20-129

Modify implemented ERP instance ............................................................................................................................ 20-131


20-131

PBB Fault Management

Overview .............................................................................................................................................................................. 20-133


20-133

PBB Fault Localization and navigation to AS ........................................................................................................ 20-134


20-134

Workflow for PBB Management

Overview about Workflow ............................................................................................................................................ 20-135


20-135

Create a PBB Domain ...................................................................................................................................................... 20-137


20-137
....................................................................................................................................................................................................................................
1350 OMS xxxi
8DG42227DAAA 9.6
Issue 3 December 2012
Contents

....................................................................................................................................................................................................................................
Add NE to a Domain ........................................................................................................................................................ 20-138
20-138

Add Transport Link to a Domain ................................................................................................................................. 20-139


20-139

ERP provisioning ............................................................................................................................................................... 20-141


20-141

Configure B-VID ............................................................................................................................................................. 20-143


20-143

Create a PBB EVC ............................................................................................................................................................ 20-144


20-144

PBB EVC traffic classification ..................................................................................................................................... 20-153


20-153

Traffic Descriptor Definition ......................................................................................................................................... 20-154


20-154

EVC Allocation and Implementation ......................................................................................................................... 20-155


20-155

In Band Management

Overview .............................................................................................................................................................................. 20-156


20-156

Address Configuration of the Network Elements .................................................................................................. 20-157


20-157

Lag Port Creation (Via Zic) ........................................................................................................................................... 20-165


20-165

NMS Start Supervision (NE Not Defined On NMS) ........................................................................................... 20-183


20-183

21 Broadcast TV Service Management

Overview ................................................................................................................................................................................... 21-1


21-1

Section I: Introduction

Overview ................................................................................................................................................................................... 21-3


21-3

Overview about Broadcast TV .......................................................................................................................................... 21-4


21-4

Managing Broadcast TV Elements .................................................................................................................................. 21-5


21-5

View the list of Broadcast TV Elements ........................................................................................................................ 21-6


21-6

Create a BTV Element .......................................................................................................................................................... 21-8


21-8

Modify a BTV Element ..................................................................................................................................................... 21-11


21-11

Delete a BTV Element ....................................................................................................................................................... 21-14


21-14

View the details of the BTV Elements ......................................................................................................................... 21-16


21-16

Details of a BTV Elements ............................................................................................................................................. 21-17


21-17

View the list of ETPs belonging to a BTV Element ................................................................................................ 21-18


21-18

Description of the list of BTV ENE inventory .......................................................................................................... 21-19


21-19

Create an ETP in a BTV Element .................................................................................................................................. 21-20


21-20

Delete an ETP in a BTV Element .................................................................................................................................. 21-22


21-22
....................................................................................................................................................................................................................................
xxxii 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Contents

....................................................................................................................................................................................................................................
Section II: Workflow for BTV construction

Overview ................................................................................................................................................................................. 21-24


21-24

Create path on 1350 OMS SDH application .............................................................................................................. 21-25


21-25

Create Broadcast TV Element ......................................................................................................................................... 21-26


21-26

Create Link Broadcast TV ................................................................................................................................................ 21-29


21-29

Section III: Workflow for BTV Service Management

Overview ................................................................................................................................................................................. 21-33


21-33

Create a Customer .............................................................................................................................................................. 21-34


21-34

Create Ethernet Service ..................................................................................................................................................... 21-35


21-35

Create a Connection Oriented EVC .............................................................................................................................. 21-37


21-37

Section IV: Bridge Based BTV Service

Overview ................................................................................................................................................................................. 21-40


21-40

Overview about the Services ........................................................................................................................................... 21-41


21-41

IGMP Snooping Management ......................................................................................................................................... 21-42


21-42

IGMP Snooping State Management .............................................................................................................................. 21-44


21-44

22 Network Supervision

Overview ................................................................................................................................................................................... 22-1


22-1

Managing alarms

Overview about alarms ......................................................................................................................................................... 22-2


22-2

Alarms from ISA E/FE/GE board .................................................................................................................................... 22-3


22-3

Alarms from ISA ES1/4 board .......................................................................................................................................... 22-4


22-4

Alarms from ISA ES16 board ............................................................................................................................................ 22-6


22-6

Alarms or Events on SDH paths from 1350 OMS SDH .......................................................................................... 22-8
22-8

Alarm status management ................................................................................................................................................... 22-9


22-9

Alarm correlation and generation toward AS ............................................................................................................ 22-11


22-11

Managing Fault Localization

Display the Fault Localization list ................................................................................................................................. 22-12


22-12

Description of Fault Localization .................................................................................................................................. 22-14


22-14

....................................................................................................................................................................................................................................
1350 OMS xxxiii
8DG42227DAAA 9.6
Issue 3 December 2012
Contents

....................................................................................................................................................................................................................................
Manual Synchronization of Alarms on NE ................................................................................................................ 22-15
22-15

Specific Behavior

Client Signal Fail Alarm Management ......................................................................................................................... 22-16


22-16

23 Network Utilities

Overview ................................................................................................................................................................................... 23-1


23-1

Audit, Alignment, Reservation, Recovery

Overview ................................................................................................................................................................................... 23-2


23-2

The AAR procedure ............................................................................................................................................................. 23-3


23-3

NE Audit tool ........................................................................................................................................................................... 23-6


23-6

Results of Audit ....................................................................................................................................................................... 23-8


23-8

Reservation tool .................................................................................................................................................................... 23-13


23-13

Align Up of Ethernet Domain Data ............................................................................................................................... 23-15


23-15

Start the audit, alignment, reserve procedure ............................................................................................................ 23-16


23-16

Stop the audit, alignment, reserve procedure ............................................................................................................. 23-17


23-17

View the list of auditable NEs ......................................................................................................................................... 23-18


23-18

Description of the list of auditable NEs ....................................................................................................................... 23-19


23-19

Perform an audit on a NE .................................................................................................................................................. 23-20


23-20

View the list of Audited NEs ........................................................................................................................................... 23-22


23-22

Description of the list of Audited NEs ......................................................................................................................... 23-23


23-23

View the results of an audit .............................................................................................................................................. 23-24


23-24

Perform an alignment on a NE ........................................................................................................................................ 23-26


23-26

NE Alignment tool

Overview ................................................................................................................................................................................. 23-27


23-27

Workflow to align up Ethernet Data ............................................................................................................................. 23-28


23-28

ISA Board Replacement Procedure ............................................................................................................................... 23-30


23-30

Perform a reservation on a NE ........................................................................................................................................ 23-32


23-32

Restore procedure for ISA board .................................................................................................................................... 23-33


23-33

....................................................................................................................................................................................................................................
xxxiv 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Contents

....................................................................................................................................................................................................................................
24 Operation, Administration, and Maintenance (OAM) Management

Overview ................................................................................................................................................................................... 24-1


24-1

Ethernet OAM

OAM main functions ............................................................................................................................................................ 24-3


24-3

Create OAM Domain ............................................................................................................................................................ 24-7


24-7

List OAM Domains ............................................................................................................................................................... 24-8


24-8

Description of the list of OAM MD ................................................................................................................................ 24-9


24-9

OAM Domain Properties .................................................................................................................................................. 24-10


24-10

Details of OAM MD ........................................................................................................................................................... 24-11


24-11

Modify OAM Domain ....................................................................................................................................................... 24-12


24-12

Configure OAM Domain .................................................................................................................................................. 24-13


24-13

Deimplement OAM Domain ........................................................................................................................................... 24-14


24-14

Inventory of OAM items from MD ............................................................................................................................... 24-15


24-15

Inventory of OAM monitored objects from MD ...................................................................................................... 24-16


24-16

Maintenance Association (MA)

Maintenance Associations ................................................................................................................................................ 24-17


24-17

List Maintenance Association (MA) ............................................................................................................................. 24-18


24-18

Description of the list of OAM MA .............................................................................................................................. 24-19


24-19

Properties of Maintenance Association (MA) ........................................................................................................... 24-20


24-20

Details of the OAM MA .................................................................................................................................................... 24-21


24-21

Modify Maintenance Association (MA) ...................................................................................................................... 24-22


24-22

Configure Maintenance Association (MA) ............................................................................................................... 24-23


24-23

Enable/Disable Continuity Check (CC) ....................................................................................................................... 24-24


24-24

Deimplement OAM MA ................................................................................................................................................... 24-25


24-25

Inventory of OAM items from MA ............................................................................................................................... 24-26


24-26

Inventory of OAM monitored objects from MA ...................................................................................................... 24-27


24-27

Maintenance Activation

Maintenance Activation on EVC ................................................................................................................................... 24-28


24-28

....................................................................................................................................................................................................................................
1350 OMS xxxv
8DG42227DAAA 9.6
Issue 3 December 2012
Contents

....................................................................................................................................................................................................................................
Loopback

Loopback activation ............................................................................................................................................................ 24-29


24-29

Linktrace

Linktrace activation ............................................................................................................................................................. 24-31


24-31

Delay measurement and Loss measurement

Overview ................................................................................................................................................................................. 24-33


24-33

Packet Delay measurement .............................................................................................................................................. 24-34


24-34

Packet Loss measurement ................................................................................................................................................. 24-35


24-35

Configure Maintenance End Points ............................................................................................................................... 24-36


24-36

List the OAM ETH DM Tool .......................................................................................................................................... 24-38


24-38

List the OAM ETH SLM Tool ........................................................................................................................................ 24-40


24-40

Create ETH DM Tool ......................................................................................................................................................... 24-42


24-42

Create ETH SLM Tool ....................................................................................................................................................... 24-44


24-44

Activate/Deactivate OAM ETH DM Tool .................................................................................................................. 24-46


24-46

Activate/Deactivate OAM ETH SLM Tool ................................................................................................................ 24-47


24-47

Inventory from OAM ETH DM Tool ........................................................................................................................... 24-48


24-48

Inventory from OAM ETH SLM Tool ......................................................................................................................... 24-49


24-49

Configure OAM ETH DM Tool ..................................................................................................................................... 24-50


24-50

Configure OAM ETH SLM Tool ................................................................................................................................... 24-52


24-52

25 Circuit Emulation Service Management

Overview ................................................................................................................................................................................... 25-1


25-1

CES Overview

Circuit Emulation Services definition ............................................................................................................................. 25-4


25-4

TDM client synchronization ............................................................................................................................................... 25-8


25-8

Protection setup after link creation .................................................................................................................................. 25-9


25-9

CAC tolerance and modulation mode .......................................................................................................................... 25-11


25-11

Resource assignment to Packet Radio domain .......................................................................................................... 25-12


25-12

Resource assignment to T-MPLS domain ................................................................................................................... 25-14


25-14

....................................................................................................................................................................................................................................
xxxvi 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Contents

....................................................................................................................................................................................................................................
Packet Radio domain OAM and protections ............................................................................................................. 25-17
25-17

Packet Radio performance monitoring ........................................................................................................................ 25-19


25-19

Packet Radio protection group ........................................................................................................................................ 25-20


25-20

Loopback management ...................................................................................................................................................... 25-21


25-21

T-MPLS domain OAM and protections ....................................................................................................................... 25-22


25-22

Packet Radio domain QoS management ..................................................................................................................... 25-24


25-24

Packet Radio domain inter-working .............................................................................................................................. 25-25


25-25

T-MPLS domain inter-working ....................................................................................................................................... 25-26


25-26

Circuit Emulation Service Management ..................................................................................................................... 25-27


25-27

MEF8 CES terminated service ........................................................................................................................................ 25-33


25-33

Generic Circuit Emulation implementation ............................................................................................................... 25-36


25-36

MEF8 Circuit Emulation Service implementation .................................................................................................. 25-38


25-38

SATOP Circuit Emulation Service implementation ................................................................................................ 25-43


25-43

Generic Circuit Emulation Service OAM and protections ................................................................................... 25-45


25-45

MEF8 Circuit Emulation Service OAM and protections ...................................................................................... 25-46


25-46

SATOP Circuit Emulation Service OAM and protections ................................................................................... 25-48


25-48

Circuit Emulation AAR Network Operation .............................................................................................................. 25-50


25-50

CES Takeover description ................................................................................................................................................ 25-52


25-52

CES Procedures

.................................................................................................................................................................................................... 25-53
25-53

Circuit Emulation Service graphical inventory ......................................................................................................... 25-55


25-55

View the list of CES Domains (Packet Radio) .......................................................................................................... 25-58


25-58

View the details of CES Domain (Packet Radio) ..................................................................................................... 25-59


25-59

Inventory from CES Domain (Packet Radio) ............................................................................................................ 25-60


25-60

Create CES Domain (Packet Radio) ............................................................................................................................. 25-61


25-61

Assign/Deassign resources to Packet Radio Domain ............................................................................................. 25-62


25-62

Assign/Deassign resources to T-MPLS Domain ...................................................................................................... 25-63


25-63

View the list of CES NEs .................................................................................................................................................. 25-64


25-64

Description of the list of CES NEs ................................................................................................................................ 25-65


25-65
....................................................................................................................................................................................................................................
1350 OMS xxxvii
8DG42227DAAA 9.6
Issue 3 December 2012
Contents

....................................................................................................................................................................................................................................
View the details of CES NE ............................................................................................................................................. 25-66
25-66

Details of CES NE ............................................................................................................................................................... 25-67


25-67

Inventory from CES NE .................................................................................................................................................... 25-68


25-68

Inventory from Protection Group ................................................................................................................................... 25-70


25-70

View the list of CES Transport Links ........................................................................................................................... 25-71


25-71

Description of the list of CES Transport Links ......................................................................................................... 25-72


25-72

View the details of CES Transport Link ...................................................................................................................... 25-73


25-73

Details of the CES Transport Link ................................................................................................................................ 25-74


25-74

Inventory from CES Transport Link ............................................................................................................................. 25-75


25-75

Inventory from CES Transport Link extremity ......................................................................................................... 25-76


25-76

View the list of CES PDH Ports ..................................................................................................................................... 25-78


25-78

Description of the list of CES PDH Ports ................................................................................................................... 25-79


25-79

View the details of CES PDH Port ................................................................................................................................ 25-82


25-82

Details of CES PDH Port .................................................................................................................................................. 25-83


25-83

Inventory from CES PDH Port ....................................................................................................................................... 25-84


25-84

List CES Edge Ports ........................................................................................................................................................... 25-85


25-85

Description of the list of CES Port ................................................................................................................................ 25-86


25-86

View the details of CES Edge Port ................................................................................................................................ 25-87


25-87

Details of CES Port ............................................................................................................................................................. 25-88


25-88

Inventory from CES Edge Port ....................................................................................................................................... 25-89


25-89

View the list of CES Links Over Radio ....................................................................................................................... 25-90


25-90

Description of the list of CES Links Over Radio ..................................................................................................... 25-91


25-91

View the details of CES Link Over Radio .................................................................................................................. 25-92


25-92

Details of CES Link Over Radio .................................................................................................................................... 25-93


25-93

Inventory from CES Link Over Radio ......................................................................................................................... 25-94


25-94

Synchronization of CES Link Over Radio ................................................................................................................. 25-96


25-96

View the list of CES Radio Ports ................................................................................................................................... 25-97


25-97

Description of the list of CES Radio Ports ................................................................................................................. 25-98


25-98

View the details of CES Radio Port .............................................................................................................................. 25-99


25-99
....................................................................................................................................................................................................................................
xxxviii 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Contents

....................................................................................................................................................................................................................................
Details of CES Radio Port .............................................................................................................................................. 25-100
25-100

Inventory from CES Radio Port ................................................................................................................................... 25-101


25-101

View the list of CES VLAN Paths .............................................................................................................................. 25-102


25-102

Description of the list of CES VLAN Paths ............................................................................................................ 25-103


25-103

Join CES tunnels ................................................................................................................................................................ 25-104


25-104

Stitch CES tunnels ............................................................................................................................................................ 25-105


25-105

View the list of Circuit Emulation Services ............................................................................................................. 25-106


25-106

Description of the list of Circuit Emulation Services .......................................................................................... 25-107


25-107

View the list of CES Terminations .............................................................................................................................. 25-114


25-114

Description of the list of CES Terminations ............................................................................................................ 25-115


25-115

Create Circuit Emulation Service ................................................................................................................................ 25-122


25-122

Inventory from CES ........................................................................................................................................................ 25-126


25-126

Configure CES .................................................................................................................................................................. 25-127


25-127

Routing display of CES ................................................................................................................................................... 25-130


25-130

Configure CES terminations ......................................................................................................................................... 25-131


25-131

Takeover procedure for MEF8 CES ........................................................................................................................... 25-132


25-132

Takeover procedure for SATOP CES ......................................................................................................................... 25-134


25-134

Part IV: Advanced Functions

26 TSS-320 versus TSS-40 with packet ring

Overview ................................................................................................................................................................................... 26-1


26-1

Create T-MPLS Tunnel and PW (SNI)

Create T-MPLS tunnel 320-40 (SNI) .............................................................................................................................. 26-2


26-2

Create T-MPLS PW 320-40 (SNI) ................................................................................................................................. 26-14


26-14

Create T-MPLS Tunnel and PW (DNI)

Create T-MPLS tunnel 320-40 (DNI) ........................................................................................................................... 26-21


26-21

Create T-MPLS PW 320-40 (DNI) ................................................................................................................................ 26-33


26-33

Create EVC over T-MPLS 320-40

Create EVC over T-MPLS 320-40 ................................................................................................................................. 26-40


26-40

....................................................................................................................................................................................................................................
1350 OMS xxxix
8DG42227DAAA 9.6
Issue 3 December 2012
Contents

....................................................................................................................................................................................................................................
Verify creation of EVC over T-MPLS 320-40 ........................................................................................................... 26-58
26-58

27 Performance Monitoring

Overview ................................................................................................................................................................................... 27-1


27-1

PM in EVC create

PM in EVC create .................................................................................................................................................................. 27-2


27-2

Performance Monitoring activate

PM activate ............................................................................................................................................................................... 27-7


27-7

PM consistency

PM consistency ..................................................................................................................................................................... 27-12


27-12

PM Reports create

PM Reports create ............................................................................................................................................................... 27-15


27-15

PM report generate

PM report generate .............................................................................................................................................................. 27-19


27-19

28 Enhanced Procedures

Overview ................................................................................................................................................................................... 28-1


28-1

TSS 5 In Band Management

Overview ................................................................................................................................................................................... 28-3


28-3

T-MPLS Subnetwork topology .......................................................................................................................................... 28-4


28-4

In-band configuration ........................................................................................................................................................... 28-8


28-8

Resources reservation for In fiber Inband ................................................................................................................... 28-11


28-11

Ethernet Linear Protection

Overview ................................................................................................................................................................................. 28-16


28-16

Link Over EVC ..................................................................................................................................................................... 28-18


28-18

Link over EVC: unlock EVC .......................................................................................................................................... 28-20


28-20

Link over EVC creation ..................................................................................................................................................... 28-22


28-22

Link over EVC deletion ..................................................................................................................................................... 28-24


28-24

Link over EVC: Alarms ..................................................................................................................................................... 28-25


28-25

Link over EVC: OAM ........................................................................................................................................................ 28-26


28-26

....................................................................................................................................................................................................................................
xl 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Contents

....................................................................................................................................................................................................................................
Link over EVC: assign and deassign ............................................................................................................................ 28-27
28-27

Link over EVC: Transport Link configuration .......................................................................................................... 28-28


28-28

Link over EVC: activation and deactivation .............................................................................................................. 28-29


28-29

Link over EVC: Usage within an EVC ....................................................................................................................... 28-30


28-30

Link over EVC: AAR ......................................................................................................................................................... 28-31


28-31

Link over EVC: Routing Display .................................................................................................................................. 28-32


28-32

Link over EVC: Inventory ................................................................................................................................................ 28-33


28-33

Ethernet Linear Protection (ELP) .................................................................................................................................. 28-34


28-34

Add protection to PB EVC ............................................................................................................................................... 28-39


28-39

Remove protection from EVC ........................................................................................................................................ 28-41


28-41

Configure protection ........................................................................................................................................................... 28-42


28-42

ELP Protection properties ................................................................................................................................................ 28-43


28-43

Description of the properties ........................................................................................................................................... 28-44


28-44

Send APS command to protection group .................................................................................................................... 28-45


28-45

Manual alignment of protection group ......................................................................................................................... 28-47


28-47

Implement a protected EVC ............................................................................................................................................. 28-48


28-48

Deimplement a protected EVC ....................................................................................................................................... 28-49


28-49

Disabled operations ............................................................................................................................................................. 28-50


28-50

Alarm propagation for protected EVCs ....................................................................................................................... 28-51


28-51

OAM on protected EVC .................................................................................................................................................... 28-52


28-52

Inventory of Transport Link from protected EVC ................................................................................................... 28-54


28-54

Inventory of MA from protected EVC ......................................................................................................................... 28-55


28-55

Routing Display of protected EVC ............................................................................................................................... 28-56


28-56

A Use script changeNeShOperatorLabel.sh

Use the script changeNeShOperatorLabel.sh to change NEShOperator ............................................................ A-1


A-1

B Application Limits

Limits ............................................................................................................................................................................................ B-1


B-1

....................................................................................................................................................................................................................................
1350 OMS xli
8DG42227DAAA 9.6
Issue 3 December 2012
Contents

....................................................................................................................................................................................................................................
C List of Abbreviations

Abbreviations ............................................................................................................................................................................ C-1


C-1

Index

....................................................................................................................................................................................................................................
xlii 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
List of tables

11-1 EVPL /ETS and ETB Provider Bridge .......................................................................................................... 11-16

11-2 EVPL /ETB Virtual Bridge ............................................................................................................................... 11-16

11-3 EVPL /ETB MAC Bridge .................................................................................................................................. 11-16

11-4 EPTL /ETS .............................................................................................................................................................. 11-17


11-17

11-5 EPTL /ETB Provider Bridge ............................................................................................................................. 11-17

11-6 EPTL /ETB Virtual Bridge ................................................................................................................................ 11-17

11-7 EPTL /ETB MAC Bridge .................................................................................................................................. 11-17

11-8 EPL /ETS and ETB Provider Bridge ............................................................................................................. 11-18

11-9 EPL /ETB Virtual Bridge ................................................................................................................................... 11-18

11-10 EPL /ETB MAC Bridge ..................................................................................................................................... 11-18

11-11 EVPLAN /ETS and ETB Provider Bridge .................................................................................................. 11-19

11-12 EVPLAN /ETB Virtual Bridge ........................................................................................................................ 11-19

11-13 EVPLAN /ETB MAC Bridge .......................................................................................................................... 11-19

11-14 Extended EVPL /ETS and ETB Provider Bridge ...................................................................................... 11-20

11-15 Extended EVPL /ETB Virtual Bridge ........................................................................................................... 11-20

11-16 Extended EVPL /ETB MAC Bridge .............................................................................................................. 11-20

11-17 Extended EVPLAN /ETS and ETB Provider Bridge .............................................................................. 11-21

11-18 Extended EVPLAN /ETB Virtual Bridge .................................................................................................... 11-21

11-19 Extended EVPLAN /ETB MAC Bridge ...................................................................................................... 11-21

11-20 HSI /ETS and ETB Provider Bridge .............................................................................................................. 11-22

11-21 HSI /ETS Multicast .............................................................................................................................................. 11-23


11-23

11-22 HSI /ETB Virtual Bridge .................................................................................................................................... 11-23

....................................................................................................................................................................................................................................
1350 OMS xliii
8DG42227DAAA 9.6
Issue 3 December 2012
List of tables

....................................................................................................................................................................................................................................
11-23 HSI /ETB MAC Bridge ...................................................................................................................................... 11-23

11-24 BTV /ETS Multicast ............................................................................................................................................ 11-24


11-24

11-25 BTV /ETB Provider Bridge .............................................................................................................................. 11-24

11-26 BTV /ETB Virtual Bridge .................................................................................................................................. 11-25

11-27 BTV /ETB MAC Bridge .................................................................................................................................... 11-25

11-28 Broadcast /ETS ...................................................................................................................................................... 11-26


11-26

11-29 Broadcast /ETB Provider Bridge .................................................................................................................... 11-26

11-30 Broadcast /ETB Virtual Bridge ........................................................................................................................ 11-26

11-31 Broadcast /ETB MAC Bridge .......................................................................................................................... 11-26

13-1 Network Elements supporting the Link Aggregation ............................................................................ 13-114

15-1 MPLS traffic contract and traffic parameter dependencies ..................................................................... 15-8

15-2 ISA boards and MPLS traffic parameter dependencies ............................................................................ 15-8

18-1 Connection Oriented Service Type relations ............................................................................................. 18-40

18-2 Class of services and traffic parameters dependencies ......................................................................... 18-142

18-3 ISA boards and Ethernet traffic parameters dependencies .................................................................. 18-143

18-4 Allowed combination of Traffic Classification criteria ........................................................................ 18-156

19-1 L2 Control Protocols ........................................................................................................................................... 19-16

19-2 Service Type, Type, Resource Sharing relations ....................................................................................... 19-49

22-1 ISA E/FE/GE alarms .............................................................................................................................................. 22-3


22-3

22-2 ISA ES1/4 alarms or events ................................................................................................................................. 22-4

22-3 ISA ES16 alarms or events .................................................................................................................................. 22-6

22-4 SDH Path Alarm management ........................................................................................................................... 22-8

24-1 Terminology Mapping ........................................................................................................................................... 24-4

25-1 Allowed interface type, depending on link technology .......................................................................... 25-25

25-2 Relation between CES transport type and encapsulation type ............................................................. 25-29

25-3 CoS supported vs. T-MPLS PHB Profile ..................................................................................................... 25-29

25-4 E1 service bandwidth occupation for MPR R1.3/R1.4 ........................................................................... 25-34

25-5 E1 service bandwidth occupation since MPR R2.1 ................................................................................. 25-35

25-6 MEF8 CES termination alarms ........................................................................................................................ 25-46


....................................................................................................................................................................................................................................
xliv 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
List of tables

....................................................................................................................................................................................................................................
25-7 SATOP CES termination alarms ..................................................................................................................... 25-48

25-8 Generic Tunnel attributes. ................................................................................................................................. 25-55

25-9 Packet Radio Tunnel attributes ........................................................................................................................ 25-56

25-10 Generic Tunnel segment attributes ................................................................................................................. 25-56

25-11 Generic Tunnel Xconn attributes .................................................................................................................... 25-57

25-12 CE transport link attributes ............................................................................................................................... 25-74

25-13 9500MPR PDH port attributes ......................................................................................................................... 25-79

25-14 TSS-5C PDH port attributes ............................................................................................................................. 25-80

25-15 The CES port attributes ...................................................................................................................................... 25-86

25-16 Ethernet port attributes ....................................................................................................................................... 25-88


25-88

25-17 Link over radio attributes ................................................................................................................................... 25-91

25-18 Link over radio attributes ................................................................................................................................... 25-93

25-19 radio port properties ............................................................................................................................................. 25-98

25-20 radio port properties .......................................................................................................................................... 25-100

25-21 Generic CES attributes ..................................................................................................................................... 25-108

25-22 MEF8 CES attributes ........................................................................................................................................ 25-109

25-23 SATOP CES attributes ...................................................................................................................................... 25-110

25-24 Generic CES termination attributes ............................................................................................................. 25-115

25-25 MEF8 CES termination attributes ................................................................................................................ 25-116

25-26 SATOP CES termination attributes .............................................................................................................. 25-117

28-1 EVC attributes for ELP ...................................................................................................................................... 28-36

B-1 Limits for Subnetworks .......................................................................................................................................... B-1

B-2 Limits for Service Nodes ....................................................................................................................................... B-1

B-3 Limits for Domains .................................................................................................................................................. B-1


B-1

B-4 Limits for NEs ........................................................................................................................................................... B-1


B-1

B-5 Limits for ENEs ........................................................................................................................................................ B-2


B-2

B-6 Limits for ETPs in an ENE ................................................................................................................................... B-2

B-7 Limits for LSPs .......................................................................................................................................................... B-2


B-2

B-8 Limits for Customers ............................................................................................................................................... B-2


B-2
....................................................................................................................................................................................................................................
1350 OMS xlv
8DG42227DAAA 9.6
Issue 3 December 2012
List of tables

....................................................................................................................................................................................................................................
B-9 Limits for Ethernet Services ................................................................................................................................. B-2

B-10 Limits for Ethernet Virtual Connections .......................................................................................................... B-2

B-11 Limits for Ethernet Transport Links .................................................................................................................. B-2

B-12 Limits for Ethernet Segments ............................................................................................................................... B-3

B-13 Limits for Ethernet edge physical ports ............................................................................................................ B-3

B-14 Limits for Ethernet Traffic Descriptors ............................................................................................................ B-3

B-15 Limits for Ethernet Traffic Classifiers .............................................................................................................. B-3

B-16 Limits for Ethernet Color Profiles ...................................................................................................................... B-3

B-17 Limits for Ethernet switches ................................................................................................................................. B-3

B-18 Limits for VLAN Types ......................................................................................................................................... B-4

B-19 Limits for MPLS Transport Links ...................................................................................................................... B-4

B-20 Limits for MPLS Traffic Descriptors ................................................................................................................ B-4

B-21 Limits for MPLS VC-LSPs ................................................................................................................................... B-4

B-22 Limits for each board .............................................................................................................................................. B-4


B-4

....................................................................................................................................................................................................................................
xlvi 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
List of figures

4-1 Process Monitoring Window ................................................................................................................................. 4-2

11-1 Global Network view ............................................................................................................................................. 11-8

11-2 Example of Bundling ........................................................................................................................................... 11-12

11-3 Example of Service Multiplexing on UNI A .............................................................................................. 11-14

11-4 Point to Point Topology ...................................................................................................................................... 11-30

11-5 Hub & spoke Topology ....................................................................................................................................... 11-32

11-6 Hub & spoke with multi level aggregation topology ............................................................................... 11-33

11-7 Full meshed topology .......................................................................................................................................... 11-34

11-8 Ring Topology ....................................................................................................................................................... 11-36


11-36

11-9 Interface description ............................................................................................................................................ 11-42


11-42

11-10 Ethernet Service delivered using different technologies ........................................................................ 11-45

11-11 Inner ENE ................................................................................................................................................................ 11-49


11-49

11-12 Customer Edge ....................................................................................................................................................... 11-50


11-50

11-13 Ethernet Frame Format ....................................................................................................................................... 11-54

11-14 Q-Tag Prefix Format ............................................................................................................................................ 11-55

11-15 Ethernet Frame Hierarchy ................................................................................................................................. 11-56

11-16 Customer VLAN Removal ................................................................................................................................ 11-59

11-17 Provider VLAN Removal .................................................................................................................................. 11-60

11-18 Provider VLAN Addition ................................................................................................................................... 11-60

11-19 Provider VLAN Addition and Removal ....................................................................................................... 11-61

11-20 Provider Tunneling Mode .................................................................................................................................. 11-61

11-21 Customer Tunneling Mode ................................................................................................................................ 11-62

....................................................................................................................................................................................................................................
1350 OMS xlvii
8DG42227DAAA 9.6
Issue 3 December 2012
List of figures

....................................................................................................................................................................................................................................
11-22 Protocol Type configuration for multiple destinations ............................................................................ 11-63

11-23 Low Cost solution ................................................................................................................................................. 11-63


11-63

11-24 Protocol Type configuration for single destination .................................................................................. 11-64

12-1 Actions>Create Subnetwork ............................................................................................................................... 12-4

12-2 Create Subnetwork box ......................................................................................................................................... 12-5

12-3 Create Subnetwork: Assign Children Nodes ................................................................................................. 12-6

12-4 Node to assign to subnetwork ............................................................................................................................. 12-7

12-5 Confirm subnetwork creation ............................................................................................................................. 12-8

12-6 Subnetwork present in the map .......................................................................................................................... 12-9

12-7 Actions>Modify subnetwork ............................................................................................................................ 12-10

12-8 Modify subnetwork .............................................................................................................................................. 12-11

12-9 Select the node to add ......................................................................................................................................... 12-12

12-10 Modify subn: adding a node ............................................................................................................................. 12-13

12-11 Actions>Physical>Create External Network .............................................................................................. 12-14

12-12 Create Ext Netw. dialog box ............................................................................................................................. 12-15

12-13 Actions>Modify subnetwork ............................................................................................................................ 12-16

12-14 Modify subnetwork .............................................................................................................................................. 12-17

12-15 Modify Subn box: new added node ............................................................................................................... 12-18

12-16 New added node in the target map ................................................................................................................. 12-19

12-17 Create>Physical Connection ............................................................................................................................ 12-20

12-18 Physcon create ....................................................................................................................................................... 12-21


12-21

12-19 Physcon create: port selection .......................................................................................................................... 12-22

12-20 Physcon list: Eth physcon defined .................................................................................................................. 12-23

12-21 Link over Cable list .............................................................................................................................................. 12-23


12-23

12-22 Actions>Packet>Construction>Create LAG Port ..................................................................................... 12-24

12-23 Create LAG Port ................................................................................................................................................... 12-25


12-25

12-24 LAG port and LAG port detail ........................................................................................................................ 12-26

12-25 Actions>Packet>Construction>Create Domain ........................................................................................ 12-27

12-26 Create Domain MAC-802.1D .......................................................................................................................... 12-28

....................................................................................................................................................................................................................................
xlviii 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
List of figures

....................................................................................................................................................................................................................................
12-27 Create Domain ....................................................................................................................................................... 12-29
12-29

12-28 Search>Packet>Construction>Domains ...................................................................................................... 12-29

12-29 Domain list .............................................................................................................................................................. 12-30


12-30

12-30 Search>Packet>Construction>Network Elements>Defined NEs ....................................................... 12-31

12-31 NE: Search>Ethernet Physical Ports ............................................................................................................. 12-32

12-32 Eth Ports: the port is now busy ........................................................................................................................ 12-32

12-33 LoC: Actions>Assign Resources to Domain .............................................................................................. 12-33

12-34 Assign Resources to Domain ........................................................................................................................... 12-34

12-35 Defined NEs list .................................................................................................................................................... 12-35


12-35

12-36 Port Administrative state=DOWN .................................................................................................................. 12-36

12-37 Actions>Packet>Construction>Define Network Element ..................................................................... 12-37

12-38 Define Network Element ................................................................................................................................... 12-38

12-39 Actions>Packet>Services>Create Traffic Descriptor .............................................................................. 12-40

12-40 Create Traffic Descriptor:Regulated .............................................................................................................. 12-41

12-41 Create Traffic Descriptor: Best Effort ........................................................................................................... 12-42

12-42 Actions>Packet>Services>Create Traffic Classifier ............................................................................... 12-43

12-43 Create Traffic Classifier ..................................................................................................................................... 12-44


12-44

12-44 Traffic Classifier list ............................................................................................................................................ 12-45


12-45

12-45 Create T-MPLS Tunnel step1 ........................................................................................................................... 12-47

12-46 Create T-MPLS Tunnel step2 ........................................................................................................................... 12-48

12-47 Tunnel list ................................................................................................................................................................ 12-49


12-49

12-48 Tunnel:Search>T-MPLS Segments ................................................................................................................ 12-49

12-49 T-MPLS segment:Search>T-MPLS L2 Encapsulation Profiles ........................................................... 12-50

12-50 Default L2 Encapsulation profile .................................................................................................................... 12-50

12-51 Actions>Packet>T-MPLS>Create T-MPLS L2 Encapsulation Profile ............................................. 12-51

12-52 Create T-MPLS L2 Encapsulation Profile ................................................................................................... 12-52

12-53 L2 Encapsulation Profiles list .......................................................................................................................... 12-53

12-54 T-MPLS Segment: Actions>Configure ......................................................................................................... 12-53

12-55 T-MPLS Segment configuration ..................................................................................................................... 12-54

....................................................................................................................................................................................................................................
1350 OMS xlix
8DG42227DAAA 9.6
Issue 3 December 2012
List of figures

....................................................................................................................................................................................................................................
12-56 Segment:Search>T-MPLS L2 Encapsulation Profiles ............................................................................ 12-55

12-57 L2 Encapsulation Profiles list .......................................................................................................................... 12-55

12-58 Create T-MPLS Pseudo Wire ........................................................................................................................... 12-56

12-59 Create T-MPLS PW step2 ................................................................................................................................. 12-57

12-60 PW list ...................................................................................................................................................................... 12-57


12-57

12-61 PW: Search>T-MPLS Segments ..................................................................................................................... 12-58

12-62 PW segment: Actions>Configur ..................................................................................................................... 12-58

12-63 T-MPLS Segment configuration box for PW ............................................................................................. 12-59

12-64 T-MPLS L2 Encapsulation Profiles for PW ............................................................................................... 12-59

12-65 Provider network operating as a distributed MAC Bridge .................................................................... 12-67

12-66 Provider network operating as a distributed MAC Bridge .................................................................... 12-68

12-67 Single-Customer, No-VLAN, RSTP-enabled ............................................................................................ 12-69

13-1 Subnetwork levels ................................................................................................................................................... 13-5


13-5

13-2 Subnetwork Creation window ............................................................................................................................ 13-9

13-3 Subnetwork Modification window ................................................................................................................. 13-11

13-4 Domain management chain ............................................................................................................................... 13-16

13-5 Domain management chain ............................................................................................................................... 13-18

13-6 Define a Network Element ................................................................................................................................ 13-44

13-7 NE Adding window ............................................................................................................................................. 13-47

13-8 Network Element Modification window ...................................................................................................... 13-50

13-9 Show Equipment View ....................................................................................................................................... 13-71

13-10 ENE management chain ..................................................................................................................................... 13-79

13-11 External Network Element Creation window ............................................................................................ 13-83

13-12 ETP Creation window ......................................................................................................................................... 13-93

13-13 Ethernet Physical Port Config. window (for PR EA or ES16 electrical board) .......................... 13-101

13-14 Ethernet Physical Port Config. window (for ES1 or ES4 electrical board) .................................. 13-102

13-15 Ethernet Physical Port Config. window (for ES1 or ES4 optical board) ....................................... 13-103

13-16 Ethernet Physical Port Assign NAD window .......................................................................................... 13-107

13-17 Scheme of a Link Aggregation ...................................................................................................................... 13-114

....................................................................................................................................................................................................................................
l 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
List of figures

....................................................................................................................................................................................................................................
13-18 Jumbo frame configuration pattern .............................................................................................................. 13-135

13-19 Jumbo frame configuration pattern .............................................................................................................. 13-138

13-20 Create a port on 1678MCC NE ..................................................................................................................... 13-142

13-21 Remove port on 1678MCC NE ..................................................................................................................... 13-144

14-1 Link Over TDM between Q3 NEs .................................................................................................................... 14-6

14-2 Link Over TDM between Q3 NE and SNMP NE ....................................................................................... 14-6

14-3 Link Over TDM between 2 SNMP NEs ......................................................................................................... 14-7

14-4 Link Over Cable between SNMP NE and ENE ........................................................................................... 14-8

14-5 Link Over MPLS between 2 SNMP NEs ....................................................................................................... 14-9

14-6 Link Over MPLS between SNMP NE and ENE based on VC-LSP .................................................. 14-10

14-7 Network Element Supervision: Concatenated VC management ......................................................... 14-11

14-8 SDH Path Creation window .............................................................................................................................. 14-22

14-9 Link Over TDM Configuration window ...................................................................................................... 14-26

14-10 Assign NAD window .......................................................................................................................................... 14-33

14-11 Link Over Cable Modification window ....................................................................................................... 14-45

14-12 Link Over Cable Extremities window .......................................................................................................... 14-49

14-13 Start Join window ................................................................................................................................................. 14-53


14-53

14-14 Configure Split window ..................................................................................................................................... 14-55

14-15 Link Over Cable Creation window ................................................................................................................ 14-64

14-16 Link Over Cable Creation window ................................................................................................................ 14-67

14-17 Link VCG Creation window ............................................................................................................................. 14-70

14-18 LAG Link VCG Creation window ................................................................................................................. 14-73

15-1 Traffic Descriptor management chain ............................................................................................................. 15-5

15-2 Traffic Descriptor Creation window .............................................................................................................. 15-10

15-3 Traffic Descriptor Modification window ..................................................................................................... 15-13

15-4 MPLS Transport Link management chain ................................................................................................... 15-22

15-5 TL Characteristic Definition window (based on Link Over Cable) ................................................... 15-26

15-6 TL Characteristic Definition window (based on Link Over TDM) .................................................... 15-27

15-7 Transport Link Extremities window .............................................................................................................. 15-29

....................................................................................................................................................................................................................................
1350 OMS li
8DG42227DAAA 9.6
Issue 3 December 2012
List of figures

....................................................................................................................................................................................................................................
15-8 Transport Link Over TDM Bandwidth Load window ............................................................................ 15-34

15-9 Transport Link Over Cable Bandwidth Load window ............................................................................ 15-35

15-10 Transport Link Inventory List window ......................................................................................................... 15-37

15-11 27 LSP Tunnel management chain ................................................................................................................. 15-40

15-12 LSP Tunnel Modification window (for an LSP tunnel defined) .......................................................... 15-46

15-13 Constraint List related to an LSP tunnel ...................................................................................................... 15-54

15-14 Add Constraint to an LSP tunnel window ................................................................................................... 15-57

15-15 LSP Tunnel Constraint Properties window ................................................................................................. 15-61

15-16 LSP Tunnel Implementation window ............................................................................................................ 15-66

15-17 The LSP Tunnel Extremity window .............................................................................................................. 15-68

15-18 LSP Tunnel (Best Effort) Bandwidth Load window ................................................................................ 15-75

15-19 LSP Tunnel (Assured Forwarding) Bandwidth Load window ............................................................. 15-75

15-20 LSP Tunnel (Expedited Forwarding) Bandwidth Load window ......................................................... 15-76

15-21 LSP Tunnel Route window ............................................................................................................................... 15-78

15-22 VC-LSP management chain .............................................................................................................................. 15-82

15-23 VC-LSP Creation window ................................................................................................................................. 15-87

15-24 VC-LSP Modification window ........................................................................................................................ 15-90

15-25 VC-LSP Extremities window ........................................................................................................................ 15-100

16-1 T-MPLS Transport Link management chain .............................................................................................. 16-15

16-2 Transport Link Extremities window .............................................................................................................. 16-21

16-3 Transport Link Over TDM Bandwidth Load window ............................................................................ 16-26

16-4 Transport Link Over Cable Bandwidth Load window ............................................................................ 16-27

16-5 Transport Link Inventory List window ......................................................................................................... 16-29

16-6 Layering ................................................................................................................................................................... 16-90


16-90

16-7 Tunnel entities ........................................................................................................................................................ 16-91


16-91

16-8 PW entities .............................................................................................................................................................. 16-92


16-92

16-9 DH EVPLINE infrastructure ........................................................................................................................... 16-95

16-10 Tunnel MAIN: Actions>T-MPLS Tunnel Protection Management ................................................. 16-141

16-11 T-MPLS Tunnel Protection Management .................................................................................................. 16-142


....................................................................................................................................................................................................................................
lii 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
List of figures

....................................................................................................................................................................................................................................
16-12 T-MPLS tunnel list ............................................................................................................................................ 16-143
16-143

16-13 T-MPLS tunnel: Search>Routing display ................................................................................................. 16-143

16-14 Search>Packet>T-MPLS>T-MPLS>Tunnels ........................................................................................... 16-144

16-15 T-MPLS tunnel: Actions menu ...................................................................................................................... 16-145

16-16 T-MPLS tunnel: Search>Routing display ................................................................................................. 16-146

16-17 T-MPLS Protection Group .............................................................................................................................. 16-147

16-18 Tunnel Switch: Actions .................................................................................................................................... 16-148

16-19 Tunnel:Actions>Remove Protection(keeping Main) ............................................................................ 16-149

16-20 Spare tunnel routing display ........................................................................................................................... 16-149

16-21 Don't care protection role and protection state ........................................................................................ 16-150

16-22 Main tunnel routing display ........................................................................................................................... 16-151

16-23 T-MPLS Node PHB Profile ............................................................................................................................ 16-152

16-24 T-MPLS Node Traffic Descriptor ................................................................................................................. 16-153

16-25 T-MPLS Segment ............................................................................................................................................... 16-154

16-26 T-MPLS Port ........................................................................................................................................................ 16-155


16-155

16-27 Tunnel Redundancy Reference network .................................................................................................... 16-166

17-1 Physical map ............................................................................................................................................................. 17-3


17-3

17-2 Search>Packet>Construction>Network Elements>Defined NEs ......................................................... 17-4

17-3 NE: Search>Ethernet Physical Ports ................................................................................................................ 17-4

17-4 Ethernet Physical Ports ......................................................................................................................................... 17-5


17-5

17-5 Create Physcon-basic ............................................................................................................................................. 17-6


17-6

17-6 Create Physcon: End Points ................................................................................................................................ 17-7

17-7 Physcon list ............................................................................................................................................................... 17-8


17-8

17-8 Search>Packet>Construction>Transport Links>Link over Cable ........................................................ 17-8

17-9 Link over Cable list ................................................................................................................................................ 17-9


17-9

17-10 Actions>Packet>Construction>Create Link over Cable ........................................................................... 17-9

17-11 Create Link over Cable ....................................................................................................................................... 17-10

17-12 Actions>Assign Resources to Domain ......................................................................................................... 17-11

17-13 Assign Resources to Domain box ................................................................................................................... 17-12


....................................................................................................................................................................................................................................
1350 OMS liii
8DG42227DAAA 9.6
Issue 3 December 2012
List of figures

....................................................................................................................................................................................................................................
17-14 Search>Packet>T-MPLS>T-MPLS Sections .............................................................................................. 17-13

17-15 T-MPLS Section list ............................................................................................................................................ 17-13


17-13

17-16 Actions>Packet>T-MPLS>Create T-MPLS tunnel .................................................................................. 17-14

17-17 Create T-MPLS tunnel:Constraints ................................................................................................................ 17-15

17-18 Create T-MPLS tunnel: Quality of Service ................................................................................................. 17-16

17-19 Create T-MPLS tunnel: OAM .......................................................................................................................... 17-17

17-20 Create T-MPLS tunnel: Protection ................................................................................................................. 17-18

17-21 Search>Packet>T-MPLS>T-MPLS Tunnels ............................................................................................... 17-19

17-22 Tunnel list ................................................................................................................................................................ 17-19


17-19

17-23 Actions>Implement T-MPLS Tunnel ............................................................................................................ 17-20

17-24 The tunnel is implemented ................................................................................................................................ 17-20

17-25 Actions>Packet>T-MPLS>Create T-MPLS Pseudo Wire ..................................................................... 17-21

17-26 Create T-MPLS Pseudo Wire: Constraints .................................................................................................. 17-22

17-27 Create T-MPLS Pseudo Wire: Quality of Service .................................................................................... 17-23

17-28 Search>Packet>T-MPLS>T-MPLS Pseudo Wire ..................................................................................... 17-24

17-29 T-MPLS Pseudo Wires ........................................................................................................................................ 17-24

17-30 PW Implementation ............................................................................................................................................. 17-25


17-25

17-31 T-MPLS Pseudo wire implemented ............................................................................................................... 17-25

17-32 Search>Packet>Services>T-MPLS>T-MPLS Transport Links ........................................................... 17-26

17-33 T-MPLS Transport Links ................................................................................................................................... 17-26

17-34 Actions>Packet>Services>T-MPLS>Create T-MPLS EVC ................................................................. 17-34

17-35 Create T-MPLS EVC: Specific ........................................................................................................................ 17-36

17-36 Create T-MPLS EVC: Detail ............................................................................................................................ 17-37

17-37 Create T-MPLS EVC: PM ................................................................................................................................. 17-38

17-38 Create T-MPLS EVC: Terminations Selection .......................................................................................... 17-39

17-39 Terminations Selection ....................................................................................................................................... 17-40


17-40

17-40 Termination Settings ............................................................................................................................................ 17-42


17-42

17-41 Ingress flow create ............................................................................................................................................... 17-44


17-44

17-42 Ingress Flow: create monitoring ...................................................................................................................... 17-45


....................................................................................................................................................................................................................................
liv 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
List of figures

....................................................................................................................................................................................................................................
17-43 Egress Flow: Push ................................................................................................................................................ 17-47
17-47

17-44 Create Egress monitoring .................................................................................................................................. 17-48

17-45 Create Ingress node A ......................................................................................................................................... 17-49

17-46 Create Egress node A .......................................................................................................................................... 17-50

17-47 Transport Link selection .................................................................................................................................... 17-51

17-48 Select the transport link ...................................................................................................................................... 17-52

17-49 Pseudo Wire selected ........................................................................................................................................... 17-53


17-53

17-50 T-MPLS EVC Allocate and Implement ........................................................................................................ 17-54

17-51 EVPL reference network .................................................................................................................................... 17-55

17-52 Actions>Packet>Services>Create Traffic Descriptor .............................................................................. 17-56

17-53 Create Traffic Descriptor ................................................................................................................................... 17-57

17-54 Actions>Packet>Services>T-MPLS>Create T-MPLS EVC ................................................................. 17-58

17-55 Create T-MPLS EVC: Specific ........................................................................................................................ 17-59

17-56 Terminations Selection ....................................................................................................................................... 17-61


17-61

17-57 Ingress Flow: create ............................................................................................................................................. 17-63


17-63

17-58 Egress Flow: Push ................................................................................................................................................ 17-65


17-65

17-59 Transport Link selection .................................................................................................................................... 17-67

17-60 Search>Packet>T-MPLS>T-MPLS Pseudo Wires ................................................................................... 17-68

17-61 PW list before EVC TD create ......................................................................................................................... 17-68

17-62 T-MPLS EVC Allocate and Implement ........................................................................................................ 17-69

17-63 PW list after EVC TD create ............................................................................................................................ 17-70

17-64 Search>Packet>T-MPLS>T-MPLS EVCs ................................................................................................... 17-70

17-65 EVC list: EVPL EVC allocate ......................................................................................................................... 17-71

17-66 EVC goes implemented ...................................................................................................................................... 17-71

17-67 EVPLAN reference network (3-nodes) ........................................................................................................ 17-72

17-68 EVPLAN network (4-nodes) ............................................................................................................................ 17-73

17-69 Create T-MPLS EVC: Specific ........................................................................................................................ 17-75

17-70 Terminations Selection ....................................................................................................................................... 17-77


17-77

17-71 EVPLAN: Ingress Flow: create ....................................................................................................................... 17-79


....................................................................................................................................................................................................................................
1350 OMS lv
8DG42227DAAA 9.6
Issue 3 December 2012
List of figures

....................................................................................................................................................................................................................................
17-72 EVPLAN:Egress Flow ....................................................................................................................................... 17-81

17-73 Transport Link selection .................................................................................................................................... 17-83

17-74 T-MPLS EVC Allocate and Implement ........................................................................................................ 17-84

17-75 PW list after EVC TD create ............................................................................................................................ 17-85

17-76 EVC goes implemented ...................................................................................................................................... 17-85

17-77 BTV reference network ..................................................................................................................................... 17-86

17-78 HSI reference network ....................................................................................................................................... 17-90

17-79 T-MPLS EVC list: Availability ........................................................................................................................ 17-94

17-80 EVC: Search>Fault Localization .................................................................................................................... 17-95

17-81 Navigation to Transport Section ...................................................................................................................... 17-95

17-82 Navigate to Link over Cable ............................................................................................................................. 17-96

17-83 Search>Packet>Services>T-MPLS>T-MPLS EVCs ............................................................................... 17-98

17-84 T-MPLS EVC:Actions>Deimplement .......................................................................................................... 17-99

17-85 T-MPLS EVC:Actions>Deallocate ................................................................................................................ 17-99

17-86 T-MPLS EVC: Search>T-MPLS Transport Links ................................................................................. 17-100

17-87 T-MPLS Transport Links ................................................................................................................................. 17-100

17-88 Search>Packet>T-MPLS>T-MPLS Pseudo Wires ................................................................................. 17-101

17-89 T-MPLS Pseudo Wire: Search>T-MPLS Tunnels .................................................................................. 17-102

17-90 T-MPLS Tunnel: Search>T-MPLS Protection Involved Tunnel ....................................................... 17-103

17-91 T-MPLS Tunnel Routing Display ................................................................................................................ 17-103

17-92 Tunnel spare: Actions>Remove Protection keeping Main .................................................................. 17-104

17-93 Routing Display after Remove Protection ................................................................................................ 17-104

17-94 Tunnel: Search>T-MPLS Pseudo Wires .................................................................................................... 17-105

17-95 T-MPLS EVC: Actions>Delete ..................................................................................................................... 17-105

17-96 EVC deletion evidence ..................................................................................................................................... 17-106

17-97 Pseudo Wires: Actions>Deimplement ........................................................................................................ 17-106

17-98 Pseudo Wires: Actions>Delete ...................................................................................................................... 17-107

17-99 Delete Tunnel SPARE ...................................................................................................................................... 17-107

17-100 Tunnel: Search>T-MPLS Section List ........................................................................................................ 17-108


....................................................................................................................................................................................................................................
lvi 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
List of figures

....................................................................................................................................................................................................................................
17-101 Tunnel related Section ...................................................................................................................................... 17-108

17-102 Delete T-MPLS tunnel ...................................................................................................................................... 17-109

17-103 Tunnel deletion evidence ................................................................................................................................. 17-109

17-104 Deassign LoC from Domain .......................................................................................................................... 17-110

17-105 Field Domain is deleted ................................................................................................................................... 17-110

17-106 The associated Section is automatically deleted ..................................................................................... 17-111

17-107 Defined Node: Search>Ethernet Physical Ports ...................................................................................... 17-111

17-108 Deassign UNI port from the domain ........................................................................................................... 17-112

17-109 Field domain is empty ...................................................................................................................................... 17-112

17-110 Delete the NE ....................................................................................................................................................... 17-113


17-113

17-111 Search>Packet>Services>T-MPLS>T-MPLS EVCs ............................................................................. 17-114

17-112 T-MPLS EVCs .................................................................................................................................................... 17-115


17-115

17-113 Allocate the EVC ................................................................................................................................................ 17-115


17-115

17-114 Implement the EVC ........................................................................................................................................... 17-116


17-116

18-1 Ethernet service containment tree ................................................................................................................... 18-19

18-2 EVPL/EPTL/EPL/Extended EVPL service creation wizard ................................................................ 18-26

18-3 Ethernet Service Properties window .............................................................................................................. 18-34

18-4 EVCs and Edge Ports relationships ............................................................................................................... 18-38

18-5 EVC Modification window ............................................................................................................................... 18-48

18-6 EVC Properties window ..................................................................................................................................... 18-52

18-7 EVC Termination Properties window ........................................................................................................... 18-64

18-8 Add EVC Termination window ....................................................................................................................... 18-67

18-9 Network schema for E2E connection ............................................................................................................ 18-91

18-10 Search>Packet>Construction>Transport Links>Links over TDM(Sdh/Sonet) ............................. 18-93

18-11 Links over TDM(Sdh/Sonet) ............................................................................................................................ 18-94

18-12 Search>Packet>Construction>Network Elements>Defined NEs ....................................................... 18-94

18-13 Defined NE:Search>Ethernet Physical Ports ............................................................................................. 18-95

18-14 Port:Actions>Assign Resource to Domain ................................................................................................. 18-95

18-15 ETS Domain selection ........................................................................................................................................ 18-96

....................................................................................................................................................................................................................................
1350 OMS lvii
8DG42227DAAA 9.6
Issue 3 December 2012
List of figures

....................................................................................................................................................................................................................................
18-16 Assign port to ETS domain ............................................................................................................................... 18-97

18-17 Link over TDM (path): Actions>Assign Resources to Domain .......................................................... 18-98

18-18 Select ETS domain ............................................................................................................................................... 18-98


18-98

18-19 Confirm the assignment ..................................................................................................................................... 18-99

18-20 Search>Packet>Services>Connection Oriented>ETS Transport Link ........................................... 18-100

18-21 Path commissioning .......................................................................................................................................... 18-100

18-22 Path included in the Links over TDM ........................................................................................................ 18-101

18-23 Transport Links ................................................................................................................................................... 18-101


18-101

18-24 Port: Assign resources to Domain ................................................................................................................ 18-103

18-25 Assign resources to Domain ........................................................................................................................... 18-104

18-26 Search>Packet>Services>T-MPLS>T-MPLS Edge Ports ................................................................... 18-105

18-27 UNI ports became edge ports ........................................................................................................................ 18-105

18-28 Actions>Packet>Services>Connection Oriented(ETS)>Create EVC ............................................ 18-106

18-29 EVC over SDH: EVC definition .................................................................................................................. 18-107

18-30 Far end edge port selection ............................................................................................................................. 18-108

18-31 Ethernet Segments definition ......................................................................................................................... 18-109

18-32 Search>Packet>Services>Connection Oriented(ETS) ......................................................................... 18-110

18-33 ETS EVCs ............................................................................................................................................................. 18-110


18-110

18-34 ETS EVC: Search>Ethernet Segments ....................................................................................................... 18-111

18-35 Ethernet segment list ......................................................................................................................................... 18-111


18-111

18-36 Actions>Add Constraints to an Ethernet Service ................................................................................... 18-112

18-37 Add Constraints to an Ethernet Service ..................................................................................................... 18-113

18-38 Segment:Actions>Associate to Traffic Classifier ................................................................................... 18-114

18-39 Traffic Classifier list .......................................................................................................................................... 18-114


18-114

18-40 Associate Traffic Classifier ............................................................................................................................. 18-115

18-41 Allocate the segment ......................................................................................................................................... 18-116


18-116

18-42 Implement the segment .................................................................................................................................... 18-116

18-43 Both segments are implemented ................................................................................................................... 18-117

18-44 EVC-ETS implemented ................................................................................................................................... 18-117

....................................................................................................................................................................................................................................
lviii 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
List of figures

....................................................................................................................................................................................................................................
18-45 T-MPLS EVC list: Availability ..................................................................................................................... 18-118

18-46 EVC: Search>Fault Localization .................................................................................................................. 18-119

18-47 Navigation to Transport Section ................................................................................................................... 18-119

18-48 Navigate to Link over Cable .......................................................................................................................... 18-120

18-49 Create Domain .................................................................................................................................................... 18-123


18-123

18-50 Define NE ............................................................................................................................................................. 18-124


18-124

18-51 Create EVC .......................................................................................................................................................... 18-125


18-125

18-52 Align Up window ............................................................................................................................................... 18-127

18-53 Enable Takeover ................................................................................................................................................. 18-128


18-128

18-54 Color Profile Modification window ............................................................................................................ 18-137

18-55 Color Profile Properties window .................................................................................................................. 18-141

18-56 Traffic Descriptor Modification window ................................................................................................... 18-150

18-57 Traffic Descriptor (Ethernet Management) Properties window ........................................................ 18-154

18-58 Traffic Classifier Modification window .................................................................................................... 18-163

18-59 Traffic Classifier Properties window .......................................................................................................... 18-166

18-60 Edge Port Modification window ................................................................................................................... 18-171

18-61 Edge Port Configuration window ................................................................................................................. 18-173

18-62 Edge Port Properties window ........................................................................................................................ 18-176

18-63 Show Equipment window ............................................................................................................................... 18-181

18-64 Transport Link Extremities window ............................................................................................................ 18-191

18-65 Transport Link Properties window .............................................................................................................. 18-194

18-66 Ethernet Segment representation .................................................................................................................. 18-197

18-67 Ethernet Segment representation .................................................................................................................. 18-200

18-68 Ethernet Segment Modification window ................................................................................................... 18-206

18-69 Traffic Classifier Association (to an Ethernet Segment) window .................................................... 18-210

18-70 Traffic Classifier disassociation (from an Ethernet Segment) window .......................................... 18-212

18-71 Add Constraint to an Ethernet Segment window (Pop) ....................................................................... 18-214

18-72 Ethernet Segment constraint properties window .................................................................................... 18-220

18-73 Constraint Modification window .................................................................................................................. 18-223


....................................................................................................................................................................................................................................
1350 OMS lix
8DG42227DAAA 9.6
Issue 3 December 2012
List of figures

....................................................................................................................................................................................................................................
18-74 Ethernet Segment Configuration window ................................................................................................. 18-234

18-75 Ethernet Segment Extremities window ...................................................................................................... 18-236

18-76 Ethernet Segment Extremity Modification window (Origin) ............................................................ 18-237

18-77 Ethernet Segment Extremity Modification window (Destination) .................................................. 18-238

18-78 Route Display - Ethernet Segment window ............................................................................................. 18-243

18-79 Connectivity view - Ethernet Segment window ..................................................................................... 18-245

18-80 VLAN Type Creation window ...................................................................................................................... 18-249

18-81 VLAN Type Modification window ............................................................................................................. 18-252

19-1 Connection Less Transport Link List ............................................................................................................ 19-28

19-2 Transport Link Configuration window ......................................................................................................... 19-32

19-3 Transport Link Extremities window .............................................................................................................. 19-35

19-4 Transport Link Properties window ................................................................................................................. 19-39

19-5 EVC Modification window (Details) ............................................................................................................ 19-54

19-6 EVC Properties window ..................................................................................................................................... 19-59

19-7 EVC Fault Localization window .................................................................................................................... 19-66

19-8 Show Equipment from EVC Fault Localization ....................................................................................... 19-67

19-9 AS window for EVC Alarms ............................................................................................................................ 19-71

19-10 Add EVC termination window (General Panel) ........................................................................................ 19-75

19-11 Add EVC termination window (Egress Flow) ........................................................................................... 19-78

19-12 Add EVC termination window (L2 Control Protocol Panel) ............................................................... 19-80

19-13 EVC Termination Configuration window .................................................................................................... 19-84

19-14 EVC Termination Properties window ........................................................................................................... 19-86

19-15 Provider Domain Configuration window .................................................................................................... 19-95

19-16 Domain Modification window ......................................................................................................................... 19-97

19-17 Network Element Configure window ........................................................................................................... 19-99

19-18 Client Type Selection ........................................................................................................................................ 19-101


19-101

19-19 Ethernet Physical Port ...................................................................................................................................... 19-102

19-20 Ethernet Physical Port Configuration window ........................................................................................ 19-103

19-21 Customer Creation window ............................................................................................................................ 19-105


....................................................................................................................................................................................................................................
lx 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
List of figures

....................................................................................................................................................................................................................................
19-22 Spanning Tree Instance Configuration window ...................................................................................... 19-122

20-1 PBB EVC provisioning ......................................................................................................................................... 20-8

20-2 Actions>Packet>Construction>Create Domain ........................................................................................ 20-12

20-3 Create PBB Domain ............................................................................................................................................ 20-13


20-13

20-4 Search>Packet>Construction>Network Elements>Available NEs .................................................... 20-14

20-5 Available NE: Actions>Define Network Element .................................................................................... 20-15

20-6 Define Network Element dialog box ............................................................................................................. 20-15

20-7 Defined NE list ...................................................................................................................................................... 20-16


20-16

20-8 Show Equipment view ....................................................................................................................................... 20-17

20-9 Show Equipment: select the termination ..................................................................................................... 20-18

20-10 Module setting ....................................................................................................................................................... 20-18


20-18

20-11 Show Equipment view of the terminating NE ........................................................................................... 20-19

20-12 Node: Actions>Physical>Synchronize>Synchronize NE ...................................................................... 20-19

20-13 Actions>Physical>Create Physical Connection ....................................................................................... 20-21

20-14 Create Physical Connection .............................................................................................................................. 20-22

20-15 Create> Physical Connection step2 ............................................................................................................... 20-23

20-16 Search>Packet>Construction>Transport Links>Links over Cable .................................................... 20-24

20-17 Links over Cable list ............................................................................................................................................ 20-25


20-25

20-18 Link over Cable: Actions>Assign Resources to Domain ....................................................................... 20-25

20-19 Assign Resources to Domain ........................................................................................................................... 20-26

20-20 Link over Cable list .............................................................................................................................................. 20-27


20-27

20-21 Link over Cable:Actions>Delete .................................................................................................................... 20-28

20-22 Physical Connection:Actions>Remove ........................................................................................................ 20-28

20-23 Actions>Packet>ERP>Create ERP Ring ..................................................................................................... 20-30

20-24 Create ERP Ring ................................................................................................................................................... 20-31


20-31

20-25 Bridge Transport Links ....................................................................................................................................... 20-32

20-26 Create ERP Ring ................................................................................................................................................... 20-33


20-33

20-27 Search>Packet>ERP>Rings ............................................................................................................................. 20-34

20-28 List of ERP Rings ................................................................................................................................................. 20-34


20-34
....................................................................................................................................................................................................................................
1350 OMS lxi
8DG42227DAAA 9.6
Issue 3 December 2012
List of figures

....................................................................................................................................................................................................................................
20-29 ERP ring: Actions>Implement ERP Ring .................................................................................................... 20-35

20-30 ERP Ring implemented ...................................................................................................................................... 20-35

20-31 ERP Ring:Search>Nodes ................................................................................................................................... 20-36

20-32 Nodes belonging to the ring .............................................................................................................................. 20-36

20-33 ERP Ring:Search>Physical Links .................................................................................................................. 20-36

20-34 Physcons belonging to the ring ........................................................................................................................ 20-37

20-35 ERP ring: Search>ERP Instances ................................................................................................................... 20-38

20-36 Search of the ERP instances ............................................................................................................................. 20-39

20-37 PBB domain:Search>ERP Instances ............................................................................................................. 20-39

20-38 Actions>Packet>ERP>Create ERP Instance .............................................................................................. 20-40

20-39 Create ERP Instance: General .......................................................................................................................... 20-41

20-40 Create ERP Instance: Timers ............................................................................................................................ 20-42

20-41 Create ERP Instance: Failures .......................................................................................................................... 20-43

20-42 Create ERP Instance ............................................................................................................................................ 20-44


20-44

20-43 ERP Instance: Actions>Implement ERP Instance .................................................................................... 20-44

20-44 Actions>Packet>Services>ConnectionLess(Bridge)>Create B-VID ................................................ 20-46

20-45 Create B-VID wizard step1 ............................................................................................................................... 20-47

20-46 B-VID:Transport Links selection ................................................................................................................... 20-48

20-47 Create B-VID ......................................................................................................................................................... 20-49


20-49

20-48 B-VID list ................................................................................................................................................................ 20-50


20-50

20-49 B-VID: Actions>Implement ............................................................................................................................. 20-50

20-50 B-VID partially implemented (few secs) ..................................................................................................... 20-51

20-51 MIP creation policy .............................................................................................................................................. 20-53


20-53

20-52 Traffic Descriptor create step1 ......................................................................................................................... 20-54

20-53 Traffic Descriptor create step2 ......................................................................................................................... 20-55

20-54 EVC Termination list ........................................................................................................................................... 20-56


20-56

20-55 Actions> Add Connection Less EVC Termination .................................................................................. 20-57

20-56 Add Connection Less EVC Termination dialog box ............................................................................... 20-58

20-57 The new termination has been added ............................................................................................................ 20-58

....................................................................................................................................................................................................................................
lxii 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
List of figures

....................................................................................................................................................................................................................................
20-58 ERP Graphical View example ....................................................................................................................... 20-128

20-59 Create PBB EVC: Termination Selection .................................................................................................. 20-146

20-60 Create PBB EVC: Termination Settings .................................................................................................... 20-147

20-61 Ingress flow create ............................................................................................................................................. 20-148


20-148

20-62 Ingress Flow: create monitoring ................................................................................................................... 20-149

20-63 Egress Flow: Push .............................................................................................................................................. 20-150

20-64 EVC Allocate and Implement ........................................................................................................................ 20-151

20-65 Search>Packet>Connection Less(Bridge)>Bridge EVC ..................................................................... 20-152

20-66 Bridge EVC list ................................................................................................................................................... 20-152


20-152

20-67 TSS160C System ID Configuration ............................................................................................................ 20-157

20-68 TSS160C System ID Configuration form ................................................................................................. 20-158

20-69 TSS160C Q LAN Configuration (Gateway NE) .................................................................................... 20-159

20-70 TSS160C Export of the Route ....................................................................................................................... 20-160

20-71 Tss160C OSI Routing Configuration .......................................................................................................... 20-161

20-72 TSS10 System ID Configuration .................................................................................................................. 20-162

20-73 TSS10 System IP Address ............................................................................................................................... 20-163

20-74 Tss10 LAN Interface Details .......................................................................................................................... 20-164

20-75 TSS160C Link Aggregation Group Management .................................................................................. 20-166

20-76 Tss160C LAG Configuration (Client Type) ............................................................................................. 20-167

20-77 Tss160C LAG Configuration (Administration State) .......................................................................... 20-168

20-78 Tss160C In Fiber In Band ............................................................................................................................... 20-169

20-79 Tss160C In Fiber In Band (OSPF) ............................................................................................................... 20-170

20-80 Tss160C In Fiber In Band Activate ............................................................................................................. 20-171

20-81 Tss160C port member of LAG ...................................................................................................................... 20-172

20-82 Tss160C port member of LAG configuration .......................................................................................... 20-173

20-83 Tss160C port member of LAG Actor ......................................................................................................... 20-174

20-84 TSS10 Link Aggregation Group Management ........................................................................................ 20-176

20-85 Tss10 Enable the In Band Management ..................................................................................................... 20-177

20-86 TSS60 In Fiber In Band Configuration ...................................................................................................... 20-178

....................................................................................................................................................................................................................................
1350 OMS lxiii
8DG42227DAAA 9.6
Issue 3 December 2012
List of figures

....................................................................................................................................................................................................................................
20-87 Tss10 portInLAG ................................................................................................................................................ 20-179

20-88 Tss10 port member of LAG configuration ................................................................................................ 20-180

20-89 Tss10_portInLAGconfigActor ...................................................................................................................... 20-181

20-90 Tss10_portInLAGadminState ........................................................................................................................ 20-182

20-91 NMS Start Supervision .................................................................................................................................... 20-183

20-92 NMS Synchronize NE ...................................................................................................................................... 20-184

20-93 NMS add Node In Map .................................................................................................................................... 20-185

20-94 NMS Create Physical Connection ................................................................................................................ 20-186

20-95 NMS Create Physical Connection wizard ................................................................................................. 20-187

20-96 NMS Define NE ................................................................................................................................................. 20-188

20-97 NMS Ethernet Physical Port list ................................................................................................................... 20-189

20-98 Create LAG Link over Cable ......................................................................................................................... 20-190

20-99 Create Link Over Cable ................................................................................................................................... 20-191

20-100 NMS Link Over LAG list ............................................................................................................................... 20-192

21-1 BTV Element management chain ..................................................................................................................... 21-5

21-2 Broadcast TV Element List window ................................................................................................................ 21-7

21-3 Broadcast TV Element Creation window ....................................................................................................... 21-9

21-4 External Network Element Modification window .................................................................................... 21-12

21-5 ETP Creation window ......................................................................................................................................... 21-21

21-6 Path on 1350 OMS SDH .................................................................................................................................... 21-25

21-7 Broadcast TV Element Creation window .................................................................................................... 21-27

21-8 Link Over TDM Broadcast TV Creation window .................................................................................... 21-30

21-9 1350 OMS SDH Path Id ..................................................................................................................................... 21-31

21-10 Create Ethernet Service ...................................................................................................................................... 21-36


21-36

21-11 EVC Any to any Creation window ................................................................................................................. 21-38

22-1 Alarm status management ................................................................................................................................. 22-10

22-2 Alarm correlation .................................................................................................................................................. 22-11


22-11

25-1 Mobile back-hauling scenario ............................................................................................................................ 25-4

25-2 Network layers in case of unterminated CE service ................................................................................... 25-5


....................................................................................................................................................................................................................................
lxiv 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
List of figures

....................................................................................................................................................................................................................................
25-3 Transport Layer representation .......................................................................................................................... 25-6

25-4 CES 9500 MPR Protection schemes ............................................................................................................. 25-10

25-5 CES Relation between CAC tolerance and modulation mode ............................................................. 25-11

25-6 Horizontal and vertical alarm correlation in Packet Radio domain ................................................... 25-17

25-7 Horizontal and vertical alarm correlation in T-MPLS domain ............................................................. 25-22

25-8 CES after join ......................................................................................................................................................... 25-28


25-28

25-9 CES after stich ....................................................................................................................................................... 25-28


25-28

25-10 CES routing display ............................................................................................................................................ 25-31

25-11 Tunnel routing display ........................................................................................................................................ 25-32

25-12 SNMP MIB relationships between E1 and PW tables ............................................................................ 25-36

26-1 Reference Network ................................................................................................................................................. 26-2


26-2

26-2 Actions>Packet>T-MPLS>Create T-MPLS tunnel .................................................................................... 26-3

26-3 Create T-MPLS tunnel ........................................................................................................................................... 26-4


26-4

26-4 Point to point Packet Ring bidir protected T-MPLS tunnel ..................................................................... 26-5

26-5 Selection of the port ............................................................................................................................................... 26-6


26-6

26-6 Select the second extremity (node) ................................................................................................................... 26-7

26-7 P2P bid prot T-MPLS tunnel: selected extremities ..................................................................................... 26-8

26-8 P2P: constraint ......................................................................................................................................................... 26-9


26-9

26-9 P2P bid prot T-MPLS tunnel: selected extremities and constraint ..................................................... 26-10

26-10 Search>Packet>T-MPLS>T-MPLS Tunnels ............................................................................................... 26-11

26-11 Tunnel list ................................................................................................................................................................ 26-12


26-12

26-12 Actions>Implement T-MPLS Tunnel ............................................................................................................ 26-12

26-13 The tunnel is implemented ................................................................................................................................ 26-13

26-14 Actions>Packet>T-MPLS>Create T-MPLS Pseudo Wire ..................................................................... 26-14

26-15 Create T-MPLS Pseudo Wire ........................................................................................................................... 26-15

26-16 Point to Point Bidirectional T-MPLS PW .................................................................................................... 26-17

26-17 Search>Packet>T-MPLS>T-MPLS Pseudo Wire ..................................................................................... 26-18

26-18 T-MPLS Pseudo Wires ........................................................................................................................................ 26-18

26-19 PW Implementation ............................................................................................................................................. 26-19


26-19
....................................................................................................................................................................................................................................
1350 OMS lxv
8DG42227DAAA 9.6
Issue 3 December 2012
List of figures

....................................................................................................................................................................................................................................
26-20 T-MPLS Pseudo wire implemented ............................................................................................................... 26-19

26-21 Reference Network .............................................................................................................................................. 26-21


26-21

26-22 Actions>Packet>T-MPLS>Create T-MPLS tunnel .................................................................................. 26-22

26-23 Create T-MPLS tunnel ........................................................................................................................................ 26-23

26-24 Point to point Packet Ring bidir protected T-MPLS tunnel open sink .............................................. 26-24

26-25 Selection of the port ............................................................................................................................................. 26-25


26-25

26-26 Select the second extremity (node) ................................................................................................................ 26-26

26-27 P2P bid prot T-MPLS tunnel open sink: selected extremities .............................................................. 26-27

26-28 P2P open sink: constraint ................................................................................................................................... 26-28

26-29 P2P bid prot T-MPLS tunnel open sink: selected extremities and constraint ................................. 26-29

26-30 Search>Packet>T-MPLS>T-MPLS Tunnels ............................................................................................... 26-30

26-31 Tunnel list ................................................................................................................................................................ 26-31


26-31

26-32 Actions>Implement T-MPLS Tunnel ............................................................................................................ 26-31

26-33 The tunnel is implemented ................................................................................................................................ 26-32

26-34 Actions>Packet>T-MPLS>Create T-MPLS Pseudo Wire ..................................................................... 26-33

26-35 Create T-MPLS Pseudo Wire ........................................................................................................................... 26-34

26-36 Dual Point to Point Bidirectional T-MPLS PW ......................................................................................... 26-36

26-37 Search>Packet>T-MPLS>T-MPLS Pseudo Wire ..................................................................................... 26-37

26-38 T-MPLS Pseudo Wires ........................................................................................................................................ 26-37

26-39 PW Implementation ............................................................................................................................................. 26-38


26-38

26-40 T-MPLS Pseudo wire implemented ............................................................................................................... 26-38

26-41 Actions>Packet>Services>T-MPLS>Create T-MPLS EVC ................................................................. 26-40

26-42 Create T-MPLS EVC: Specific ........................................................................................................................ 26-42

26-43 Create T-MPLS EVC: Terminations Selection .......................................................................................... 26-43

26-44 Terminations Selection ....................................................................................................................................... 26-44


26-44

26-45 Termination Settings ............................................................................................................................................ 26-46


26-46

26-46 Ingress flow create ............................................................................................................................................... 26-48


26-48

26-47 Ingress Flow: create monitoring ...................................................................................................................... 26-49

26-48 Egress Flow: Push ................................................................................................................................................ 26-51


26-51
....................................................................................................................................................................................................................................
lxvi 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
List of figures

....................................................................................................................................................................................................................................
26-49 Create Egress monitoring .................................................................................................................................. 26-52

26-50 Spoke Transport Link selection ....................................................................................................................... 26-53

26-51 Create Ingress node A ......................................................................................................................................... 26-54

26-52 Create Egress node A .......................................................................................................................................... 26-55

26-53 Select the transport link ...................................................................................................................................... 26-56

26-54 T-MPLS EVC Allocate and Implement ........................................................................................................ 26-57

26-55 Search>Packet>Services>T-MPLS>T-MPLS EVCs ............................................................................... 26-58

26-56 T-MPLS EVCs ....................................................................................................................................................... 26-59


26-59

26-57 Allocate the EVC .................................................................................................................................................. 26-59


26-59

26-58 EVC implemented ................................................................................................................................................ 26-59


26-59

27-1 EVC definition: PM folder .................................................................................................................................. 27-3

27-2 EVC definition: PM policy .................................................................................................................................. 27-4

27-3 Create Measure ........................................................................................................................................................ 27-5


27-5

27-4 Measure: Actions menu options ......................................................................................................................... 27-7

27-5 Search>PM>PM domains .................................................................................................................................... 27-8

27-6 Ethernet domain: Search menu .......................................................................................................................... 27-8

27-7 Ethernet domain: Actions menu ......................................................................................................................... 27-9

27-8 PM transport: Actions menu ............................................................................................................................... 27-9

27-9 PM TP list ................................................................................................................................................................ 27-10


27-10

27-10 Start TP dialog box ............................................................................................................................................... 27-10

27-11 Stop TP dialog box ............................................................................................................................................... 27-11

27-12 Measure consistency ............................................................................................................................................ 27-13


27-13

27-13 NE: Actions>Generate Audit ............................................................................................................................ 27-13

27-14 Generate Audit ....................................................................................................................................................... 27-14


27-14

27-15 Create Report Profile ........................................................................................................................................... 27-16


27-16

27-16 Correlation Measure with Report Profile ..................................................................................................... 27-17

27-17 Uncorrelation Measure with Report Profile ................................................................................................ 27-18

27-18 PM TP Actions menu .......................................................................................................................................... 27-19

27-19 Export TPs to CSV file ....................................................................................................................................... 27-20

....................................................................................................................................................................................................................................
1350 OMS lxvii
8DG42227DAAA 9.6
Issue 3 December 2012
List of figures

....................................................................................................................................................................................................................................
27-20 Generate Measure PM Report to CSV file .................................................................................................. 27-21

27-21 Generate PM tabular report ............................................................................................................................... 27-22

28-1 TSS-5 interworking with TSS160/320 ............................................................................................................ 28-8

28-2 Create Domain ....................................................................................................................................................... 28-13


28-13

28-3 Define NE ................................................................................................................................................................ 28-14


28-14

....................................................................................................................................................................................................................................
lxviii 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
About this document
About this document

Purpose
This preface provides information about how to use this document, which is the 1350
OMS PKT Guide.
The purpose of the 1350 OMS PKT Guide is to explain the administration and
provisioning features of the 1350 OMS PKT application for the 1350 OMS 9.6 release.
This document describes how to use, administer, and maintain the 1350 OMS PKT
application for configuring and for monitoring Ethernet or MPLS networks.

Reason for reissue


This document has been reissued to support the 1350 OMS 9.6.
The revision history of this document is shown in the following table:

Location Revision Issue


1350 OMS PKT Guide Document reflects the changes made to the Issue 2, May
1350 OMS release 9.6. 2012
1350 OMS PKT Guide Document changes reflect the new 9.6 release Issue 1, March
of the 1350 OMS. 2012

Safety information
This document does not contain any safety information (cautions or warnings) because
the 1350 OMS is a software product.
Important! When working with any hardware that is associated with any piece of
software, always refer to the safety information that the hardware manufacturer
provides for that particular piece of hardware. For example, when working with an
HP ® server, refer to safety information that is provided in the HP ® documentation for
that server. When working with any Alcatel-Lucent network element, refer to safety
information that is provided in the Alcatel-Lucent documentation for that particular
NE.

...................................................................................................................................................................................................................................
1350 OMS lxix
8DG42227DAAA 9.6
Issue 3 December 2012
About this document

....................................................................................................................................................................................................................................
Intended audience
The 1350 OMS PKT Guide is written primarily for the advanced users of the 1350 OMS,
who typically are systems engineers, programmers, and system administrators who must
configure and monitor Ethernet or MPLS networks. This document can be used by
anyone who needs specific administration or provisioning information about the features,
applications, and operations of the 1350 OMS PKT component of the 1350 OMS. These
people are you, its users.
The 1350 OMS PKT Guide assumes that the user is familiar with the function of
telecommunication networks and has had some exposure to the X.org Foundation
X-Window ® and Microsoft Windows ® environments.

How to use this information product


Conceptual and task content
In the broadest sense, this document contains the following types of content:
• Conceptual content, which is background information, is given so users can better
understand the tasks that must be performed. The presentation of conceptual
information varies according to the topic being explained—sections, subsections,
tables, figures, and screen captures can be commonly found.
• Task content, which includes step-by-step instructions, is provided so users can
administer, provision, and maintain the system. The task information is typically
presented as series of tasks that follows the conceptual information.
The conceptual information complements and enhances the step-by-step instructions that
are found in each task. To optimize the use of the conceptual and task content, users
should consider the following:
• The conceptual information should be used to broaden your general knowledge of the
network management system. It is best if you read all conceptual information and
have a good understanding of the concepts being presented before undertaking the
step-by-step instructions given in any task.
• The conceptual and task portions of the document have extensive hyperlinks. Use
these links to toggle between the two types of information presented so you can
access all pertinent information related to particular concepts and tasks.
• The task information is based on a user needs analysis that has been performed for
each management system user job; therefore, use the task information to get the job at
hand done quickly and with minimal system impact.
Format of task content
Each task consists of sections that are called When to use, Related information, Before
you begin, and Task. The intent of these sections is self-explanatory—they explain when
you should use the task, any related information that you would need to know while doing
the task, and what you need to consider or do before you start the task.
When a task does not have any related information that must be considered before it is
started, the Related information section for that task states the following:
This task does not have any related information.

....................................................................................................................................................................................................................................
lxx 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
About this document

....................................................................................................................................................................................................................................
When a task does not have any conditions that must be considered before it is started, the
Before you begin section for that task states the following:
This task does not have any preconditions.
Each Task section consists of steps. The completion of all steps, which are sequentially
numbered, is required for the entire task to be completed successfully. In some instances,
a step might be prefaced with the wording Optional, which indicates that the step can be
skipped and the task can still be completed successfully. A task is considered to be
completed when all of its steps are completed and when the wording End of Steps
appears.
Many times, the management system affords users with multiple ways to accomplish the
same task. In these instances, this type of task gives the user several Methods of how to
accomplish the same set of steps successfully.
Typographical conventions used for content
This document uses the following typographical conventions:
• User input or path navigation on the administration and application GUIs is
identified with this type.
• User input in the UNIX® environment is identified with this
type.
• System output in the UNIX® environment is identified with
this type..
• GUI fields/parameters and their options are identified with this type.
• Document titles or words that are being defined or emphasized are identified with this
type.
Marking conventions used for content
The following convention is used to indicate a path, which is a flow of buttons and/or
menu items that you must navigated through to arrive at a destination on the GUI:
Search > EML > Network Elements
This same convention is also used to show a path through a series of menu items, for
example:
Click the filtering tool and select Node > Node Type.
All mouse selections are presumed to be left clicks. Right click mouse selections are
indicated as the following:
Right click the highlighted item and follow the path: Search > Clients.
Or, if brevity is needed, the same path could be documented as:
RClick item > Search > Clients.
Occasionally, a set of 1350 OMS features is not supported for all NEs or for all operating
components and/or environments. This set of features is clearly marked to show these
exceptions.

....................................................................................................................................................................................................................................
1350 OMS lxxi
8DG42227DAAA 9.6
Issue 3 December 2012
About this document

....................................................................................................................................................................................................................................
Technical content
In general, the technical content in this document is augmented by technical content that
is provided in other documents in this documentation set and/or in the document set of the
particular network element (NE ) or piece of hardware in the network configuration. It is
the user's responsibility to read all pertinent material in all documentation sets in order to
understand a particular concept or procedure and/or to implement the procedure in his or
her working environment.
This document contains information on the complete line of NEs that the 1350 OMS
supports. Each release of the 1350 OMS and its applications supports certain NEs within
the Alcatel-Lucent family of optical NEs. Mention of NEs or specific NE features in the
text of this document, or any document in the 1350 OMS documentation set, that are not
supported in this particular product release can apply to prior or future product releases.
Such material may not be currently visible or operable on the GUI and/or the server and
has been added only as a convenience for our customers. This material is subject to
change. For a list of NEs that are supported in the 1350 OMS 9.6, contact your
Alcatel-Lucent local customer service support team.
This document, or any document in the 1350 OMS documentation set, may contain
information that is related to features, service packs (SPs), maintenance releases, or other
updates that our product and its applications supported in prior releases or is to support in
the near future. This material may not be visible or operable on the supported servers
and/or GUI, and has been added only as a convenience for our customers. This material is
subject to change. For a list of all supported features for a particular release, contact your
Alcatel-Lucent local customer service support team.
Treatment of terms
A term that is presented in the text of this document, along with any used abbreviation for
the term, is typically defined where the term is initially introduced.
Many of the more generic terms that are defined in this document, along with the terms
that are defined in other documents in this documentation set, are also defined in the
Glossary, which is part of the 1350 OMS Getting Started Guide. We encourage our users
to rely on the Glossary for a comprehensive set of terms and any abbreviations of the
terms.
Document formats
This document is available for use in HTML format and PDF.
The on-line HTML version of the document has a search capability, a table of contents in
the front matter of the document, a partial table of contents in each chapter, and an index.
The PDF version can be viewed on-line; or it, or portions of it, can be printed locally at
the user's discretion.
On-line help
The 1350 OMS help systems are designed to consider the task that the user is performing
and to help the user complete the task.

....................................................................................................................................................................................................................................
lxxii 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
About this document

....................................................................................................................................................................................................................................
Contact sensitive help, which defines many GUI fields, is available; and other types of
help can be accessed from the GUI menu.

Related documentation
The following documents are related to the 1350 OMS PKT Guide:
1. The 1350 OMS Getting Started Guide (8DG42227AAAA) explains the look-and-feel
of the user and administration GUIs to new users. This document contains a complete
explanation of the 1350 OMS information product set and a glossary of terms that is
applicable to the entire documentation set.
2. The 1350 OMS Administration Guide explains how to use the tools and the
administration GUIs to administer and maintain the element management layer,
network management layer, and service management layer of the 1350 OMS.
This document consists of the following volumes:
• The 1350 OMS Administration Guide, Vol 1: Common Tools and Processes
(8DG42227LAAA-Vol1) explains how to administer and maintain the common
tools and processes that are associated with the 1350 OMS.

The 1350 OMS Administration Guide, Vol 2: Common GUI Functions
(8DG42227LAAA-Vol2) explains how to administer and maintain the common
administration GUIs that are associated with the 1350 OMS.
3. The 1350 OMS EML Guide (8DG42227BAAA) explains how to administer and
provision the 1350 OMS EML application of the 1350 OMS, which is the element
management layer of the 1350 OMS.
4. The1350 OMS SDH Guide (8DG42227CAAA) explains how to administer and
provision the Synchronous Digital Hierarchy (SDH) network management layer of the
1350 OMS.
5. The 1350 OMS WDM Guide (8DG42227QAAA) explains how to administer and
provision the 1350 OMS WDM, which provides the Wavelength Division
Multiplexing (WDM) and Dense Wavelength Division Multiplexing (DWDM)
network management layer for the 1350 OMS.
6. The 1350 OMS Service Assurance Guide (8DG42227FAAA) explains how to
maintain the 1350 OMS in terms of activities such as alarm clearing and performance
monitoring.
7. The 1350 OMS CLI Reference (8DG42227KAAA) provides detailed reference
material on the Command Line Interface for the advanced user of the 1350 OMS.
The 1350 OMS 9.6 also supports modules for system resiliency and northbound
communication. These modules are explained in the following documents:
• 1350 OMS HA Guide (8DG42227GAAA) explains how to install, administer, and use
the High Availability feature.
• 1350 OMS OI Guide (8DG42227HAAA) explains how to install, administer, and use
the Open Interfaces that are supported for the 1350 OMS.

Ordering information
The ordering number for this particular document is 8DG42227DAAA. Contact your
local Alcatel-Lucent local customer service support team for details.
....................................................................................................................................................................................................................................
1350 OMS lxxiii
8DG42227DAAA 9.6
Issue 3 December 2012
About this document

....................................................................................................................................................................................................................................
In addition, to order the 1350 OMS and/or any of its applications, add-on features or
upgrades, contact your local Alcatel-Lucent local customer service support team.

How to comment
To comment on this document, go to the Online Comment Form (http://infodoc.alcatel-
lucent.com/comments/) or e-mail your comments to the Comments Hotline
(comments@alcatel-lucent.com).

....................................................................................................................................................................................................................................
lxxiv 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Part I: Introduction

Overview
Purpose
This part contains a general description about the 1350 OMS product and introduce the
user to the activity of administration and maintenance of the 1350 OMS PKT application.

Contents

Chapter 1, Product Overview 1-1


Chapter 2, Introduction to Administration 2-1

...................................................................................................................................................................................................................................
1350 OMS I-1
8DG42227DAAA 9.6
Issue 3 December 2012
Introduction Overview

....................................................................................................................................................................................................................................

....................................................................................................................................................................................................................................
I-2 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
1 Product Overview
1

Overview
Purpose
This chapter provides an overview of the 1350 OMS PKT and the user functions that are
required to provision the application.

Contents

1350 OMS Overview 1-2


1350 OMS Modules for System Resiliency and Northbound Communication 1-5

...................................................................................................................................................................................................................................
1350 OMS 1-1
8DG42227DAAA 9.6
Issue 3 December 2012
Product Overview 1350 OMS Overview

....................................................................................................................................................................................................................................

1350 OMS Overview


1350 OMS and its supported management layers
The 1350 OMS is a network management system that supports three layers of
management to accommodate and grow with the optical network of the Customers.
The Element Management Layer, or EML, provides the functionality that is needed to
access any Alcatel-Lucent supported network elements (NEs) that are deployed in a
customer network. The EML provides a single access point for communication with an
NE.
The Network Management Layer, or NML, provides the functionality that is needed to
commission, provision, and supervise the network that is deployed in a customer premise.
The Service Management Layer, or SML, provides the functionality that is needed to
commission, provision, and supervise a Virtual Private Network (VPN) that an
Alcatel-Lucent customer deploys to its end users or to its customers.

1350 OMS and its applications


The 1350 OMS is the Alcatel-Lucent converged and unified network management
system. It manages the complete portfolio of Alcatel-Lucent active network elements
(NEs) and it maintains the complete portfolio of Alcatel-Lucent legacy NEs.
The 1350 OMS consists of the following set of integrated, licensed applications:
• “1350 OMS EML” (p. 1-2).
• “1350 OMS PKT” (p. 1-3).
• “1350 OMS SDH” (p. 1-3).
• “1350 OMS WDM” (p. 1-3).
Refer to the 1350 OMS Getting Started Guide for a more detailed system description.

1350 OMS EML


The 1350 OMS EML application provides element level management (EML) capabilities
for both Alcatel-Lucent ANSI and ETSI NEs. Its set of protocol adapters supports basic
NE functions such as NE MIB backup/restore and software downloads. Because the 1350
OMS provides all of the element layer functions that are required to manage the deployed
network, it requires to deploy also the 1350 OMS EML application.
Refer to the following documents and contact your Alcatel-Lucent local customer service
support team for additional details:
• 1350 OMS EML Guide.
• 1350 OMS Service Assurance Guide.

....................................................................................................................................................................................................................................
1-2 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Product Overview 1350 OMS Overview

....................................................................................................................................................................................................................................
1350 OMS PKT
The 1350 OMS PKT application provides Ethernet network management layer support
along with provisioning, alarm correlation, and historical PM data services. Ethernet
services include Multi-Protocol Label Switching (MPLS), Transport-Multi-Protocol Label
Switching (T-MPLS), bridging, Connection Oriented traffic, and packet rings.
Refer to the following documents and contact your Alcatel-Lucent local customer service
support team for additional details:
• 1350 OMS PKT Guide.
• 1350 OMS Service Assurance Guide.

1350 OMS SDH


The 1350 OMS SDH application provides the Synchronous Digital Hierarchy (SDH)
network management layer along with provisioning, alarm correlation, and PM
correlation capabilities. The 1350 OMS SDH functions as a client for the 1350 OMS
WDM application and as a server for the 1350 OMS PKT application.
Refer to the following documents and contact your Alcatel-Lucent local customer service
support team for additional details:
• 1350 OMS CLI Reference.
• 1350 OMS Service Assurance Guide.

1350 OMS WDM


The 1350 OMS WDM application provides Wavelength Division Multiplexing (WDM)
and Dense Wavelength Division Multiplexing (DWDM) support along with provisioning,
alarm correlation, and historical PM correlation capabilities.
Refer to the following documents and contact your Alcatel-Lucent local customer service
support team for additional details:
• 1350 OMS WDM Guide.
• 1350 OMS Service Assurance Guide.

1350 OMS software and the Web


1350 OMS is run through an Internet browser-based Graphical User Interface (GUI). It
supports the standard web features that a browser offers, such as bookmarks, back,
forward, reload, and print.
The Web Desktop is the available mechanism that both system administrators and users
can use to access the 1350 OMS GUI. It provides a central access point from which both
system administrators and users are authenticated and from which they can navigate to
the Web Portal to access the 1350 OMS applications.

....................................................................................................................................................................................................................................
1350 OMS 1-3
8DG42227DAAA 9.6
Issue 3 December 2012
Product Overview 1350 OMS Overview

....................................................................................................................................................................................................................................
The Web Portal is a Java application that is started when the administrator or user logs in
from the Web Desktop. The Web Portal provides the administrator with a view of all 1350
OMS applications and manages GUI navigation between the subsystem components. The
Web Portal also provides various methods of navigation—such as menus, icons, and a left
tree navigation area—between applications and tools.
From the 1350 OMS Web Portal, administrators can set up each application and its users,
and users can access the network and element level applications that enable the family of
Alcatel-Lucent NEs to be provisioned.
Refer to the 1350 OMS Getting Started Guide for a more detailed description of the look
and feel of the software and for a glossary of terms and acronym list.

1350 OMS supported NEs


The 1350 OMS supports the Alcatel-Lucent family of optical network elements (NEs). To
accommodate the world of optical transmission standards, these NEs operate using
different transport structures and they support different native command languages.
Contact your local customer support team for a list of NEs that are supported by the 1350
OMS and its particular applications.

....................................................................................................................................................................................................................................
1-4 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Product Overview 1350 OMS Modules for System Resiliency and Northbound
Communication
....................................................................................................................................................................................................................................

1350 OMS Modules for System Resiliency and Northbound


Communication
1350 OMS HA
The 1350 OMS supports High Availability (HA) as an added value module, which is
referred to as the 1350 OMS HA. The 1350 OMS HA software package is installed on top
of an already installed and configured NML and EML platform and independently of any
other application such as the 1350 OMS SDH, 1350 OMS PKT, or 1350 OMS WDM, or
any element manager such as the 1350 OMS EML or 1350 OMS eOMS.
As its name suggests, the 1350 OMS HA provides high availability to these applications
whose main task is to manage transport networks. It protects the 1350 OMS applications
and its HP® server platform against hardware and software failures that could be caused
by system failures (such as the failure of the system power supply or a system
component), a site failure (such as a natural disaster or fire), a backplane failure, a
processor failure, or any unplanned outage.
The 1350 OMS HA is explained in detail in the 1350 OMS HA Guide
(8DG42227GAAA). This document includes installation, administration, and user
information for the 1350 OMS High Availability (HA) feature.
Contact your Alcatel-Lucent local customer service support team for additional details.

1350 OMS OI
The 1350 OMS OI software package is installed on top of an already installed and
configured MW-INT platform and independently of any other application such as the
1350 OMS SDH, 1350 OMS PKT, 1350 OMS WDM, or any element manager such as
the 1350 OMS EML or 1350 OMS eOMS.
The 1350 OMS OI enables the 1350 OMS applications to export or import data to
multiple external operation systems (OSs). The 1350 OMS OI is a flexible, powerful, and
effective set of generic OS-to-OS interfaces (GENOS) that allow an external OS to
synchronize alarms, performance monitoring, network inventory, and remote inventory
data with any of the 1350 OMS applications.
The 1350 OMS OI is explained in detail in the 1350 OMS OI Guide (8DG42227HAAA).
This document includes installation, administration, and user information for the Open
Interfaces (OIs) that are supported for the 1350 OMS.
Contact your Alcatel-Lucent local customer service support team for additional details.

....................................................................................................................................................................................................................................
1350 OMS 1-5
8DG42227DAAA 9.6
Issue 3 December 2012
Product Overview 1350 OMS Modules for System Resiliency and Northbound
Communication
....................................................................................................................................................................................................................................

....................................................................................................................................................................................................................................
1-6 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
2 I2ntroduction to
Administration

Application Administration
MW-INT as the building block
The MW-INT, which is the middleware interface, is the building block of the 1350 OMS
architecture; and as such, it is the platform for all 1350 OMS components and its features.
The MW-INT enables the administrator to install a single product or several different
products, as well as different instances of the same product on one hardware platform.
The 1350OMS applications are installed and configured on top of the MW-INT platform.
The MW-INT provides the following functionality:
• Process management
• Subsystem configuration
• Installation/integration and customization
• System management

Application instances
The 1350 OMS supports the 1350 OMS PKT application, and each occurrence of this
application in the management system is referred to as an instance. Each application
instance is managed by the MW-INT. Refer to the 1350 OMS Administration Guide, Vol
1: Common Tools and Processes for details.

Process Monitoring
Process Monitoring is the graphical representation of the system processes and their
actual status.
The Process Monitoring Control application is the graphic interface of the MW-INT
application that allows the user to have an overall control of the IM subsystem of the
selected System Instance. The PMC graphic interface is composed of a common window
dedicated to display information and to execute commands for the management of all the
processes (agents) of the selected System Instance. The processes are collected in groups
(for example Database processes, Alarms processes,...) and each group is represented in
the PMC window through an icon which color informs the user of the group functional
state. Exactly the group icon gives the summarized information about the functional state
of all the processes and their children included in the group itself.
...................................................................................................................................................................................................................................
1350 OMS 2-1
8DG42227DAAA 9.6
Issue 3 December 2012
Introduction to Administration Application Administration

....................................................................................................................................................................................................................................
Refer to the 1350 OMS Administration Guide, Vol 2: Common GUI Functions for details.

The Web Desktop


Much of the administration of the 1350 OMS PKT application occurs through the Web
Desktop of the 1350 OMS. The Web Desktop provides a central access point from which
both system administrators and users are authenticated and from which they can navigate
to the Web Portal to access the 1350OMS applications. Refer to the 1350 OMS
Administration Guide, Vol 2: Common GUI Functions for details.

SEC User Administration and SEC User Authentication


The 1350 OMS uses its two SEC (Security) GUIs to administer and maintain security:
• The 1350 OMS enables administrators to create and maintain user accounts through
its SEC User Administration GUI.
• Functional area domains (FADs), object access domains (OADs), and combinations of
these domains along with user profiles and the declaration and discarding of user
accounts are administered through its SEC Authentication GUI.
Both the SEC User Administration GUI and the SEC User Authentication GUI are
explained in the 1350 OMS Administration Guide, Vol 2: Common GUI Functions.

Full system backups


The 1350 OMS enables administrators to perform a full system backup and recovery. For
details, refer to the 1350 OMS Administration Guide, Vol 1: Common Tools and
Processes, which details full system backups and recoveries, single volume backups, and
mirror configurations. Troubleshooting information is also included.

Application backup and restore


The 1350 OMS enables administrators to backup and restore a particular 1350 OMS
application and to schedule a backup of a particular 1350 OMS application. For details,
refer to the 1350 OMS Administration Guide, Vol 2: Common GUI Functions, which
details how use the SMF Scheduler to schedule a full backup or a backup of just the
network data, the alarm data, the performance monitoring data, the log data, user data, or
the system configuration.

PM Administration
Through its Data Management facilities, the 1350 OMS enables administrators to view
the performance monitoring statistics of a particular PM database. For details, refer to the
1350 OMS Administration Guide, Vol 2: Common GUI Functions.

....................................................................................................................................................................................................................................
2-2 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Introduction to Administration Application Administration

....................................................................................................................................................................................................................................
Logs, Command Log, and Command Log Administration
Log files are files that consist of records that are created by the various tools (scripts) and
processes. Administrators use log files to track any and/or all meaningful operations that
occur within the application or when a tool is executed. The 1350 OMS supports security
logs, command logs, and system logs. These logs are explained in detail in the 1350 OMS
Administration Guide, Vol 2: Common GUI Functions.
The Command Log enables administrators to parse a command log or a set of command
logs from a list of command logs. Once that list of command logs has been parsed, the
Command Log enables administrators to extract log records from target command log
files by using filters and to output that extracted list to a browser or to a table, called the
Command Result List, which is a tabular display that can be printed. For details, refer to
the 1350 OMS Administration Guide, Vol 2: Common GUI Functions.
Command Log Administration enables the administrator to edit the command output
template. In addition, the Command Log Administration function then allows the
administrator to view, parse, and filter the Command Log. For details, refer to the 1350
OMS Administration Guide, Vol 2: Common GUI Functions.

....................................................................................................................................................................................................................................
1350 OMS 2-3
8DG42227DAAA 9.6
Issue 3 December 2012
Introduction to Administration View Application Release Information

....................................................................................................................................................................................................................................

View Application Release Information


When to use
Use this task to view release information about an application.

Related information
See the following topic in this document:
• “Application Administration” (p. 2-1)

Before you begin


Open a Terminal session on the server machine.

Task
Complete the following steps to view release information about an application.
...................................................................................................................................................................................................

1 Type the following command after the command prompt :


/alu/Kernel/bin/Info.pl -sys PKT -inst <ID> -9.1.0
Result: The System Information window is displayed.
...................................................................................................................................................................................................

2 The release information for the application is similar to the following

General Information on System: <system name>

System : <system name>


Version : <system version number>
Instance : <number of the OS customized instance>
Role : <Role assigned to the OS customized
instance: master/client>
Master Ws : <Name of the master workstation>
LOCAL OSK -ENGINE: <Version of the component
OSK-ENGINE on the local machine>
Master Kernal Type: <Kernel type of the master machine>
Master OSK-ENGINE Interface Version: <version of the component
OSK-ENGINE on the master
machine interface>

Info : * <application and release>


...

Last Configuration Update:


Local Time: <Day, Date, Month, Year, Time>

Local Customization Update:

Local Time: <Day, Date, Month, Year, Time>


....................................................................................................................................................................................................................................
2-4 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Introduction to Administration View Application Release Information

....................................................................................................................................................................................................................................

Composition
<A list of components and applications that belong
to the subsystem along with their corresponding versions>
...................................................................................................................................................................................................

3 Press the Dismiss button to close the window.


E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS 2-5
8DG42227DAAA 9.6
Issue 3 December 2012
Introduction to Administration View Application Release Information

....................................................................................................................................................................................................................................

....................................................................................................................................................................................................................................
2-6 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Part II: Administration

Overview
Purpose
This document part provides to system and network administrators information and
procedures to administer and to maintain the 1350 OMS PKT.

Contents

Chapter 3, 1350 OMS PKT Configuration 3-1


Chapter 4, 1350 OMS PKT Process Monitoring 4-1
Chapter 5, 1350 OMS PKT User Management 5-1
Chapter 6, 1350 OMS PKT System Log Management 6-1
Chapter 7, 1350 OMS PKT Parameters 7-1
Chapter 8, 1350 OMS PKT Ethernet Multi-Manager Management 8-1
Configurations
Chapter 9, 1350 OMS PKT MIB Realignment and the ISA Board 9-1
Chapter 10, 1350 OMS PKT AlignDBSDHPathID Tool 10-1

...................................................................................................................................................................................................................................
1350 OMS II-1
8DG42227DAAA 9.6
Issue 3 December 2012
Administration Overview

....................................................................................................................................................................................................................................

....................................................................................................................................................................................................................................
II-2 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
3 3350 OMS PKT
1
Configuration

Overview
Purpose
This chapter provides the administrator with the conceptual information and the
associated tasks that pertain to the configuration of the overall 1350 OMS PKT
application.

Contents

1350 OMS PKT Configuration 3-2


Access the System Configuration Window and Configure 1350 OMS PKT 3-3
Integrate the 1350 OMS PKT with Other NMSs 3-8
Integrate 1350 OMS PKT Client Workstations with the Master Workstation 3-9

...................................................................................................................................................................................................................................
1350 OMS 3-1
8DG42227DAAA 9.6
Issue 3 December 2012
1350 OMS PKT Configuration 1350 OMS PKT Configuration

....................................................................................................................................................................................................................................

1350 OMS PKT Configuration


Administrator log in
The administrator must log into the 1350 OMS PKT configuration from the log in mask
as alcatel.
Important! We strongly recommend that you do not log in as bmml to start the 1350
OMS PKT session. The default administrator log in is alcatel, which is available
since the first customization. If needed, you can create additional administrator log
using SMF.
Any security warnings that appear should be ignored.

Application Configuration through SystemConfig


Open a Unix Terminal window starting from the Unix Server machine to activate the
System Configuration Window:
The System Configuration window is divided into the following two panes:
• The Instantiable Subsystems pane is on the left.
This pane contains a list of system processes, which are listed as proxies, that can
have multiple instances.
The administrator can use the arrow to move one or more system processes, which in
this scenario are proxies, from the Instantiable Subsystems list to the Subsystems
List, which moves the particular process or processes over to the static list and adds
an instance number to the process.
• The Subsystems List pane is on the right.
This pane contains a static list of processes that cannot have multiple instances. In
addition, this pane can contain one or more system processes from the Instantiable
Subsystems pane on the left. The list of processes in the Subsystems List will be
system instance processes.
System Configuration is used to configure processes in a system instance. The processes
are configured into groups. A group of processes is called entity, which is used to
configure, in a single step, processes that have the same configuration properties. The
group definition is a System (NMS) configuration property. Each NMA has a specific
configuration file that is used to configure its processes; this configuration file contains
specific data and parameters.
Process configuration enables processes to be configured in the following ways:
• A static list of processes can be defined that can belong to the System Instance.
• A variable list of processes can be defined that can have multiple instances within the
System Instance.
A configuration file can define the ID category of the multiple instances off-line.

....................................................................................................................................................................................................................................
3-2 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
1350 OMS PKT Configuration Access the System Configuration Window and Configure
1350 OMS PKT
....................................................................................................................................................................................................................................

Access the System Configuration Window and Configure 1350


OMS PKT
When to use
Use this task to access the system configuration window and to configure the 1350 OMS
PKT.

Related information
See the following topic in this document:
• “Access the System Configuration Window and Configure 1350 OMS PKT” (p. 3-3)

Before you begin


You cannot add a proxy to the system configuration while the system is running. When
configuring proxies, the system must be down.

Task
Complete the following steps to configure a 1350 OMS application, such as the 1350
OMS PKT.
...................................................................................................................................................................................................

1 The system must be brought down.


...................................................................................................................................................................................................

2 On the CDE front panel, press the terminal icon to start a Unix terminal application.
Result: The terminal window is displayed.
...................................................................................................................................................................................................

3 Login as root user.


...................................................................................................................................................................................................

4 Open a telnet session on the server machine.


...................................................................................................................................................................................................

5 Set the export the of the display:


export DISPLAY=<hostname>:<session number>
...................................................................................................................................................................................................

6 Insert following command after the prompt :


/alu/Install_Wizard/Install.sh –config
and select PKT as the system to configure.

....................................................................................................................................................................................................................................
1350 OMS 3-3
8DG42227DAAA 9.6
Issue 3 December 2012
1350 OMS PKT Configuration Access the System Configuration Window and Configure
1350 OMS PKT
....................................................................................................................................................................................................................................
Result: The System Configuration window is displayed. The left pane of the window
displays Instantiable Subsystems. The right pane of the window displays a
Subsystems List.
...................................................................................................................................................................................................

7 To configure the EMLIM_PROXY, do the following:


In the Instantiable Subsystems list, click on EMLIM_PROXY.
If you want to add one EMLIM_PROXY, enter a 1 in the next ID field.
Click the right arrow to move the EMLIM_PROXY from the Instantiable Subsystems list
to the Subsystems List.
Result: EMLIM_PROXY_1 now appears on the Subsystems List.
In the Subsystem List, click on EMLIM_PROXY_1 to configure it.
Result: The tool displays the Parameters Definition pop-up window.
In the Parameters Definition window, select the following to configure each of the
parameters:
For USE_CDN, select False, which is the default, if the proxy is to be an SNMP-type. If
the proxy is not to be an SNMP-type, select True.
For EML_NAME, enter a name given to the EML proxy. The name can be 1 to 10
characters in length. It cannot contain spaces (blanks). In addition, do not use any
characters that will conflict with the UNIX ps command.
For NM_INSTANCE_NAME_TO_USE, enter the complete EML system instance name. For
example: 1353NM_1-7.4 where the EML is configured. If USE_CDN is true, this value
must be the value of the SDH.
...................................................................................................................................................................................................

8 To configure the proxy for the NML, do the following:


In the Instantiable Subsystems list, click on NMLIM_PROXY.
If you want to add one NMLIM_PROXY, enter a 1 in the next ID field.
Remember! Only one 1350 OMS PKT can manage one NML proxy.
Click the right arrow to move the NMLIM_PROXY from the Instantiable Subsystems list
to the Subsystems List.
Result: NMLIM_PROXY_1 now appears on the Subsystems List.
In the Subsystem List, click on NMLIM_PROXY_1 to configure it.
Result: The tool displays the Parameters Definition pop-up window.
In the Parameters Definition window, select the following to configure each of the
parameters:
For NML_NAME, enter a name given to the NML proxy. The name can be 1 to 10
characters in length. It cannot contain spaces (blanks). In addition, do not use any
characters that conflict with the UNIX® ps command.
....................................................................................................................................................................................................................................
3-4 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
1350 OMS PKT Configuration Access the System Configuration Window and Configure
1350 OMS PKT
....................................................................................................................................................................................................................................
For RM_INSTANCE_NAME_TO_USE, enter the complete 1350OMS-RM system instance
name. For example: 1350OMSRM_1-7.4.5.
Follow this path to exit: Actions > Apply & Exit
...................................................................................................................................................................................................

9 To configure the SNA_EMLIM_PROXY, do the following:


In the Instantiable Subsystems list, click on SNA_EMLIM_PROXY.
The value to enter in the ID field is the ID value assigned to the adapter TL1 configured
on EML application.
Click the right arrow to move the SNA_EMLIM_PROXY from the Instantiable
Subsystems list to the Subsystems List.
Result: SNA_EMLIM_PROXY_x now appears on the Subsystems List.
In the Subsystem List, click on SNA_EMLIM_PROXY_x to configure it.
Result: The tool displays the Parameters Definition pop-up window.
In the Parameters Definition window, select the following to configure each of the
parameters:
For EML_NAME, enter a name given to the EML proxy. The name can be 1 to 10
characters in length. It cannot contain spaces (blanks). In addition, do not use any
characters that will conflict with the UNIX ps command.
For NM_INSTANCE_NAME_TO_USE, enter the complete EML system instance name. For
example: EML_2-9.1.0 where the adapter TL1 is configured.
...................................................................................................................................................................................................

10 To configure the NMA for the CORE_IM, do the following:


In the Subsystem List, look for and click on <System>_CORE_IM.
Under TMP_REMOTENAMINGFILE in the Actions pane of the Parameters Definition
window, specify the name of the 1350OMS-EML naming file.
Example: /tmp/naming.ref
Under TMP_NE_UNDER_1354RM Management, indicate by specify 1 for yes or 0 for
no if all NEs that are managed by the 1350 OMS PKT are also under 1350 OMS SDH
management.
For migrations, if NEs are already defined in the 1350 OMS PKT database and if these
NEs were under 1350OMS-RM mangement, you cannot specify a 0 for no. If you do, the
1350 OMS SDH cannot be started.
For the remaining fields, select all default values.
Follow this path to exit: Actions > Apply & Exit
...................................................................................................................................................................................................

11 To configure the NMA for the CORE_UM, do the following:

....................................................................................................................................................................................................................................
1350 OMS 3-5
8DG42227DAAA 9.6
Issue 3 December 2012
1350 OMS PKT Configuration Access the System Configuration Window and Configure
1350 OMS PKT
....................................................................................................................................................................................................................................
In the Subsystem List, look for and click on <System>_CORE_USM.
Under UI_LANGUAGE in the Actions pane of the Parameters Definition window,
specify the user interface language to be English.
Under PRINTER, specify the name of the default system printer even if the system
printer is not yet installed. This field is mandatory..
Follow this path to exit: Actions > Apply & Exit
...................................................................................................................................................................................................

12 To configure NMC system tuning, do the following:


In the Subsystem List, look for and click on System_Tuning.
Result: The Parameters Definition window is displayed.
Leave the default values, which are 100 for SYSTEM_TUNING_VAL and 30 for
SYS_START_WAIT_VAL.
Follow this path to exit: Actions > Apply & Exit
...................................................................................................................................................................................................

13 To configure the NMC Oracle database, do the following:


In the Subsystem List, look for and click on ORACLE-DB.
Result: The Parameters Definition window is displayed.
Under MIB in the Actions pane of the Parameters Definition window, specify NEW to
create a new database.
Under DB_SIZE in the Actions pane of the Parameters Definition window, specify the size
of the new database to be one of the following. (The DB_SIZE is linked to the kind of
instance that you selected at OS_CONF predisposition time.)
• small
If you selected IM_Small instance, you must select small as the DB_SIZE.
• medium (the default)
If you selected IM_Medium instance, you must select small or medium as the
DB_SIZE.
• large
If you selected IM_Large instance, you can select small, medium, or large as the
DB_SIZE.
Follow this path to exit: Actions > Apply & Exit
...................................................................................................................................................................................................

14 To configure NMC TAO_Interface Repository, do the following:


In the Subsystem List, look for and click on TAO_InterfaceRepository.
Result: The Parameters Definition window is displayed.

....................................................................................................................................................................................................................................
3-6 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
1350 OMS PKT Configuration Access the System Configuration Window and Configure
1350 OMS PKT
....................................................................................................................................................................................................................................
Under IFRREP in the Actions pane of the Parameters Definition window, specify NEW, the
default, to create a new persistent file.
Follow this path to exit: Actions > Apply & Exit
...................................................................................................................................................................................................

15 To execute the configuration, do the following:


In the System Configuration window, follow this path:
Main > UpdateConfig
Result: The Parameters Definition window is displayed. If the parameter New was
selected to create a new database, the database creation takes about 20 minutes. When the
configuration is finished, the System Configuration Log is output. Ignore the warning
messages.
Click the Dismiss button to close the window.
Follow this path to exit from the System Configuration window: Main > Quit.
Result: The system asks you if you really want to quit.
Select Yes to quit.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS 3-7
8DG42227DAAA 9.6
Issue 3 December 2012
1350 OMS PKT Configuration Integrate the 1350 OMS PKT with Other NMSs

....................................................................................................................................................................................................................................

Integrate the 1350 OMS PKT with Other NMSs


When to use
Use this task to integrate an instance of the 1350 OMS PKT with other network
management systems (NMSs), such as the 1350 OMS SONET, 1350 OMS SDH, or 1350
OMS WDM.

Related information
See the following topic in this document:
• “Access the System Configuration Window and Configure 1350 OMS PKT” (p. 3-3)

Before you begin


This task is to be used if an instance (master or client) of the 1350 OMS PKT is
co-located with other NMSs, such as the 1350 OMS SONET, 1350 OMS SDH, or 1350
OMS WDM. This task validates inter-system navigation; that is, navigation from one
NMS to another NMS. It also enables CORBA communication between NMSs.

Task
Complete the following steps to integrate an instance of the 1350 OMS PKT with other
network management systems (NMSs), such as the the 1350 OMS SONET, 1350 OMS
SDH, or 1350 OMS WDM.
...................................................................................................................................................................................................

1 Log in as root.
...................................................................................................................................................................................................

2 Enter the following command to start the global integration tool:


...,sys,root # /alcatel/Kernel/script/UpdateNeworkConnection.pl
[Enter]
Result: This tool validates the inter-system navigation and enables CORBA
communications between NMS.
...................................................................................................................................................................................................

3 Choose yes when integrating PKT with EML/SDH/NPR for both PLT and NAV
integration and yes when integrating eOMS only for PLT part.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
3-8 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
1350 OMS PKT Configuration Integrate 1350 OMS PKT Client Workstations with the Master
Workstation
....................................................................................................................................................................................................................................

Integrate 1350 OMS PKT Client Workstations with the Master


Workstation
When to use
Use this task to integrate each the 1350 OMS PKT client workstation with its 1350 OMS
PKT master workstation.

Related information
See the following topic in this document:
• “Access the System Configuration Window and Configure 1350 OMS PKT” (p. 3-3)

Before you begin


Execute this task for each 1350 OMS PKT client workstation that must be integrated with
its 1350 OMS PKT master workstation.

Task
Complete the following steps to integrate each the 1350 OMS PKT client workstation
with its 1350 OMS PKT master workstation.
...................................................................................................................................................................................................

1 Log in as root.
...................................................................................................................................................................................................

2 Enter the following command to start the global integration tool:


...,sys,root # /alcatel/Kernel/script/UpdateNeworkConnection.pl
[Enter]
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS 3-9
8DG42227DAAA 9.6
Issue 3 December 2012
1350 OMS PKT Configuration Integrate 1350 OMS PKT Client Workstations with the Master
Workstation
....................................................................................................................................................................................................................................

....................................................................................................................................................................................................................................
3-10 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
4 4350 OMS PKT Process
1
Monitoring

Overview
Purpose
This chapter provides the administrator with the conceptual information and the
associated tasks that pertain to the process monitoring of the overall 1350 OMS PKT
application.

Contents

Process Monitoring Overview 4-2


Run Levels 4-5

...................................................................................................................................................................................................................................
1350 OMS 4-1
8DG42227DAAA 9.6
Issue 3 December 2012
1350 OMS PKT Process Monitoring Process Monitoring Overview

....................................................................................................................................................................................................................................

Process Monitoring Overview


Groups
Processes are collected in groups, such as the database group, alarms group, or adapters
group.

Figure 4-1 Process Monitoring Window

....................................................................................................................................................................................................................................
4-2 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
1350 OMS PKT Process Monitoring Process Monitoring Overview

....................................................................................................................................................................................................................................
The follow table lists the groups of the processes.

Process Groups
Group name Process Name Function
Database oracle_monitor_process Manages the ORACLE processes.
Alarms AS_Current_IM Manages the AS current alarms.
AS_Historic_IM Manages the AS historical alarms.
Adapters AlmAdapter Manages the communication with EML/SDH
for the alarms.
EmlAdapter Manages the communication with EML
(through Proxy processes).
NmlAdapter Manages the communication with SDH
(through Proxy processes).
Core c_FaultManagement Manages the alarms for the CORE entities.
c_DataManagement Manages the access to the database for the
CORE entities.
c_TopologyManagement Manages the topology of the network.
c_EquipmentTopology Manages the equipment defined in EMLs/IM.
c_AuditAlignRecovery Manages Audit/Alignment/Recovery utilities
c_Scheduler Manages scheduled reports generation
Mpls m_FaultManagement Manages the alarms for the MPLS entities.
m_NetworkManagement Manages the network entities.
m_ Manages the traffic profiles.
TrafficProfileManagement
m_DataManagement Manages the access to the database for the
MPLS entities.
m_AuditAlignRecovery Manages Audit/Alignment/Recovery utilities
(MPLS entities)

....................................................................................................................................................................................................................................
1350 OMS 4-3
8DG42227DAAA 9.6
Issue 3 December 2012
1350 OMS PKT Process Monitoring Process Monitoring Overview

....................................................................................................................................................................................................................................

Process Groups
Group name Process Name Function
Eot e_DataManagement Manages the access to the database for the
MPLS entities.
e_FaultManagement Manages the alarms for the MPLS entities.
e_ProfileManagement Manages the profiles.
e_ServiceManagement Manages the services.
e_TrafficManagement Manages the traffic profiles.
e_AuditAlignRecovery Manages Audit/Alignment/Recovery utilities
(EOT entities)
e_Facility Add on for VPWS Ethernet Service Creation.
e_Bridge Manages the Bridge.
e_PM Manages Performance Monitoring on Ethernet
services
Session SessionManagement Manages the interface of all IM processes of
the 1350 OMS PKT and the GUI(s) or CLI(s).
Nbi NbiManagement Manages the Northbound Interface.
EML_Proxies Proxy_E_EML_NAME Manages each configured Eml Proxy with
EML_NAME
Proxy_E_SNA_NAME Manages each configured SNA Eml Proxy
with SNA_EML_NAME
NML_Proxies Proxy_N_NML_NAME Manages configured Nml Proxy (one and only
one can be configured) with NML_NAME
E2E e2e_manager Manages the e2e Ethernet services
e2e_data Manages the access to database for e2e entities
e2e_indirect Manages indirect eOMS services
Tmpls tmpls_adaconfig Manages the Adapter configuration
tmpls_dom Manages the domains
tmpls_inventory Inventory management
tmpls_lsp Lsp Management
OperatorLogger EthOperatorLog Managing the log on operator

....................................................................................................................................................................................................................................
4-4 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
1350 OMS PKT Process Monitoring Run Levels

....................................................................................................................................................................................................................................

Run Levels
Run levels 0 through 4
The 1350 OMS PKT has the following run levels:

Run Level Name Information


0 FullFunctionality Run the entire application.
1 BackupMode Subsystem runs to allow a backup job to run without
conflicting problems. Only processes configured for
this run level should be run.
2 RestoreMode Subsystem runs to allow a restore job to run without
conflicting problems. Only processes configured for
this run level should be run.
3 ADAPTERS Run the ADAPTERS part.
4 DB_Only Needed for OS resilience. Run ORACLE Database
processes.

....................................................................................................................................................................................................................................
1350 OMS 4-5
8DG42227DAAA 9.6
Issue 3 December 2012
1350 OMS PKT Process Monitoring Run Levels

....................................................................................................................................................................................................................................

....................................................................................................................................................................................................................................
4-6 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
5 5350 OMS PKT User
1
Management

Overview
Purpose
This chapter provides the administrator with the conceptual information and the
associated tasks that pertain to the user management of the overall 1350 OMS PKT
application.

Contents

User Profiles 5-2


Construction Macro Functions and Default User Profiles 5-3
MPLS Macro Functions and Default User Profiles 5-7
Ethernet Macro Functions and Default User Profiles 5-9

...................................................................................................................................................................................................................................
1350 OMS 5-1
8DG42227DAAA 9.6
Issue 3 December 2012
1350 OMS PKT User Management User Profiles

....................................................................................................................................................................................................................................

User Profiles
Default operator profiles
The 1350OMS default operator profiles are the following:
• An administrator can perform every function on the particular 1350OMS application.
• A constructor can manage the topology of the network, which includes subnetworks,
NEs, ENEs, LOS, LOC, and LOM. The constructor can perform every function on
maps and NEs; however, the constructor cannot perform certain administration
functions. For example: a constructor cannot add or remove operators or perform a
backup and restore of the system.
• An operator can create local maps, import saved maps, and manage services such as
Ethernet; however, the operator cannot manage NEs (start/stop supervision) or
manage the global inventory. In addition, an operator cannot perform certain
administration functions. For example: an operator cannot add or remove operators or
perform a backup and restore of the system.
• A viewer can view lists of data and can view the maps. In general, a viewer can only
look at data; a viewer has limited access and privileges.
When a new operator is created through the Create User function, that operator must be
assigned to one of the default profiles. The default profiles names cannot be changed and
the profiles themselves cannot be reconfigured.

....................................................................................................................................................................................................................................
5-2 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
1350 OMS PKT User Management Construction Macro Functions and Default User Profiles

....................................................................................................................................................................................................................................

Construction Macro Functions and Default User Profiles


TMPLS management

TMPLS Management
✓ is Allowed
Macro Function Administrator Constructor Operator Viewer
T-Mpls Domain, Nodes, Sections, ✓ ✓ ✓ ✓
Tunnels, Pseudo Wires list
Services ✓ ✓
T-Mpls EVC creation
T-Mpls deletion ✓ ✓
T-Mpls modification ✓ ✓
T-Mpls properties ✓ ✓ ✓ ✓

Domain management

Domain Management
✓ is Allowed
Macro Function Administrator Constructor Operator Viewer
Domain list / search ✓ ✓ ✓ ✓
Domain creation ✓ ✓
Domain deletion ✓ ✓
Domain modification ✓ ✓
Domain properties ✓ ✓ ✓ ✓
Domain inventory ✓ ✓ ✓ ✓

Service node management

Service Node Management


✓ is Allowed
Macro Function Administrator Constructor Operator Viewer
Service node list / search ✓ ✓ ✓ ✓
Service node properties ✓ ✓ ✓ ✓
Service node inventory ✓ ✓ ✓ ✓

....................................................................................................................................................................................................................................
1350 OMS 5-3
8DG42227DAAA 9.6
Issue 3 December 2012
1350 OMS PKT User Management Construction Macro Functions and Default User Profiles

....................................................................................................................................................................................................................................
NE management

NE Management
✓ is Allowed
Macro Function Administrator Constructor Operator Viewer
NE list / search ✓ ✓ ✓ ✓
NE available list/ search ✓ ✓
NE definition ✓ ✓
NE deletion ✓ ✓
NE modification ✓ ✓
NE properties ✓ ✓ ✓ ✓
NE acknowledge ✓ ✓ ✓ ✓
NE configuration ✓ ✓
NE assign to domain ✓ ✓
NE de-assign from domain ✓ ✓

ENE management

ENE Management
✓ is Allowed
Macro Function Administrator Constructor Operator Viewer
ENE list / search ✓ ✓ ✓ ✓
ENE creation ✓ ✓
ENE deletion ✓ ✓
ENE modification ✓ ✓
ENE properties ✓ ✓ ✓ ✓

SDH termination management

SDH Termination Management


✓ is Allowed
Macro Function Administrator Constructor Operator Viewer
SDH termination synchronization ✓ ✓
SDH termination audit ✓ ✓
SDH termination upload ✓ ✓
SDH termination properties ✓ ✓ ✓ ✓
SDH termination list / search ✓ ✓ ✓ ✓

....................................................................................................................................................................................................................................
5-4 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
1350 OMS PKT User Management Construction Macro Functions and Default User Profiles

....................................................................................................................................................................................................................................
Ethernet physical port management

Ethernet Physical Port Management


✓ is Allowed
Macro Function Administrator Constructor Operator Viewer
Ethernet physical port upload ✓ ✓
Ethernet physical port ✓ ✓
modification
Ethernet physical port ✓ ✓
configuration
Ethernet physical port properties ✓ ✓ ✓ ✓
Ethernet physical port list / ✓ ✓ ✓ ✓
search

External termination management

External Termination Management


✓ is Allowed
Macro Function Administrator Constructor Operator Viewer
ETP creation ✓ ✓
ETP deletion ✓ ✓
ETP properties ✓ ✓ ✓ ✓
ETP list/ search ✓ ✓ ✓ ✓

Link over SDH management

Link over SDH Management


✓ is Allowed
Macro Function Administrator Constructor Operator Viewer
Link over SDH creation ✓ ✓
Link over SDH creation (nav on ✓ ✓
RM)
Link over SDH deletion ✓ ✓
Link over SDH deletion (nav on ✓ ✓
RM)
Link over SDH modification ✓ ✓
Link over SDH properties ✓ ✓ ✓ ✓
Link over SDH extremities ✓ ✓ ✓ ✓
Link over SDH list / search ✓ ✓ ✓ ✓

....................................................................................................................................................................................................................................
1350 OMS 5-5
8DG42227DAAA 9.6
Issue 3 December 2012
1350 OMS PKT User Management Construction Macro Functions and Default User Profiles

....................................................................................................................................................................................................................................

Link over SDH Management


✓ is Allowed
Macro Function Administrator Constructor Operator Viewer
Link over SDH configuration ✓ ✓

Link over MPLS management

Link over MPLS Management


✓ is Allowed
Macro Function Administrator Constructor Operator Viewer
Link over MPLS properties ✓ ✓ ✓ ✓
Link over MPLS extremities ✓ ✓ ✓ ✓
Link over MPLS list / search ✓ ✓ ✓ ✓

Link over cable management

Link over Cable Management


✓ is Allowed
Macro Function Administrator Constructor Operator Viewer
Link over cable creation ✓ ✓
Link over cable deletion ✓ ✓
Link over cable modification ✓ ✓
Link over cable properties ✓ ✓ ✓ ✓
Link over cable extremities ✓ ✓ ✓ ✓
Link over cable list / search ✓ ✓ ✓ ✓

Utilities management

Utilities Management
✓ is Allowed
Utilities Management Administrator Constructor Operator Viewer
Start/End Procedure ✓
Audit NE ✓
Display NE Audit ✓
Align NE ✓
Reserve ✓

....................................................................................................................................................................................................................................
5-6 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
1350 OMS PKT User Management MPLS Macro Functions and Default User Profiles

....................................................................................................................................................................................................................................

MPLS Macro Functions and Default User Profiles


Transport Link management

Transport Link Management


✓ is Allowed
Macro Function Administrator Constructor Operator Viewer
Characteristics definition ✓ ✓
Transport Link bandwidth load ✓ ✓ ✓ ✓
indication
Transport Link extremities ✓ ✓ ✓ ✓
Transport Link list / search ✓ ✓ ✓ ✓
Transport link properties ✓ ✓ ✓ ✓
Transport link inventory ✓ ✓ ✓ ✓

Traffic descriptor management

Transport Descriptor Management


✓ is Allowed
Macro Function Administrator Constructor Operator Viewer
Traffic descriptor creation ✓ ✓
Traffic descriptor deletion ✓ ✓
Traffic descriptor properties ✓ ✓ ✓ ✓
Traffic descriptor list / search ✓ ✓ ✓ ✓
Traffic descriptor modification ✓ ✓
Traffic descriptor inventory ✓ ✓ ✓ ✓

LSP Tunnel management

LSP Tunnel Management


✓ is Allowed
Macro Function Administrator Constructor Operator Viewer
LSP Tunnel creation ✓ ✓
LSP Tunnel deletion ✓ ✓
LSP Tunnel allocation ✓ ✓
LSP Tunnel de-allocation ✓ ✓
LSP Tunnel implementation ✓ ✓
LSP Tunnel de-implementation ✓ ✓

....................................................................................................................................................................................................................................
1350 OMS 5-7
8DG42227DAAA 9.6
Issue 3 December 2012
1350 OMS PKT User Management MPLS Macro Functions and Default User Profiles

....................................................................................................................................................................................................................................

LSP Tunnel Management


✓ is Allowed
Macro Function Administrator Constructor Operator Viewer
LSP Tunnel constraint adding ✓ ✓
LSP Tunnel constraint removing ✓ ✓
LSP Tunnel bandwidth load ✓ ✓ ✓ ✓
indication
LSP Tunnel list / search ✓ ✓ ✓ ✓
LSP Tunnel inventory ✓ ✓ ✓ ✓
LSP Tunnel extremities ✓ ✓ ✓ ✓
LSP Tunnel constraint list ✓ ✓ ✓ ✓
LSP tunnel modification ✓ ✓
LSP Tunnel route ✓ ✓ ✓ ✓
LSP Tunnel Properties ✓ ✓ ✓ ✓
Clipboard ✓ ✓

VC LSP management

VC LSPManagement
✓ is Allowed
Macro Function Administrator Constructor Operator Viewer
VC LSP creation ✓ ✓
VC LSP deletion ✓ ✓
VC LSP implementation ✓ ✓
VC LSP de-implementation ✓ ✓
VC LSP commission ✓ ✓
VC LSP de-commission ✓ ✓
VC LSP list /search ✓ ✓ ✓ ✓
VC LSP extremities ✓ ✓ ✓ ✓
VC LSP modification ✓ ✓
VC LSP properties ✓ ✓ ✓ ✓

....................................................................................................................................................................................................................................
5-8 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
1350 OMS PKT User Management Ethernet Macro Functions and Default User Profiles

....................................................................................................................................................................................................................................

Ethernet Macro Functions and Default User Profiles


Customer management

Customer Management
✓ is Allowed
Macro Function Administrator Constructor Operator Viewer
Customer list / search ✓ ✓ ✓ ✓
Customer create ✓ ✓
Customer modify ✓ ✓
Customer properties ✓ ✓ ✓ ✓
Customer delete ✓ ✓
Inventory of services ✓ ✓ ✓ ✓

Service management

Service Management
✓ is Allowed
Macro Function Administrator Constructor Operator Viewer
Service list ✓ ✓ ✓ ✓
Service create ✓ ✓
Service modify ✓ ✓
Service properties ✓ ✓ ✓ ✓
Service delete ✓ ✓

EVC management

EVC Management
✓ is Allowed
Macro Function Administrator Constructor Operator Viewer
EVC list ✓ ✓ ✓ ✓
EVC create ✓ ✓
EVC modify ✓ ✓
EVC properties ✓ ✓ ✓ ✓
EVC delete ✓ ✓
EVC Termination add ✓ ✓
EVC Termination delete ✓ ✓

....................................................................................................................................................................................................................................
1350 OMS 5-9
8DG42227DAAA 9.6
Issue 3 December 2012
1350 OMS PKT User Management Ethernet Macro Functions and Default User Profiles

....................................................................................................................................................................................................................................
Ethernet Traffic Descriptor management

Ethernet Traffic Descriptor Management


✓ is Allowed
Macro Function Administrator Constructor Operator Viewer
Ethernet Traffic Descriptor list ✓ ✓ ✓ ✓
Ethernet Traffic Descriptor ✓ ✓
create
Ethernet Traffic Descriptor ✓ ✓
modify
Ethernet Traffic Descriptor ✓ ✓ ✓ ✓
properties
Ethernet Traffic Descriptor ✓ ✓
delete

Ethernet Traffic Classifier management

Ethernet Traffic Classifier Management


✓ is Allowed
Macro Function Administrator Constructor Operator Viewer
Ethernet Traffic Classifier list ✓ ✓ ✓ ✓
Ethernet Traffic Classifier ✓ ✓
create
Ethernet Traffic Classifier ✓ ✓
modify
Ethernet Traffic Classifier ✓ ✓ ✓ ✓
properties
Ethernet Traffic Classifier ✓ ✓
delete

Ethernet Edge Physical Port management

Ethernet Edge Physical Port Management


✓ is Allowed
Macro Function Administrator Constructor Operator Viewer
Ethernet Edge Physical Port ✓ ✓ ✓ ✓
properties
Ethernet Edge Physical Port ✓ ✓
add to EVC
Ethernet Edge Physical Port ✓ ✓
modification VLANs

....................................................................................................................................................................................................................................
5-10 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
1350 OMS PKT User Management Ethernet Macro Functions and Default User Profiles

....................................................................................................................................................................................................................................

Ethernet Edge Physical Port Management


✓ is Allowed
Macro Function Administrator Constructor Operator Viewer
Ethernet Edge Physical Ports ✓ ✓ ✓ ✓
list

Ethernet Transport Segment management

Ethernet Transport Segment Management


✓ is Allowed
Macro Function Administrator Constructor Operator Viewer
Inventory of Ethernet ✓ ✓ ✓ ✓
Segments
Ethernet Transport segment ✓ ✓ ✓ ✓
bandwidth load
Ethernet Transport Segment ✓ ✓ ✓ ✓
list
Ethernet Transport Segment ✓ ✓ ✓ ✓
properties

Ethernet Segment management

Ethernet Segment Management


✓ is Allowed
Macro Function Administrator Constructor Operator Viewer
Ethernet Segment list ✓ ✓ ✓ ✓
Ethernet Segment create ✓ ✓
Ethernet Segment modify ✓ ✓
Ethernet Segment properties ✓ ✓ ✓ ✓
Ethernet Segment delete ✓ ✓
Ethernet Segment configure ✓ ✓
Ethernet Constraint add ✓ ✓
Ethernet Constraint list ✓ ✓ ✓ ✓
Ethernet Constraint delete ✓ ✓
Ethernet VLAN Constraint ✓ ✓
add
Ethernet VLAN Constraint ✓ ✓
remove

....................................................................................................................................................................................................................................
1350 OMS 5-11
8DG42227DAAA 9.6
Issue 3 December 2012
1350 OMS PKT User Management Ethernet Macro Functions and Default User Profiles

....................................................................................................................................................................................................................................

Ethernet Segment Management


✓ is Allowed
Macro Function Administrator Constructor Operator Viewer
Ethernet VLAN Constraint ✓ ✓
list
Ethernet Segment allocate ✓ ✓
Ethernet Segment de-allocate ✓ ✓
Ethernet Segment implement ✓ ✓
Ethernet Segment ✓ ✓
de-implement
Ethernet Segment show EVC ✓ ✓ ✓ ✓
Ethernet Segment extremities ✓ ✓ ✓ ✓
Ethernet Segment alarm ✓ ✓ ✓ ✓
history
Ethernet Segment failure ✓ ✓
localization

Color Profile Management

Color Profile Management


✓ is Allowed
Macro Function Administrator Constructor Operator Viewer
Color Profile list ✓ ✓ ✓ ✓
Color Profile create ✓ ✓
Color Profile modify ✓ ✓
Color Profile properties ✓ ✓ ✓ ✓
Color Profile delete ✓ ✓

Transport Link Management

Transport Link Management


✓ is Allowed
Macro Function Administrator Constructor Operator Viewer
Transport Link list ✓ ✓ ✓ ✓
Transport Link properties ✓ ✓ ✓ ✓
Transport Link extremities ✓ ✓ ✓ ✓
Transport Link bandwidth ✓ ✓ ✓ ✓
load

....................................................................................................................................................................................................................................
5-12 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
1350 OMS PKT User Management Ethernet Macro Functions and Default User Profiles

....................................................................................................................................................................................................................................

Transport Link Management


✓ is Allowed
Macro Function Administrator Constructor Operator Viewer
Transport Link list ✓ ✓ ✓
supported Ethernet
segments
Transport Link configure ✓ ✓

VLAN Type Management

VLAN Type Management


✓ is Allowed
Macro Function Administrator Constructor Operator Viewer
VLAN type list ✓ ✓ ✓ ✓
VLAN type creation ✓ ✓
VLAN type deletion ✓ ✓
VLAN type modification ✓ ✓
VLAN type properties ✓ ✓ ✓ ✓

Provider Network Management

Provider Network Management


✓ is Allowed
Macro Function Administrator Constructor Operator Viewer
Ethernet Traffic Classifier ✓ ✓ ✓ ✓
list
Ethernet Traffic Classifier ✓ ✓
modify

....................................................................................................................................................................................................................................
1350 OMS 5-13
8DG42227DAAA 9.6
Issue 3 December 2012
1350 OMS PKT User Management Ethernet Macro Functions and Default User Profiles

....................................................................................................................................................................................................................................

....................................................................................................................................................................................................................................
5-14 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
6 6350 OMS PKT System Log
1
Management

Overview
Purpose
This chapter provides the administrator with the conceptual information and the
associated tasks that pertain to the system log management of the overall 1350 OMS PKT
application.

Contents

SMF/Commands/Event Log File Overview 6-2


Failure Management Log File Overview 6-5
Trace Management Overview 6-6

...................................................................................................................................................................................................................................
1350 OMS 6-1
8DG42227DAAA 9.6
Issue 3 December 2012
1350 OMS PKT System Log Management SMF/Commands/Event Log File Overview

....................................................................................................................................................................................................................................

SMF/Commands/Event Log File Overview


SMF/Commands/Event log file locations
The log files for SMF, commands, and/or events are stored in the following locations:
• /usr/Systems/<application>_<instance>/maintenance/log
• /usr/Systems/<application>_<instance>/SMF/tools/log/data
• /usr/Systems/<application>_<instance>/ORACLE/databases/dbnml/admin/create
• /usr/Systems/<application>_<instance>/ORACLE/databases/dbnml/admin/logbook
• /usr/Systems/<application>_<instance>/ORACLE/databases/dbnml/admin/bdump
• /usr/Systems/<application>_<instance>/ORACLE/databases/network
• /usr/Systems/<application>_<instance>/TAO/maintenance/trace
• /usr/Systems/<application>_<instance>/databases/dbbmml/data

Log file suffixes


The system log files have the following suffixes:
• .log
• .data
• .dataflow

maintenance/log files
The following table lists all files that are in the
/usr/Systems/<application>_<instance>/maintenance/log directory.

Log files in /usr/Systems/<application>_<instance>/maintenance/log


Filename Contents
smf.log Main source of SMF information.
pmc2.log Main source of PMC information.
JacORB.log Main source of JABORB information.
PMCStart.log Information about the startup of the processes
managed in PMC.
1354BM.log Main information source for all IMs processes of the
1350OMS PKT.
EMLStart.log Information source for the startup of the EML adapter
and its proxies.
NMLStart.log Information source for the startup of the NML adapter
and its proxies.
*_dbi.log Log files for the 1350 OMS PKT for the processes
that used the DBI.

....................................................................................................................................................................................................................................
6-2 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
1350 OMS PKT System Log Management SMF/Commands/Event Log File Overview

....................................................................................................................................................................................................................................

Log files in /usr/Systems/<application>_<instance>/maintenance/log


Filename Contents
*Gui.log Main information source for all USMs processes of
the 1350 OMS PKT.
ascurusm.log Information source for the AS USM.
BmAdaptationModifyTrace.log File logging adaptation information for the dynamic
trace level changing tool.
BmCoreModifyTrace.log File logging bmcore information for the dynamic
trace level changing tool.
BmMplsModifyTrace.log File logging mpls information for the dynamic trace
level changing tool.
EotModifyTrace.log File logging eot information for dynamic trace level
changing tool.
allTracesModify.log File logging information for the dynamic trace level
changing tool invoked from the Set BM Parameter
GUI.

SMF/tools/log/data file
The /usr/Systems/<application>_<instance>/SMF/tools/log/data directory contains the
traceDebug.log, which is the log file for debugging.

ORACLE/databases/dbnml/admin/create file
The /usr/Systems/<application>_<instance>/ORACLE/databases/dbnml/admin/create
directory contains the crdb_phase<X>.log, which is the log file that is created during the
creation of the database.

ORACLE/databases/dbnml/admin/logbook file
The
/usr/Systems/<application>_<instance>/ORACLE/databases/dbnml/admin/logbook
directory contains the start_db.log and stop_db.log files, which is the log files that log
the start and the stopping of the database.

ORACLE/admin/dbump file
The
/usr/Systems/<application>_<instance>/ORACLE/databases/dbnml/admin/bdump
directory contains the alert_dbbmml1.log file, which is the log file that contains
information on the ORACLE errors.

....................................................................................................................................................................................................................................
1350 OMS 6-3
8DG42227DAAA 9.6
Issue 3 December 2012
1350 OMS PKT System Log Management SMF/Commands/Event Log File Overview

....................................................................................................................................................................................................................................
ORACLE/databases/network file
The /usr/Systems/<application>_<instance>/ORACLE/databases/network directory
contains the dbbmml1listener.log file, which is the log file that contains information on
the listener process of ORACLE.

TAO/maintenance/trace file
The /usr/Systems/<application>_<instance>/TAO/maintenance/trace directory
contains the ORBStart.log file, which is the log file that contains information on the ORB
TAP startup.

databases/dbbmml/data
The /usr/Systems/<application>_<instance>/databases/dbbmml/data directory
contains the redo<xx>.log file, which is the log file that contains information on the
ORACLE redo log files.

....................................................................................................................................................................................................................................
6-4 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
1350 OMS PKT System Log Management Failure Management Log File Overview

....................................................................................................................................................................................................................................

Failure Management Log File Overview


Failure management log file location
The failure management log files are in the
/usr/Systems/<application>_<instance>/maintenance/trace directory.

Failure management log file suffixes


The failure management log files have the following suffixes:
• .err
• .outerr

....................................................................................................................................................................................................................................
1350 OMS 6-5
8DG42227DAAA 9.6
Issue 3 December 2012
1350 OMS PKT System Log Management Trace Management Overview

....................................................................................................................................................................................................................................

Trace Management Overview


Trace management log file location
The failure management log files are in the following directories:
• /usr/Systems/<application>_<instance>/maintenance/trace
• /usr/Systems/<application>_<instance>/PMC2/trace

Trace management log file suffixes


The failure management log files have the following suffixes:
• .data
• .data.lck
• .dataflow
• .dataflow.lck
• .trc
• trc.old
• .trace
• .out

....................................................................................................................................................................................................................................
6-6 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
7 1350 OMS PKT Parameters
7

Overview
Purpose
This chapter provides the administrator with the conceptual information that pertains to
the parameters for the 1350 OMS PKT application.

Contents

Parameter Overview 7-2


1350 OMS PKT Parameters for Core NMA 7-3
1350 OMS PKT Parameters for GUI NMA 7-4
1350 OMS PKT Parameters for MW-INT 7-5
1350 OMS PKT Parameters for Oracle Management 7-6
Set PKT Parameters 7-7
1350 OMS PKT Parameter List 7-9

...................................................................................................................................................................................................................................
1350 OMS 7-1
8DG42227DAAA 9.6
Issue 3 December 2012
1350 OMS PKT Parameters Parameter Overview

....................................................................................................................................................................................................................................

Parameter Overview
Parameter functional definition
The parameters can be defined for the 1350 OMS PKT application during the initial
installation of the application or after the installation of the application through the SMF
interface.

....................................................................................................................................................................................................................................
7-2 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
1350 OMS PKT Parameters 1350 OMS PKT Parameters for Core NMA

....................................................................................................................................................................................................................................

1350 OMS PKT Parameters for Core NMA


TMP_NE_UNDER_<application_MANAGEMENT
The TMP_NE_UNDER_<application>_ MANAGEMENT parameter specifies whether
all of the NEs that are managed by the 1350 OMS PKT application are also managed by
the 1350 OMS SDH application.
The allowed values are 0 and 1. A value of 0 specifies that the NE is not managed by the
1350 OMS SDH . A value of 1 specifies that the NE is managed by the 1350 OMS SDH.
The default is 1.
This parameter is a Core NMA parameter. This parameter must be defined during
instantiation.

....................................................................................................................................................................................................................................
1350 OMS 7-3
8DG42227DAAA 9.6
Issue 3 December 2012
1350 OMS PKT Parameters 1350 OMS PKT Parameters for GUI NMA

....................................................................................................................................................................................................................................

1350 OMS PKT Parameters for GUI NMA


PRINTER
The PRINTER parameter specifies the default system printer.
This parameter is a mandatory GUI NMA parameter. This parameter must be defined
during instantiation.

UI_LANGUAGE
The UI_LANGUAGE parameter specifies the language to be used by the User Service
Manager (USM).
The allowed value is English. The default is English.
This parameter is a GUI NMA parameter. This parameter must be defined during
instantiation.

....................................................................................................................................................................................................................................
7-4 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
1350 OMS PKT Parameters 1350 OMS PKT Parameters for MW-INT

....................................................................................................................................................................................................................................

1350 OMS PKT Parameters for MW-INT


SYS_START_WAIT_VAL
The SYS_START_WAIT_VAL parameter specifies the value, that is expressed in the
number of seconds, for the additional system start up wait time to ensure that the system
is stable.
The default is 30 seconds.
This parameter is an OSK parameter. This parameter must be defined during instantiation.

SYSTEM_TUNING_VAL
The SYSTEM_TUNING_VAL parameter specifies the value, that is expressed as a
percentage, of the agents start up waiting time.
The default is 100%, which is what this parameter must be specified as.
This parameter is an OSK parameter. This parameter must be defined during instantiation.

....................................................................................................................................................................................................................................
1350 OMS 7-5
8DG42227DAAA 9.6
Issue 3 December 2012
1350 OMS PKT Parameters 1350 OMS PKT Parameters for Oracle Management

....................................................................................................................................................................................................................................

1350 OMS PKT Parameters for Oracle Management


DB_SIZE
The DB_SIZE parameter specifies size of the Oracle database for the application.
The allowed values are the following:
• small is specified to create a database that is 0.5 Gb, which is the default size.
• medium is specified to create a database that is 2.0 Gb.
• large is specified to create a database that is 4.0 Gb.
This parameter is an Oracle parameter. This parameter must be defined during
instantiation. This parameter is only applicable for Information Manager (IM)
configurations.

MIB
The MIB parameter specifies whether the old application database should be saved.
The allowed values are the following:
• NEW is specified so the customization process creates a new, empty database. This
value must be specified during the first installation of the application.
• OLD is specified to save the current database or to recover the old database from an
old installation directory.
• REC is specified to recover the database from a backup. This value should be
specified after a disk failure causes the reinstallation of the application. The
customization process does not create a new database to save the mirrored database
information so a database recovery from an incremental backup can be performed.
This parameter is an Oracle parameter. This parameter must be defined during
instantiation. This parameter is only applicable for Information Manager (IM)
configurations.

NEW
This value have to be used during the first installation of 1350 OMS PKT application.
Using this value the customize procedure will create a new empty DB.

REC
This value should be used after a disk failure that causes the re-installation of 1350 OMS
PKT application. The customize procedure will not create a new DB in order to save the
mirrored DB information to permit the recover of DB from an incremental backup.

....................................................................................................................................................................................................................................
7-6 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
1350 OMS PKT Parameters Set PKT Parameters

....................................................................................................................................................................................................................................

Set PKT Parameters


When to use
This task is used to modify PKT configuration parameters.

Related Information
Information related to this topic
• Chapter 7, “1350 OMS PKT Parameters”

Before you begin


Make a check for the consistency of the parameter you will set.

How to set the parameters


...................................................................................................................................................................................................

1 Login as user on a server station and activate a terminal session.


...................................................................................................................................................................................................

2 Export the DISPLAY


export DISPLAY=<hostname>:<session number>
...................................................................................................................................................................................................

3 Execute as NMS user the following command:


/usr/Systems/PKT_<ID>-9.1.0/BM_ETH_CORE_UI/script/emlmngt_gui/
RmtConfUpdate.sh

....................................................................................................................................................................................................................................
1350 OMS 7-7
8DG42227DAAA 9.6
Issue 3 December 2012
1350 OMS PKT Parameters Set PKT Parameters

....................................................................................................................................................................................................................................
Result: The Set Parameter window is displayed.

E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
7-8 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
1350 OMS PKT Parameters 1350 OMS PKT Parameter List

....................................................................................................................................................................................................................................

1350 OMS PKT Parameter List


TMP_ALM_BUFFERSIZE
The TMP_ALM_BUFFERSIZE parameter specifies the size of the alarm buffer that the
ALM adapter uses.
The allowed values are 50 to 1000. The default is 250.
This parameter can be modified by SMF.

TMP_ALM_PADDINGRATE
The TMP_ALM_PADDINGRATE parameter specifies the padding rate of the alarm
buffer that the ALM adapter uses.
The allowed values are 50 to 100. The default is 70.
This parameter can be modified by SMF.

TMP_ALM_TEMPOASYNC
The TMP_ALM_TEMPOASYNC parameter specifies the time-out, in seconds, before
the exit for alarm requests.
The allowed values are 10 to 120 seconds. The default is 120 seconds.
This parameter can be modified by SMF.

TMP_ALM_TEMPOPOLLING
The TMP_ALM_TEMPOPOLLING parameter specifies the time, in seconds, between
two pollings of the ALM adapter.
The allowed values are 10 to 300 seconds. The default is 300 seconds.
This parameter can be modified by SMF.

TMP_ALM_TEMPOTIMER
The TMP_ALM_TEMPOTIMER parameter specifies the time-out, in seconds, that is to
be used for sending alarms from the buffer.
The allowed values are 1 to 10 seconds. The default is 2 seconds.
This parameter can be modified by SMF.

TMP_CDNDATABLOCKSIZE
The TMP_CDNDATABLOCKSIZE parameter specifies the number of data blocks
received from CDN.
The allowed values are 10 to 100. The default is 100.
This parameter can be modified by SMF.

....................................................................................................................................................................................................................................
1350 OMS 7-9
8DG42227DAAA 9.6
Issue 3 December 2012
1350 OMS PKT Parameters 1350 OMS PKT Parameter List

....................................................................................................................................................................................................................................
TMP_EML_TEMPOPOLLING
The TMP_EML_TEMPOPOLLING parameter specifies the time, in seconds, between
two pollings of the 1350OMS-EML adapter.
The allowed values are 10 to 300 seconds. The default is 300 seconds.
This parameter can be modified by SMF.

TMP_FORBIDDEN_COMMENT_CHAR
The TMP_FORBIDDEN_COMMENT_CHAR parameter specifies the characters that are
forbidden to be used within a comment.
The default forbidden characters are the following:
* % ' { } / / [ ] | = and a blank space
This parameter can be modified by SMF.

TMP_FORBIDDEN_LABEL_CHAR
The TMP_FORBIDDEN_LABEL_CHAR parameter specifies the characters that are
forbidden to be used in the user label.
The default forbidden characters are the following:
* % ' { } / / [ ] | = and a blank space
This parameter can be modified by SMF.

TMP_LINK_OVER_SDH_SYNCHRONIZATION_AT_STARTUP
The TMP_LINK_OVER_SDH_SYNCHRONIZATION_AT_STARTUP parameter
specifies whether synchronization with the 1350 OMS PKT for links over SDH should be
activated.
The allowed values are 0 and 1. A value of 0 is no, which does not activate
synchronization with the 1350 OMS PKT for links over SDH. A value of 1 is yes, which
activates synchronization with the 1350 OMS PKT for links over SDH. The default is 0.
This parameter can be modified by SMF.

TMP_LOG_BASED_SYNCHRONIZATION_AT_STARTUP
The TMP_LOG_BASED_SYNCHRONIZATION_AT_STARTUP parameter specifies
whether synchronization with the 1350 OMS PKT log for links over SDH and SDH
terminations should be activated.
The allowed values are 0 and 1. A value of 0 is no, which does not activate
synchronization with the 1350 OMS PKT log for links over SDH and SDH terminations.
A value of 1 is yes, which activates synchronization with the 1350 OMS PKT log for
links over SDH and SDH terminations. The default is 0.
This parameter can be modified by SMF.

....................................................................................................................................................................................................................................
7-10 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
1350 OMS PKT Parameters 1350 OMS PKT Parameter List

....................................................................................................................................................................................................................................
TMP_NE_UNDER_<application>_MANAGEMENT
The TMP_NE_UNDER_<application>_ MANAGEMENT parameter specifies whether
all of the NEs that are managed by the 1350 OMS PKT application are also managed by
the 1350 OMS SDH application.
The allowed values are 0 and 1. A value of 0 specifies that the NE is not managed by the
1350 OMS SDH . A value of 1 specifies that the NE is managed by the 1350 OMS SDH.
The default is 1.
This parameter is a Core NMA parameter. This parameter must be defined during
instantiation.

TMP_NML_TEMPOPOLLING
The TMP_NML_TEMPOPOLLING parameter specifies the time, in seconds, between
two pollings of the NML adapter.
The allowed values are 10 to 300 seconds. The default is 300 seconds.
This parameter can be modified by SMF.

TMP_REMOTENAMINGEMLFILE
The TMP_REMOTENAMINGEMLFILE parameter specifies the name of the file that
contains the IOR of the 1350OMS-EML IM naming service. This file is retrieved from
the 1350OMS-EML IM machine using ftp.
The default is /tmp/naming.ref
This parameter can be modified by SMF.

TMP_SDH_TERM_SYNCHRONIZATION_AT_STARTUP
The TMP_SDH_TERM_SYNCHRONIZATION_AT_STARTUP parameter specifies
whether synchronization with the 1350 OMS PKT for SDH termination should be
activated.
The allowed values are 0 and 1. A value of 0 is no, which does not activate
synchronization with the 1350 OMS PKT for SDH termination. A value of 1 is yes, which
activates synchronization with the 1350 OMS PKT for SDH termination. The default is 0.
This parameter can be modified by SMF.

TMP_SE_ACCESSCT
The TMP_SE_ACCESSCT parameter specifies whether the session access control should
be activated.
The allowed values are 0 and 1. A value of 0 is false, which does not activate the session
access control. A value of 1 is true, which activates session access control. The default is
1.
This parameter can be modified by SMF.

....................................................................................................................................................................................................................................
1350 OMS 7-11
8DG42227DAAA 9.6
Issue 3 December 2012
1350 OMS PKT Parameters 1350 OMS PKT Parameter List

....................................................................................................................................................................................................................................
TMP_TRACELEVEL
The TMP_TRACELEVEL parameter specifies the trace level for the 1350 OMS PKT
trace.
The allowed values are 1 to 8. The default is 1.
This parameter can be modified by SMF.

TMP_TRACEMAXLINECOUNT
The TMP_TRACEMAXLINECOUNT parameter specifies the line number for the 1350
OMS PKT trace file.
The allowed values are 1000 to 10000. The default is 10000.
This parameter can be modified by SMF.

TMP_WAIT_EOT_SYNCHRO_STARTUP
The TMP_WAIT_EOT_SYNCHRO_STARTUP parameter specifies whether core
technology should wait for the EOT manager prior to synchronizing NAPS and links.
The allowed values are 0 and 1. A value of 0 is no, which does not allow core technology
to wait for the EOT manager prior to synchronizing NAPS and links. A value of 1 is yes,
which does allow core technology to wait for the EOT manager prior to synchronizing
NAPS and links. The default is 0.
This parameter can be modified by SMF.

TMP_WAIT_MPLS_SYNCHRO_STARTUP
The TMP_WAIT_MPLS_SYNCHRO_STARTUP parameter specifies whether core
technology should wait for the MPLS manager prior to synchronizing at start up.
The allowed values are 0 and 1. A value of 0 is no, which does not allow core technology
to wait for the MPLS manager prior to synchronizing at start up. A value of 1 is yes,
which does allow core technology to wait for the MPLS manager prior to synchronizing
at start up. The default is 0.
This parameter can be modified by SMF.

TMP_OPERATOR_LOGGER_ENABLED
The TMP_OPERATOR_LOGGER_ENABLED parameter allows to manage the Operator
Logger application in 1350 OMS PKT.
It can assume two values :
• 0 : disabled
• 1 : enabled
The default value at installation time is disabled.

....................................................................................................................................................................................................................................
7-12 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
8 8350 OMS PKT Ethernet
1
Multi-Manager
Management
Configurations
Overview
Purpose
This chapter provides the administrator with the conceptual information for
Multi-Manager configurations for the 1350 OMS PKT application.

Contents

Multi-Manager Management Overview 8-2


Operational Guidelines 8-3

...................................................................................................................................................................................................................................
1350 OMS 8-1
8DG42227DAAA 9.6
Issue 3 December 2012
1350 OMS PKT Ethernet Multi-Manager Management Multi-Manager Management Overview
Configurations
....................................................................................................................................................................................................................................

Multi-Manager Management Overview


Multi-Manager Management definition
Multi-Manager Management is a state of network management in which an application,
such as the 1350 OMS PKT, manages part of the overall network (features, services) and
using another application, operating at EML layer, the user manages another part of the
overall network (features, services).

Mulit-Manager Management scenarios


The following Multi-Manager Management scenarios explain the most general operation
scenarios. These scenarios depict a Mutli-Manager environment in which operations
occur over the same Ethernet link, over Alcatel-Lucent Ethernet enabled NEs, and/or
along with the entities of Alcatel-Lucent NEs:
• In the first scenario, the management of services is performed through the 1350 OMS
PKT application. The management of some specific tuning operation is performed
through the EML/CT GUI.
• In the second scenario, the management of some features, such as the ETS
Transparent technology management, is performed through the 1350 OMS PKT
application. The management of other features, such as the ETB Bridging technology
management, is performed through the EML/CT GUI.
• In the third scenario, the management is performed through the 1350 OMS PKT
application; however, the completion and/or recovery of some actions is performed
through the EML/CT GUI in an emergency situation.
Note: When resource isolation occurs, the 1350 OMS PKT deduces that either the NE
or the network manager is unreachable. The 1350 OMS PKT application might not be
able to complete any future user request; therefore, the application informs the user
that the action is partially completed with a message such as the following:
Partially Implemented Service Creation.

....................................................................................................................................................................................................................................
8-2 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
1350 OMS PKT Ethernet Multi-Manager Management Operational Guidelines
Configurations
....................................................................................................................................................................................................................................

Operational Guidelines
Operational guidelines
The administrator must adhere to the following operational guidelines when working in
an Multi-Manager Management configuration:
• Any other operations that are performed through the EML/CT must be the customer's
responsibility and they must be agreed to by the Alcatel-Lucent local customer service
support team.
• The administrator must be aware of and manage the existing Ethernet traffic, the
Ethernet-enabled NEs, and the managed NE entities on the 1350 OMS PKT
application.
• The administrator must never change, and/or configure, and/or delete any entities that
are managed from the 1350 OMS PKT application by using the EML/CT. These
entities can be easily recognized. See “Identifying Ethernet-defined entities”
(p. 8-3) for details.
• If 1350 OMS PKT application could not complete any administrator request (for
example, it is in Partially Implemented/Deimplemented state), the administrator must
retry the request or return to the previous state (for example: go from Partially
Deimplemented to Defined state).
• If all of the operational rules have been followed and the administrator still does not
succeed with the request, the administrator must notify and work with the
Alcatel-Lucent local customer service support team.
In Multi-Manager Management environment, refer to the 1350 OMS PKT Guide for a
detailed explanation of the allowed and recommended operations for the 1350 OMS PKT
application and the EML/CT to ensure the proper operation of the Alcatel-Lucent
Ethernet-enabled NEs.

Identifying Ethernet-defined entities


Administrators who work on the EML/CT can recognize the Ethernet entities that the
1350 OMS PKT application defines and manages:
• Traffic Descriptor (ETS)
The names of the traffic descriptors that begin with 1350 OMS PKT or another
identifier that readily advertises that it is the 1350 OMS PKT application, such as
PKT, are those entities that the 1350 OMS PKT application creates.
For example: 1350OMSPKT #<number>
Where: 1350OMSPKT is the application and #<number> is the instance number of
the application that the NE defines.
The names of the Traffic Descriptors that do not resemble 1350 OMS PKT, such as
2xVC3 are those traffic descriptors that are created by the NM/CT.

....................................................................................................................................................................................................................................
1350 OMS 8-3
8DG42227DAAA 9.6
Issue 3 December 2012
1350 OMS PKT Ethernet Multi-Manager Management Operational Guidelines
Configurations
....................................................................................................................................................................................................................................
Important! The administrator must never change, and/or configure, and/or delete
any readily identifiable 1350 OMS PKT created entities because the 1350 OMS PKT
application will not be aligned to the NE.
• Color Profiles
• InFlows
When the user labels and traffic descriptors for the ETS InFlows begin with
1350OMSPKT #<number> or another identifier that readily identifies that it is the
1350 OMS PKT application, such as PKT, and the ETSinflow is of the format
ETSInFlow#<number>, the Inflow is created by the 1350 OMS PKT application.
Where: 1350OMSPKT is the application and #<number> is the instance number of
the application that the NE defines.
When the user labels or traffic descriptors for the ETS InFlows are blank or do not
resemble 1350 OMS PKT and the ETSinflow is of the format ETSInFlow#<number>,
the Inflow is created by the EML/CT.
Important! The administrator must not delete or modify through the EML/CT any
cross-connection entities that are associated to inflows and/or outflows that are
labeled 1350OMS-PKT #<instance number>.
• OutFlows
When the user labels and traffic descriptors for the ETS OutFlows begin with 1350
OMS PKT #<number> or another identifier that readily advertises that it is the 1350
OMS PKT application, such as PKT, and the ETSOutFlow is of the format
ETSOutFlow#<number>, the OutFlow is created by the 1350 OMS PKT application.
Where: 1350OMSPKT is the application and # is the instance number of the
application that the NE defines.
When the user labels or traffic descriptors for the ETS OutFlows are blank or do not
resemble 1350 OMS PKT and the OutFlow is of the format ETSOutFlow#<number>,
the OutFlow is created by the NM/CT.
Important! The administrator must not delete or modify through the EML/CT any
cross-connection entities that are associated to inflows and/or outflows that are
labeled 1350OMS-PKT #<instance number>.
• VlanTypeTable
• Traffic Descriptor (MPLS)
• TunnelName
The VC-LST and LSP_Tunnel are named something similar to the following:
135OMSPKT Tunnel #<number of TunneIIndex>

....................................................................................................................................................................................................................................
8-4 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
9 9350 OMS PKT MIB
1
Realignment and the ISA
Board

Overview
Purpose
This chapter provides the administrator with the conceptual information and the
associated tasks that pertain to the ISA Board for the 1350 OMS PKT application.

Contents

MIB Alignment and ISA Board Overview 9-2


Realign an ISA Board MIB 9-4

...................................................................................................................................................................................................................................
1350 OMS 9-1
8DG42227DAAA 9.6
Issue 3 December 2012
1350 OMS PKT MIB Realignment and the ISA Board MIB Alignment and ISA Board Overview

....................................................................................................................................................................................................................................

MIB Alignment and ISA Board Overview


MIB definition
A MIB is a Management Information Base, which is type of database that is used to
manage the devices in a communications network. It comprises a collection of objects in
a (virtual) database used to manage entities (such as routers and switches) in a network.

MIB realignment for a new ISA board


MIB realignment for a new ISA board that is under the management of the 1350 OMS
EML and the 1350 OMS PKT applications follows the same principals and procedures
that apply to any SNMP NE that is under 1350OMS-EML and 1350 OMS PKT control.
In addition, the same principals and procedures apply to any SNMP NE that the 1350
OMS EML and the 1350 OMS PKT applications control and to all instances when the
MIB of an SNMP NE under 1350 OMS EML and the 1350 OMS PKT application control
needs a full realignment after a MIB re-initialization.
The presence or the lack of the 1350 OMS PKT application is not relevant.

Operating principals
In general, several layers of management systems manage a network, the protection
mechanisms of the network reflect the same layering.
When a network is managed by the 1350 OMS EML for the element management layer
and by the 1350 OMS PKT for the Ethernet data networking management layer, both
layers supply the network protection mechanism:
• The first and main level of network protection, that is of the ISA boards, is through
the 1350 OMS EML.
The automatic and periodical MIB backup procedures of the 1350 OMS EML that are
available for both Q3 and SNMP NEs enables a periodic MIB backup. It also enables
the backup to be split into different sessions that are activated sequentially and to
define, for each session, the list of NEs whose MIBs are to be uploaded (backup)
periodically into the 1350 OMS EML MIB repository.
Splitting into different sessions can be used to organize the protection of the network
in different partitions and to perform the upload of the MIBs sequentially
partition-by-partition, to avoid a concentrated overload of the systems and of the
DCN. At any scheduled time, the MIB of all the SNMP NEs defined in the job are
always uploaded to the 1350 OMS EML, whether they are misaligned.
• The second level of network protection is through the 1350 OMS PKT application
and its Audit/Alignment/Reserve (AAR) feature.
Since the 1350OMS-EML MIB backup periodic procedure cannot protect the last
modifications in the MIB that were applied after the last periodic MIB backup, the
1350 OMS PKT application provides a way to audit the NE MIBs against their
internal database representations and to realign the detected differences.

....................................................................................................................................................................................................................................
9-2 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
1350 OMS PKT MIB Realignment and the ISA Board MIB Alignment and ISA Board Overview

....................................................................................................................................................................................................................................
It further protects the NEs that are under its control, but only for misalignments due to
1350 OMS PKT operations. Important! Other than through the 1350 OMS PKT
application, no means exists to protect the last modifications that were applied after
the last MIB backup that occurred in the NE.

Categories of misalignment
The NE MIB audit for the 1350 OMS PKT application can detect the following categories
of misalignments:
• The D+ misalignment occurs when a resource exists in the 1350 OMS PKT database,
but not in the NE MIB. This misalignment typically occurs when the 1350 OMS PKT
has implemented some Ethernet service after the MIB backup and the MIB file is
restored in the NE or whenever services or generic resources are manually removed
by the 1350OMS-EML or the CT without involving the 1350 OMS PKT.
The 1350 OMS PKT application can realign a D + misalignment can be realigned by
activating a simple Align down procedure.
• The D- misalignment occurs when a resource exists in the NE MIB but not in the
1350 OMS PKT database. This misalignment typically occurs when the 1350 OMS
PKT application has de-implemented some Ethernet service after the MIB backup and
the MIB file is restored in the NE or whenever services or generic resources are
created in the NE MIB by 1350OMS-EML or CT without involving the 1350 OMS
PKT.
The 1350 OMS PKT can reserve these resources in its internal database to avoid using
them for to implement its services.
• The D misalignment occurs hen a resource exists in both the NE MIB and in the 1350
OMS PKT database, but it differs. This misalignment typically occurs whenever
services or generic resources are modified in the NE MIB by the 1350OMS-EML or
the CT without involving the 1350 OMS PKT.
The realignments for a D misalignment are best done from the same system that
originated the misalignment, which is the 1350OMS-EML or the CT.

....................................................................................................................................................................................................................................
1350 OMS 9-3
8DG42227DAAA 9.6
Issue 3 December 2012
1350 OMS PKT MIB Realignment and the ISA Board Realign an ISA Board MIB

....................................................................................................................................................................................................................................

Realign an ISA Board MIB


When to use
Use this task to realign an ISA board MIB that is under the control of the 1350OMS-EML
and 1350 OMS PKT applications.

Related information
See the following topic in this document:
• “MIB Alignment and ISA Board Overview” (p. 9-2)
For details about how to operate the AAR capabilities in the 1350 OMS PKT, as well as
activate a periodic MIB backup and MIB restore in the 1350 OMS EML, refer to the 1350
OMS EML Guide and 1350 OMS PKT Guide.

Before you begin


This task assumes the following in regard to the initial state of the ISA board and the
MIB:
• The ISA board has already been replaced or its MIB has already been reinitialized.
• A periodic MIB backup of the ISA board has been activated in the 1350 OMS EML
and the relevant MIB file is stored in the 1350 OMS EML MIB repository.

Task
Complete the following steps to realign the ISA board MIB:
...................................................................................................................................................................................................

1 From the 1350 OMS EML application and the relevant NE EMLUSM, launch the NE MIB
Restore.
...................................................................................................................................................................................................

2 From the 1350 OMS PKT application, perform an Audit of the relevant ISA NE.
Result: If the Audit does not detect any differences, this task is completed.
If the Audit does detect differences, go to Step 3.
...................................................................................................................................................................................................

3 For each D- misalignment that the Audit detects, do one of the following:
1. Reserve the resource from the 1350 OMS PKT application.
2. Remove the resource from the NE MIB by using the 1350 OMS EML application and
the relevant NE EMLUSM.

....................................................................................................................................................................................................................................
9-4 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
1350 OMS PKT MIB Realignment and the ISA Board Realign an ISA Board MIB

....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

4 For each D misalignment that the Audit detects, use the 11350 OMS EML application and
the relevant NE EMLUSM to do one of the following:
1. Realign the difference to the 1350 OMS PKT.
2. Remove the difference from the NE MIB. (The D misalignment is changed into a D+
misalignment.)
...................................................................................................................................................................................................

5 For the whole set of D+ misalignments that the Audit detects, perform an Align down
procedure.
...................................................................................................................................................................................................

6 Perform a final audit for a further alignment check.


If differences are not noted, this task is completed.
If any difference (D+ misalignments or D- misalignment) is found again, repeat Step 3 to
Step 6 until a full alignment occurs.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS 9-5
8DG42227DAAA 9.6
Issue 3 December 2012
1350 OMS PKT MIB Realignment and the ISA Board Realign an ISA Board MIB

....................................................................................................................................................................................................................................

....................................................................................................................................................................................................................................
9-6 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
10 10 OMS PKT
1350
AlignDBSDHPathID Tool

Overview
Purpose
This chapter provides the administrator with the conceptual information and the
associated tasks that pertain to the AlignDBSDHPathID tool for the 1350 OMS PKT
application.

Contents

AlignDBSDHPathID Overview 10-2


Run AlignDBSDHPathID Tool 10-3

...................................................................................................................................................................................................................................
1350 OMS 10-1
8DG42227DAAA 9.6
Issue 3 December 2012
1350 OMS PKT AlignDBSDHPathID Tool AlignDBSDHPathID Overview

....................................................................................................................................................................................................................................

AlignDBSDHPathID Overview
AlignDBSDHPathID tool definition
The AlignDBSDHPathID tool is a shell script that the administrator can use to align the
1350 OMS PKT application database to the 1350 OMS SDH database.

AlignDBSDHPathID tool operating principals


The AlignDBSDHPathID tool is run off line.
The AlignDBSDHPathID can be run following conditions occur:
• An SDH Path that is under 1350 OMS PKT control (and known as Link Over SDH)
has been deleted and re-created from the 1350 OMS SDH.
• The SDH path that is deleted and has been recreated from 1350 OMS SDH must have
the same characteristics.
Example: the SDH path must have the same User Label, the same end points, the
same rate.
• The Link Over SDH in the 1350 OMS PKT is visible to both the Core USM and to
the Eot USM.
• The Link Over SDH in the Core USM is marked as not Consistent.

AlignDBSDHPathID tool location and execution


The AlignDBSDHPathID resides in the following directory:
/usr/Systems/<NMS_INSTANCE>/script/common
The tool is executed by way of the following command line:
./AlignDBSDHPathId.sh <SDH Path User Label> <New SDH Path Id>
<New SDH Path FDN>

....................................................................................................................................................................................................................................
10-2 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
1350 OMS PKT AlignDBSDHPathID Tool Run AlignDBSDHPathID Tool

....................................................................................................................................................................................................................................

Run AlignDBSDHPathID Tool


When to use
Use this task to align the 1350 OMS PKT application database to the 1350 OMS SDH
database..

Related information
See the following topic in this document:
• “AlignDBSDHPathID Overview” (p. 10-2)

Before you begin


This task assumes the following in regard to the initial state of the ISA board and the
MIB:
• The ISA board has already been replaced or its MIB has already been reinitialized.
• A periodic MIB backup of the ISA board has been activated in the 1350 OMS EML
and the relevant MIB file is stored in the 1350 OMS EML MIB repository.

Task
Complete the following steps to align the 1350 OMS PKT application database to the
1350 OMS SDH database.
...................................................................................................................................................................................................

1 Verify that an SDH path has been deleted from the 1350 OMS SDH.
...................................................................................................................................................................................................

2 Verify that the corresponding Link Over SDH does not disappear from the 1350 OMS
PKT and that it becomes notConsistent.
...................................................................................................................................................................................................

3 Create a new SDH path in the 1350 OMS SDH that has exactly the same characteristics
as the SDH path that was previously deleted.
Note: The SDH Path creation can be performed when 1350 OMS PKT application is up
or down. In either case, the 1350 OMS PKT application is not aware of the newly
recreated path.
...................................................................................................................................................................................................

4 Retrieve from the 1350 OMS SDH the SDHPathUserLabel, theSDHPathId, and the
SDHPathFDN.
To retrieve the SDH Path User Label on the 1350 OMS SDH, select the created path and
select the SHOW/SET ATTRIBUTES window. Select the Specific panel. The User Label at
the end of the list is the value to insert as the parameter when running the script.

....................................................................................................................................................................................................................................
1350 OMS 10-3
8DG42227DAAA 9.6
Issue 3 December 2012
1350 OMS PKT AlignDBSDHPathID Tool Run AlignDBSDHPathID Tool

....................................................................................................................................................................................................................................
To retrieve the SDH Path ID on the 1350 OMS SDH, select the created path and select the
SHOW/SET ATTRIBUTES window. Select the Miscellaneous panel. The Path ID at the end
of the list is the value to insert as the parameter when running the script.
To retrieve the SDH Path FDN on the 1350 OMS SDH, select the created path and select
the View* ⇒ *Report* ⇒ *full on selected* window. The Path FDN is the value to insert
as the parameter when running the script.
...................................................................................................................................................................................................

5 Put the 1350 OMS PKT application in DB_ONLY mode


Start the Process Monitoring Control application.
Follow this path:
Action ⇒ Set Run Level ⇒ <application_instance> ⇒ 4 DB-Only
Confirm the selection on the message box.
...................................................................................................................................................................................................

6 Enter the following command lines to change directories and execute the tool:
cd /usr/Systems/<NMS_INSTANCE>/script/common
./AlignDBSDHPathId.sh <SDH Path User Label> <New SDH Path Id>
<New SDH Path FDN>
...................................................................................................................................................................................................

7 Restart the 1350 OMS PKT application


E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
10-4 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Part III: Basic Functions

Overview
Purpose
This document part provides a detailed description about the basic functions of the 1350
OMS PKT application.

Contents

Chapter 11, Generalities 11-1


Chapter 12, Managing your Network 12-1
Chapter 13, Network Organization Management 13-1
Chapter 14, Transport Link Management 14-1
Chapter 15, MPLS Provisioning Management 15-1
Chapter 16, T-MPLS Provisioning Management 16-1
Chapter 17, EVC over T-MPLS 17-1
Chapter 18, End to End Ethernet Provisioning Management 18-1
Chapter 19, Bridge Network Management 19-1
Chapter 20, Provider Backbone Bridge Network Management 20-1
Chapter 21, Broadcast TV Service Management 21-1
Chapter 22, Network Supervision 22-1
Chapter 23, Network Utilities 23-1
Chapter 24, Operation, Administration, and Maintenance (OAM) Management 24-1
Chapter 25, Circuit Emulation Service Management 25-1

...................................................................................................................................................................................................................................
1350 OMS III-1
8DG42227DAAA 9.6
Issue 3 December 2012
Basic Functions Overview

....................................................................................................................................................................................................................................

....................................................................................................................................................................................................................................
III-2 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
11 Generalities
11

Overview
Purpose
This chapter gives general information about 1350 OMS PKT application.
This chapter presents the application product, provides basic concepts, and introduces the
functional domain.

Contents

About 1350 OMS PKT application 11-3


Main features 11-3
Management Layers 11-5
Main concepts 11-6
Network architecture overview 11-7
Ethernet Services Attributes 11-12
Classification of Ethernet Services 11-15
Definition of Ethernet Services by MEF 11-27
Network Topology Description 11-30
How to access the application 11-38
Web access 11-38
The graphical interface (MS-GUI) 11-39
Confirm the action 11-40
The application interfaces 11-42
Software interfaces 11-42
Multi-Manager environment 11-44
Functional Domain 11-45
Overview about functional domains 11-45
Network Topology Construction 11-47

...................................................................................................................................................................................................................................
1350 OMS 11-1
8DG42227DAAA 9.6
Issue 3 December 2012
Generalities Overview

....................................................................................................................................................................................................................................

Traffic Management 11-53


MPLS Management 11-65
Maintenance Management 11-69
User Profile Management 11-71

....................................................................................................................................................................................................................................
11-2 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Generalities Main features
About 1350 OMS PKT application
....................................................................................................................................................................................................................................

About 1350 OMS PKT application

Main features
General information
This chapter gives general information about the 1350 OMS PKT.
1350 OMS PKT application is a Network Management system belonging to
Alcatel-Lucent 1350 OMS product family.
1350 OMS PKT software is optionally installed as an add-on to the 1350 OMS overall
product.

Main network operations


1350 OMS PKT manages Ethernet Networks in a metro area network (MAN)
environment.
1350 OMS PKT is designed to establish Ethernet end-to-end connections based on
Connection Oriented and Connection Less technologies.).
1350 OMS PKT manages Ethernet Networks functionalities in term of service
provisioning, maintenance, and performance monitoring:
• Network discovery and synchronization.
• Connectivity routing and provisioning.
• Fault management and performance monitoring.
• Network audit, alignment, and recovery.

Supported technologies
Connections can be carried over different transport technologies:
• SDH.
• SONET.
• Ethernet Cables.
• WDM.
• MPLS.
• T-MPLS.
• VPLS.
• RPR-like.

Supported equipments
The 1350 OMS PKT manages Alcatel-Lucent equipments and SNMP devices coming
from different vendors.

....................................................................................................................................................................................................................................
1350 OMS 11-3
8DG42227DAAA 9.6
Issue 3 December 2012
Generalities Main features
About 1350 OMS PKT application
....................................................................................................................................................................................................................................
1350 OMS PKT manages the complete family of Ethernet ISA boards (that include
different types).
1350 OMS PKT supports overall fault, performance, and security management.
The MPLS, T-MPLS, and RPR-like transport layers are managed by 1350 OMS PKT as a
server application for the Ethernet client layer.

Open architecture
The 1350 OMS PKT can act as agent for service applications like 1355VPN (Virtual
Private Network).
In a large network architecture, 1350 OMS PKT can also be accessed by external OSs.ì
by North Bound Interface (NBI).
The 1350 OMS PKT adheres to standards and recommendations of CCITT, ETSI, IEEE,
MEF.

....................................................................................................................................................................................................................................
11-4 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Generalities Management Layers
About 1350 OMS PKT application
....................................................................................................................................................................................................................................

Management Layers
Management Layer description
The network management is split into four layers.

Physical Layer
It concerns the physical equipment.

Element Management Layer (EML)


The EML manages each Network Element (NE) on an individual basis. The EML
supports an abstraction of the functions provided by the Physical Layer.
On a devolved basis from the management layer, the EML has a set of element managers
that are individually responsible for a subset of NEs.

Network Management Layer (NML)


NML has the responsibility for the management of a set of NEs. As presented by the
EML, the management is accomplished both on a single NEs or a set of NEs. NML is not
concerned with how a particular element provides services internally.
Functions addressing the management on a wide geographical area are located at this
layer. Complete visibility of the whole network is typical and a vendor independent view
is maintained.

Service Management Layer (SML)


SML offers services such as network analysis or Virtual Private Network (VPN)
management.

....................................................................................................................................................................................................................................
1350 OMS 11-5
8DG42227DAAA 9.6
Issue 3 December 2012
Generalities Main concepts
About 1350 OMS PKT application
....................................................................................................................................................................................................................................

Main concepts
Ethernet Services:
An Ethernet Service is an end-to-end that involves two or more end points. The Ethernet
Service is characterized by an established topology, a quality of service (QoS) and an
internal defined Ethernet packet forwarding rule.
The Ethernet Services are implemented: directly over SDH network layer (GFP or
LAPS), over an intermediate MPLS network layer, over an intermediate RPR-like ring or
directly over a cable. An Ethernet Service can use every type of combination of these
network support layers.
A fundamental aspect of Ethernet Services is the Ethernet Virtual Connection (EVC).

Ethernet Virtual Connections


An Ethernet Virtual Connection (EVC) is an Ethernet end-to-end connection. An EVC has
a specified topology (Point to point, Routed multipoint and Any to any) and a packet
forwarding rule (unicast, multicast, broadcast).
An EVC is an association of two or more UNIs. Associated UNIs are said to be “in the
EVC”.
Connectivity between UNIs is specified by the Ethernet Virtual Connection (EVC). An
EVC can have a number of EVC types and a number of service attributes.
One or more Ethernet Virtual Connection (EVC) form an Ethernet Service.
Each unidirectional end-to-end connection belonging to an EVC is called Ethernet
Segments: a Point to point EVC is formed by two unidirectional Ethernet Segments.

Ethernet Segments
An Ethernet Segment has associated the quality of service (QoS) value, the bandwidth,
and the forwarding rules. The QoS value can be: Guaranteed, Best Effort, Regulated. The
forwarding rule is based on VLAN classification.
The quality of service information is collected in a “Traffic Descriptor” entity. The
forwarding rule (or segregation rules) are collected in a “Traffic Classifier” entity.
The Ethernet Segment is the elementary connection managed by 1350 OMS PKT.

....................................................................................................................................................................................................................................
11-6 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Generalities Network architecture overview
About 1350 OMS PKT application
....................................................................................................................................................................................................................................

Network architecture overview


Expand the capabilities
Network users are searching ways to expand the capability in offering transport services
to Service and Application Providers: in such way they try to generate new revenues.
“To expand the capabilities” means to offer new advanced communication services at a
lower price than the analogous service offered before (that is leased lines). To reach the
goal of cost reduction, the transport network resources have to be used in more efficient
way.
The management has to be able to reduce the cost in defining and maintaining the new
services. In the majority of cases, a network provider use a mix of technologies to provide
the best solution: ATM, Ethernet, MPLS,….
SDH or SONET-based networks are used in majority of the Metro Access.
The Ethernet networks used at transport layer imply a lower cost of physical interface in
terms of single interface cost and number of interfaces. Deliver must have high capacity,
scalable bandwidth with low latency and jitter.
The user requests for the support of Ethernet interface as well as the transport of Ethernet
frames.

Dynamic provisioning
The static provisioning of bandwidth (in SDH) has the following shortcomings:
• No burst capability.
• Unused bandwidth is wasted.
• No networking, that is the transport network provides “pipes”.
• As the number of Ethernet ports grows, the number of “pipes” increases too (no
scaling).

Example of network architecture


The following figure summarizes the network architecture supporting Ethernet Services:

....................................................................................................................................................................................................................................
1350 OMS 11-7
8DG42227DAAA 9.6
Issue 3 December 2012
Generalities Network architecture overview
About 1350 OMS PKT application
....................................................................................................................................................................................................................................

Figure 11-1 Global Network view

Legacy network
O-MSN / Isa Fast / Gigabit Ethernet

O-MSN/Isa PREA/ISA ES 16

1660SM/ISA_PR
ISAPR ring
Customer Equip. (CE)
Bridge network

O-MSN/ISA ES 1-4-16

Two level back-hauling

Simple back-hauling
MPLSnetwork

Topologies and services


Here are reported definition and classification of topologies and services in use:
• (*) EPL or EVPL can be managed using “port forwarding” or “port + VLAN”
forwarding: in this case more than one Service or EVC can be defined on a single
Ethernet port.
• (**) In 1350 OMS PKT is not distinguished when the back-hauling service is related
to a single customer EVP Hub or more than one customer (BA).
• (***) Both Connection Oriented and Connection-less Networks; MAC Bridging
(802.1D based) is considered a Private Service.
• (****) In 1350 OMS PKT the VPHS sends each Ethernet frame to all other port
belonging to VPHS service. In ISA PR R1.0, in R1.1 the selective forwarding is
implemented.
• (*****) Both Connection Oriented and Connection-less Networks; Two types of
Bridging are considered Virtual: Virtual Bridging (802.1Q based) and Provider
Bridging (802.1ad based).

Transport layer
The transport of Ethernet frames can be supported:
• Mapping directly on SDH layer (GFP mapping on SDH paths),.
• Implementing an MPLS layer (MPLS layer based on SDH paths),.
....................................................................................................................................................................................................................................
11-8 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Generalities Network architecture overview
About 1350 OMS PKT application
....................................................................................................................................................................................................................................
• Using the proprietary Resilient Packet Ring (RPR-like based on SDH paths).
• Whatever combination of them.
Each layer type supports specific characteristics.

SDH layer
Using directly SDH:
• In Connection Oriented approach:
– There is no directionality differentiation (both directions have the same
bandwidth).
– The granularity is reduced to 2 Mbit/s (VC12 when Lower Order packet or virtual
concatenation is used.
• In Connection-less approach (Ethernet bridge mode):
– A different network approach is followed: only the best effort traffic can be
supplied.
– The SDH path is used as a “trunk” where all the Ethernet frames coming for the
different ports are inserted. In case of 802.1D or 802.1Q, only frames belonging to
a single customer are inserted. In case of usage of 802.1ad (Stacked VLAN),
frames belonging to more customers are inserted.

MPLS/T-MPLS layer
Using MPLS, the user can:
• have directionality differentiation (the opposite direction can have different
bandwidth).
• improve the granularity until 64Kbit/s level.
Transport Multi Protocol Label Switching (T-MPLS) is a packet transport network
technology. T-MPLS consists in tagging the carried packets with a label and switching
those packets according to the label information. The T-MPLS packets are based on
MPLS frame formats: for example, the information cells can be Ethernet frames with
Martini encapsulation or can be ATM cells with an additional MPLS header.

MPLS/T-MPLS comparison
With respect to MPLS, the T-MPLS solution adds carrier-class OAM and survivability
management.
The OAM capabilities enable status and performance reports. The OAM capabilities are
confined within the T-MPLS layer and do not require deeper packet inspection. The OAM
capabilities enable also Fault Localization.
The survivability capabilities enable both protection switching and restoration. The
T-MPLS data plane can be operated statically through network management or
dynamically through GMPLS control plane. The granularity of the separation between the
T-MPLS static and dynamic networks is on port basis. The operator configures which
ports are reserved for dynamic LSP setup through GMPLS and which ports are reserved
for static LSP setup through management system.
....................................................................................................................................................................................................................................
1350 OMS 11-9
8DG42227DAAA 9.6
Issue 3 December 2012
Generalities Network architecture overview
About 1350 OMS PKT application
....................................................................................................................................................................................................................................
The network vision
The network vision is based on the multi-service node concept. The T-MPLS is the
converged packet network technology.
The T-MPLS is able to support any service type
• Ethernet
• IP/MPLS
• FR
• ATM
• TDM via CES
T-MPLS nodes can be located either at the edge or in the middle of the T-MPLS network.
They are:
• Label Edge Router (LER) at the edge of the network.
• Label Switch Router (LSR) in the middle of the network.
T-MPLS sections between nodes can be physical or supported by a server layer (TDM,
WDM).

T-MPLS networking layers


T-MPLS defines at two networking layers:
• the PseudoWire (PW) layer, also called channel layer.
• the Tunnel layer, also called path layer.
Tunnels are point-to-point logical connections between NNI ports. The route of the
tunnels spans one or more T-MPLS sections.
PseudoWires are point-to-point logical connections between NNI ports, usable by only
one service. The route of PseudoWires spans one or more T-MPLS sections and/or
tunnels.
The same tunnel can carry one or more PseudoWires.
The Tunnel purpose is to enhance scalability of T-MPLS logical connections.
The PseudoWire purpose is to carry one service across the T-MPLS network.
Both PseudoWires and Tunnels are Label Switched Paths (LSP).
The PseudoWire and the Tunnel terminations correspond to:
• A label Push at the ingress LER.
• A label Pop at the egress LER.
The cross connections (XC) correspond to a label swap at the LSR.

....................................................................................................................................................................................................................................
11-10 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Generalities Network architecture overview
About 1350 OMS PKT application
....................................................................................................................................................................................................................................
RPR ring
Proprietary RPR ring (RPRring is a technology mixed between RPR and MPLS
implemented by ISA PR), makes possible:
• To have low level of granularity.
• To have directionality differentiation (the opposite direction can have different
bandwidth).

End to End services


The classification features is the management of traffic type. the of traffic type can be
guaranteed, regulated, and best effort. The classification features depend on the board
type. The classification features do not depend on the used transport layer.
An Ethernet End to End service can use all the defined transport server layers: transparent
SDH, then cross the proprietary RPR or MPLS ring and then use an LSP (MPLS network)
to reach the final destination port.
Introducing the ISA ES support and management also a “connection-less subnetwork”
can be crossed by an end-to-end service.
The 1350 OMS PKT supplies an integrated view allowing in a simple way:
• To create Ethernet connectivity (EVC).
• To define new services associating EVC.
• To maintain the services.
Furthermore, must be managed the MPLS transport layer and the proprietary RPR ring.

....................................................................................................................................................................................................................................
1350 OMS 11-11
8DG42227DAAA 9.6
Issue 3 December 2012
Generalities Ethernet Services Attributes
About 1350 OMS PKT application
....................................................................................................................................................................................................................................

Ethernet Services Attributes


Bundling Service Attribute
The Bundling attribute makes configurable a UNI. The Bundling allow the mapping of
more than one CE-VLAN Id to a particular EVC at the UNI.
The Bundling service attribute is independent of the EVCs at the UNI.
An EVC with more than one CE-VLAN Id mapping to it has the CE-VLAN Id
Preservation Service Attribute. The list of CE-VLAN IDs mapped to the EVC is the same
at each UNI in the EVC.
The Figure 11-2, “Example of Bundling” (p. 11-12) shows an example of Bundling. In
this example, UNI A and UNI B have the bundling attribute as seen from the mapping for
EVC1. EVC1 has the CE-VLAN Id Preservation attribute.

Figure 11-2 Example of Bundling

All to One Bundling Service Attribute


“All to One Bundling” is a special case of Bundling. All to One Bundling is sufficiently
important to be called out as a separate attribute.
....................................................................................................................................................................................................................................
11-12 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Generalities Ethernet Services Attributes
About 1350 OMS PKT application
....................................................................................................................................................................................................................................
When a UNI has the All to One Bundling attribute set to TRUE the following conditions
must be verified:
• All CE-VLAN IDs must map to a single EVC at the UNI.
• The All to One Bundling service attribute is independent of the EVCs at the UNI.
• The EVC at the UNI must have the CE-VLAN Id Preservation Service Attribute (see
Section “Modify an edge port” (p. 18-170)).
• The list of CE-VLAN IDs mapped to the EVC must include all CE-VLAN IDs and be
the same at each UNI in the EVC.
• The UNIcannot have Service Multiplexing.
• All UNIs in the EVC must have the All to One Bundling Service Attribute.

Multiplexing Service Attribute


A UNI with the Service Multiplexing attribute must be configurable to support multiple
EVCs. Point to point EVCs and Multipoint EVCs can be multiplexed in any combination
at a UNI. Figure 11-3, “Example of Service Multiplexing on UNI A” (p. 11-14) shows an
example of Service Multiplexing. In this example, CE A is attached to the MEN through a
Gigabit Ethernet UNI. The CEs B, C, and D are attached through 100 Mbit/s Ethernet
UNIs.
Using Service Multiplexing, Point to point EVCs to each of B, C, and D can be
implemented with a single physical port on the CEA.

....................................................................................................................................................................................................................................
1350 OMS 11-13
8DG42227DAAA 9.6
Issue 3 December 2012
Generalities Ethernet Services Attributes
About 1350 OMS PKT application
....................................................................................................................................................................................................................................

Figure 11-3 Example of Service Multiplexing on UNI A

....................................................................................................................................................................................................................................
11-14 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Generalities Classification of Ethernet Services
About 1350 OMS PKT application
....................................................................................................................................................................................................................................

Classification of Ethernet Services


Definition of Service
The Ethernet Services are based on EVC. The service is a container of one or more EVCs.
The combining of more than one EVC defines a high number of possible services.
A specific type of service introduces restriction on the EVC types to be used for that
service.
If a different classification is required, the user can adapt these definitions and then the
related implementation in a simple way.
Each service requires the 1350 OMS EML capacity to collect Performance data to verify
the defined QoS level. Furthermore 1350 OMS EML has to be clearly shown in case of
network failure the affected services: both alarms and specific performance data are used
to guarantee the maintenance features.

Supported EVC
The main items managed by 1350 OMS PKT are the EVC. The following types of EVC
are managed:
• Point to point.
• Routed multi-point: an EVC termination has the role of “root” and the other the role
of “leaf”.
• Any to any is a bus like topology: each EVC termination can communicate with the
others.
The service classification that follows is one of the possible service classification used as
a basis.
Each Service is shortly described together with its topological characteristics, technology
dependencies and MEF attribute mapping for UNI and for EVC.

....................................................................................................................................................................................................................................
1350 OMS 11-15
8DG42227DAAA 9.6
Issue 3 December 2012
Generalities Classification of Ethernet Services
About 1350 OMS PKT application
....................................................................................................................................................................................................................................
EVPL service type

Table 11-1 EVPL /ETS and ETB Provider Bridge

Service type: EVPL (Ethernet Virtual Private Line).

Technology: ETS and ETB Provider Bridge.

Main characteristics:

Service characteristics: UNI characteristics: EVC characteristics:


• UNI to UNI with one or more TL • At least one UNI with Service • EVCType = Point to point.
(SDH, ETH, MPLS). Multiplexing = Y. • CE-VlanPreservation = Y/N.
• Classification = Y/N. • Bundling = Y/N. • CE-VlanCosPreservation = Y/N.
• QoS = all types. • AllToOneBundling = N. • UnicastDelivery = MAC ACL
• N.EVC = one or more. dependent.
• BwdPerUNI or BwdPerEvc or • MulticastDelivery = MAC ACL
BwdPerCoS. Dependent.
• CIR and PIR = All admitted • BroadcastDelivery = MAC ACL
combination. dependent.
• L2ControlProtocol = (See expected • L2ControlProtocol = (See expected
checks column). checks column).

Table 11-2 EVPL /ETB Virtual Bridge

Service type: EVPL (Ethernet Virtual Private Line).

Technology: ETB Virtual Bridge.

Main characteristics:

Not allowed.

Table 11-3 EVPL /ETB MAC Bridge

Service type: EVPL (Ethernet Virtual Private Line).

Technology: ETB MAC Bridge.

Main characteristics:

Not allowed.

....................................................................................................................................................................................................................................
11-16 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Generalities Classification of Ethernet Services
About 1350 OMS PKT application
....................................................................................................................................................................................................................................
EPTL service type

Table 11-4 EPTL /ETS

Service type: EPTL (Ethernet Private Transparent Line).

Technology: ETS.

Main characteristics:

Service characteristics: UNI characteristics: EVC characteristics:


• UNI to UNI with one TL (SDH). • two UNIs. • EVCType = Point to point.
• Classification = DontCare. • Service Multiplexing = N. • CE-VlanPreservation = Y.
• QoS = All Traffic is Guaranteed. • Bundling = N. • CE-VlanCosPreservation = Y.
• Private Transport Link. • AllToOneBundling = Y. • UnicastDelivery = DeliverUncond.
• N.EVC = 1. • MulticastDelivery = DeliverUncond.
• BwdPerUNI = FullTLBwd. • BroadcastDelivery = DeliverUncond.
• CIR = PIR = FullTLBwd. • L2ControlProtocol =
• L2ControlProtocol = equalOnAllInflows.
equalOnBothUNI. • (Tunnel all protocols).
• (PassToEvc for all protocols).

Table 11-5 EPTL /ETB Provider Bridge

Service type: EPTL (Ethernet Private Transparent Line).

Technology: ETB Provider Bridge.

Main characteristics:

Not allowed.

Table 11-6 EPTL /ETB Virtual Bridge

Service type: EPTL (Ethernet Private Transparent Line).

Technology: ETB Virtual Bridge.

Main characteristics:

Not allowed.

Table 11-7 EPTL /ETB MAC Bridge

Service type: EPTL (Ethernet Private Transparent Line).

Technology: ETB MAC Bridge.

Main characteristics:

Not allowed.

....................................................................................................................................................................................................................................
1350 OMS 11-17
8DG42227DAAA 9.6
Issue 3 December 2012
Generalities Classification of Ethernet Services
About 1350 OMS PKT application
....................................................................................................................................................................................................................................
EPL service type

Table 11-8 EPL /ETS and ETB Provider Bridge

Service type: EPL (Ethernet Private Line).

Technology: ETS and ETB Provider Bridge.

Main characteristics:

Service characteristics: UNI characteristics: EVC characteristics:


• UNI to UNI with one or more TL • two UNIs. • EVCType = Point to point.
(SDH, ETH, MPLS). • Service Multiplexing = N. • CE-VlanPreservation = Y/N.
• Classification = Y/N. • Bundling = Y/N. • CE-VlanCosPreservation = Y/N.
• QoS = all types. • AllToOneBundling = Y/N. • UnicastDelivery = MAC ACL
• N. EVC = 1,BwdPerUNI or dependent.
BwdPerEvc or BwdPerCoS. • MulticastDelivery = MAC ACL
• CIR and PIR = All admitted Dependent.
combination. • BroadcastDelivery = MAC ACL
• L2ControlProtocol = (See expected dependent.
checks column). • L2ControlProtocol = (See expected
checks column).

Table 11-9 EPL /ETB Virtual Bridge

Service type: EPL (Ethernet Private Line).

Technology: ETB Virtual Bridge.

Main characteristics:

Not allowed.

Table 11-10 EPL /ETB MAC Bridge

Service type: EPL (Ethernet Private Line).

Technology: ETB MAC Bridge.

Main characteristics:

Not allowed.

....................................................................................................................................................................................................................................
11-18 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Generalities Classification of Ethernet Services
About 1350 OMS PKT application
....................................................................................................................................................................................................................................
EVPLAN service type

Table 11-11 EVPLAN /ETS and ETB Provider Bridge

Service type: EVPLAN (Ethernet Virtual Private LAN).

Technology: ETS and ETB Provider Bridge.

Main characteristics:

Service characteristics: UNI characteristics: EVC characteristics:


• More than two UNIs with one or • Service Multiplexing = Y. • EVCType = Multipoint to multipoint.
more TL (SDH, ETH, MPLS). • Bundling = Y/N. • CE-VlanPreservation = Y/N.
• Classification = Y/N. • AllToOneBundling = Y/N. • CE-VlanCosPreservation = Y/N.
• QoS = all types. • N.EVC = one or more. • UnicastDelivery = MAC ACL
• BwdPerUNI or BwdPerEvc or dependent.
BwdPerCoS. • MulticastDelivery = MAC ACL
• CIR and PIR = All admitted Dependent.
combinations. • BroadcastDelivery = MAC ACL
• L2ControlProtocol = (See comment dependent.
in Notes column). • L2ControlProtocol = (See comment
in Notes column).
• In case of BwdProfilePerCos, inside
the same EVC, the same priority bit
configuration must not map different
QoS on a given UNI.

Table 11-12 EVPLAN /ETB Virtual Bridge

Service type: EVPLAN (Ethernet Virtual Private LAN).

Technology: ETB Virtual Bridge.

Main characteristics:

Not allowed.

Table 11-13 EVPLAN /ETB MAC Bridge

Service type: EVPLAN (Ethernet Virtual Private LAN).

Technology: ETB MAC Bridge.

Main characteristics:

Not allowed.

....................................................................................................................................................................................................................................
1350 OMS 11-19
8DG42227DAAA 9.6
Issue 3 December 2012
Generalities Classification of Ethernet Services
About 1350 OMS PKT application
....................................................................................................................................................................................................................................
Extended EVPL

Table 11-14 Extended EVPL /ETS and ETB Provider Bridge

Service type: Extended EVPL (Extended Ethernet Virtual Private Line).

Technology: ETS and ETB Provider Bridge.

Main characteristics:

Service characteristics: UNI characteristics: EVC characteristics:


• UNI to UNI with one or more TL • At least one UNI with Service • EVCType = Point to point.
(SDH, ETH, MPLS). Multiplexing = Y/N. • CE-VlanPreservation = Y/N.
• Classification = Yes. • Bundling = Y/N. • CE-VlanCosPreservation = Y/N.
• QoS = all types. • AllToOneBundling = Y/N. • UnicastDelivery = MAC ACL
• N.EVC = one or more. dependent.
• BwdPerUNI or BwdPerEvc or • MulticastDelivery = MAC ACL
BwdPerCoS. Dependent.
• CIR and PIR = All admitted • BroadcastDelivery = MAC ACL
combination. dependent.
• In case of BwdProfilePerCos, the
mapping of PrioBits to Qos is fully
free.
PolicyMode can be also =
IETFColorAware + ColorProfile.

Table 11-15 Extended EVPL /ETB Virtual Bridge

Service type: Extended EVPL (Extended Ethernet Virtual Private Line).

Technology: ETB Virtual Bridge.

Main characteristics:

Not yet supported.

Table 11-16 Extended EVPL /ETB MAC Bridge

Service type: Extended EVPL (Extended Ethernet Virtual Private Line).

Technology: ETB MAC Bridge.

Main characteristics:

Not allowed.

....................................................................................................................................................................................................................................
11-20 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Generalities Classification of Ethernet Services
About 1350 OMS PKT application
....................................................................................................................................................................................................................................
Extended EVPLAN service type

Table 11-17 Extended EVPLAN /ETS and ETB Provider Bridge

Service type: Extended EVPLAN (Extended Ethernet Virtual Private LAN).

Technology: ETS and ETB Provider Bridge.

Main characteristics:

Service characteristics: UNI characteristics: EVC characteristics:


• More than two UNIs with one or • Service Multiplexing = Y/N. • EVCType = Multipoint to multipoint.
more TL (SDH, ETH, MPLS). • Bundling = Y/N. • CE-VlanPreservation = Y/N.
• Classification = Y/N. • AllToOneBundling = Y/N. • CE-VlanCosPreservation = Y/N.
• QoS = all types. • N.EVC = one or more. • UnicastDelivery = MAC ACL
• BwdPerUNI or BwdPerEvc or dependent.
BwdPerCoS. • MulticastDelivery = MAC ACL
• CIR and PIR = All admitted dependent.
combinations. • BroadcastDelivery = MAC ACL
dependent.
• In case of BwdProfilePerCos, the
mapping of PrioBits to Qos is fully
FreePolicyMode = IETFColorAware
+ ColorProfile.

Table 11-18 Extended EVPLAN /ETB Virtual Bridge

Service type: Extended EVPLAN (Extended Ethernet Virtual Private LAN).

Technology: ETB Virtual Bridge.

Main characteristics:

Not yet supported.

Table 11-19 Extended EVPLAN /ETB MAC Bridge

Service type: Extended EVPLAN (Extended Ethernet Virtual Private LAN).

Technology: ETB MAC Bridge.

Main characteristics:

Not yet supported.

....................................................................................................................................................................................................................................
1350 OMS 11-21
8DG42227DAAA 9.6
Issue 3 December 2012
Generalities Classification of Ethernet Services
About 1350 OMS PKT application
....................................................................................................................................................................................................................................
HSI service type

Table 11-20 HSI /ETS and ETB Provider Bridge

Service type: HSI (High Speed Internet).

Technology: ETS and ETB Provider Bridge.

Main characteristics:

Service characteristics: UNI characteristics: EVC characteristics:


• 1 UNI root and more UNI leaves over • Root UNI with: • EVCType = Point to multipoint.
moreTL (SDH, ETH, MPLS). – Service Multiplexing = Y. • CE-VlanPreservation = Y/N.
• Classification = Y/N. – Bundling = Y/N. • CE-VlanCosPreservation = Y/N.
• QoS = all types. – AllToOneBundling = Y/N. • UnicastDelivery = DeliverUncond.
– N.EVC = one or more. • MulticastDelivery = DeliverUncond.
• Leaf UNI with: • BroadcastDelivery = DeliverUncond.
– Service Multiplexing = Y/N. • L2ControlProtocol = (See comment
– Bundling = Y/N. in Expected Checks column).

– AllToOneBundling = Y/N. • In case of BwdProfilePerCos, the


mapping of PrioBits to Qos is free.
– N.EVC = one or more.
• PolicyMode = IETFColorAware +
– BwdPerUNI or BwdPerEvc ColorProfile.
or BwdPerCoS.
– CIR and PIR = All admitted
combination.
– L2ControlProtocol = (See
comment in Expected Checks
column).

....................................................................................................................................................................................................................................
11-22 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Generalities Classification of Ethernet Services
About 1350 OMS PKT application
....................................................................................................................................................................................................................................

Table 11-21 HSI /ETS Multicast

Service type: HSI (High Speed Internet).

Technology: ETS Multicast.

Main characteristics:

Service characteristics: UNI characteristics: EVC characteristics:


• Multicast ETS only. • Root UNI with: • EVCType = Point to multipoint.
• 1 UNI root and more UNI leaves over – Service Multiplexing = Y. • CE-VlanPreservation = Y/N.
more TL (SDH, ETH, MPLS). – Bundling = Y/N. • CE-VlanCosPreservation = Y/N.
• Classification = Y. – AllToOneBundling = Y/N. • UnicastDelivery = DeliverUncondi-
• QoS = AllTypes. – N.EVC = one or more. tionally.

• Leaf UNI: • MulticastDelivery =


DeliverUnconditionally.
– No information as they are
Egress points for this Service. • BroadcastDelivery =
DeliverUnconditionally.
– BwdPerCoS only (defined
contextually to EVC • L2ControlProtocol = (See comment
definition). in Notes column).

– CIR and PIR = All admitted


combinations.
– L2ControlProtocol = (See
comment in Notes column).

Table 11-22 HSI /ETB Virtual Bridge

Service type: HSI (High Speed Internet).

Technology: ETB Virtual Bridge.

Main characteristics:

Not yet supported.

Table 11-23 HSI /ETB MAC Bridge

Service type: HSI (High Speed Internet).

Technology: ETB MAC Bridge.

Main characteristics:

Not allowed.

....................................................................................................................................................................................................................................
1350 OMS 11-23
8DG42227DAAA 9.6
Issue 3 December 2012
Generalities Classification of Ethernet Services
About 1350 OMS PKT application
....................................................................................................................................................................................................................................
BTV service type

Table 11-24 BTV /ETS Multicast

Service type: BTV (Broadcast Tele Vision).

Technology: ETS Multicast.

Main characteristics:

Service characteristics: UNI characteristics: EVC characteristics:


• Multicast ETS only. • Root UNI with: • EVCType = Point to multipoint.
• 1 UNI root. • Service Multiplexing = Y. • CE-VlanPreservation = Y/N.
• more than one UNI leaves over more • Bundling = Y/N. • CE-VlanCosPreservation = Y/N.
TL (SDH, ETH, MPLS). • AllToOneBundling = Y/N. • UnicastDelivery = DeliverUncondi-
• Classification = Y. • N.EVC = one or more. tionally.
• QoS = AllTypes. • Leaf UNI: • MulticastDelivery =
DeliverUnconditionally.
• No information as they are Egress
points for this Service. • BroadcastDelivery =
DeliverUnconditionally.
• BwdPerCoS only (defined
contextually to EVC definition). • L2ControlProtocol = (See comment
in Notes column).
• CIR and PIR = All admitted
combinations.
• L2ControlProtocol = (See comment
in Notes column).

Table 11-25 BTV /ETB Provider Bridge

Service type: BTV (Broadcast Tele Vision).

Technology: ETB Provider Bridge.

Main characteristics:

Service characteristics: UNI characteristics: EVC characteristics:


• One or Two UNI Roots. • Root UNI with: • EVCType = Point to multipoint.
• Many UNI as Leaves. – Service Multiplexing = Y. • CE-VlanPreservation = Y/N.
• In the scope of Provider Bridge, the – Bundling = Y. • CE-VlanCosPreservation = Y/N.
service emulates an Extended – AllToOneBundling = N. • UnicastDelivery = MAC ACL
EVPLAN. dependent.
– N.EVC = one or more.
• The addition of IGMP Snooping can • MulticastDelivery = MAC ACL
optimize the network usage. • Leaf UNI with:
dependent.
– Service Multiplexing = Y.
• BroadcastDelivery = MAC ACL
– Bundling = Y. dependent.
– AllToOneBundling = N.
– N.EVC = one or more.
– BwdProfile = All.

....................................................................................................................................................................................................................................
11-24 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Generalities Classification of Ethernet Services
About 1350 OMS PKT application
....................................................................................................................................................................................................................................

Table 11-26 BTV /ETB Virtual Bridge

Service type: BTV (Broadcast Tele Vision).

Technology: ETB Virtual Bridge.

Main characteristics:

Not allowed.

Table 11-27 BTV /ETB MAC Bridge

Service type: BTV (Broadcast Tele Vision).

Technology: ETB MAC Bridge.

Main characteristics:

Not allowed.

....................................................................................................................................................................................................................................
1350 OMS 11-25
8DG42227DAAA 9.6
Issue 3 December 2012
Generalities Classification of Ethernet Services
About 1350 OMS PKT application
....................................................................................................................................................................................................................................
Broadcast service type

Table 11-28 Broadcast /ETS

Service type: Broadcast.

Technology: ETS.

Main characteristics:

Service characteristics: UNI characteristics: EVC characteristics:


• One or Two UNI Roots. • Root UNI with: • EVCType = Point to multipoint.
• Many UNI as Leaves. – Service Multiplexing = Y/N. • CE-VlanPreservation = Y/N.
– Bundling = Y/N. • CE-VlanCosPreservation = Y/N.
– AllToOneBundling = Y/N. • UnicastDelivery = DeliverUncondi-
– N.EVC = one or more. tionally.

• Leaf UNI: • MulticastDelivery =


DeliverUnconditionally.
– No information as they are
Egress points for this Service. • BroadcastDelivery =
DeliverUnconditionally.
– BwdPerCoS only (defined
contextually to EVC • L2ControlProtocol = (See comment
definition). in Expected Checks column).

– CIR and PIR = All admitted


combinations.
– L2ControlProtocol = (See
comment in Notes column).

Table 11-29 Broadcast /ETB Provider Bridge

Service type: Broadcast.

Technology: ETB Provider Bridge.

Main characteristics:

Not allowed.

Table 11-30 Broadcast /ETB Virtual Bridge

Service type: Broadcast.

Technology: ETB Virtual Bridge.

Main characteristics:

Not allowed.

Table 11-31 Broadcast /ETB MAC Bridge

Service type: Broadcast.

Technology: ETB MAC Bridge.

Main characteristics:

Not allowed.

....................................................................................................................................................................................................................................
11-26 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Generalities Definition of Ethernet Services by MEF
About 1350 OMS PKT application
....................................................................................................................................................................................................................................

Definition of Ethernet Services by MEF


Main characteristics
The Services definitions are inspired by Service names provided in MEF standard
documentation. Such MEF Services are completed with the addition of Alcatel-Lucent
proprietary extensions to provide a large set of Services.
All the previous Service definitions become obsolete. This chapter, further than providing
the new Services meaning, also provides the way to migrate older definitions into new
ones.
The following table summarizes the main characteristics of the new services definition.

M. Old New Service Privacy. Band- Main characteristics. Service pattern.


E. Service Service Frame width
F. Type. Type. Delivery. Profile.

All-to-One-Bundling: YES.
Deliver Multiplexing: NO.
E- conditionally
E. Bundling: NO.
LINE. or 1 1
P. NA. uncondition- UNI. UNI. L2CP: Tunneling except A
(Point 1 Z 1
ally (unicast, PAUSE.
L. to PRIVATE PRIVATE
point). multicast, Preservation (VLAN or
broadcast). CoS): YES.
PolicyMode: ColorBlind.
All-to-One-Bundling: NO.
Deliver Multiplexing: YES.
E. E- conditionally
UNI. Bundling: YES or NO.
LINE. or
V. L2CP.: Discard or Peer. M M
NA. (Point uncondition- None. EVC. N
A Z
P. ally (unicast, Preservation (VLAN or
N

to CoS.
L. point). multicast, CoS): YES or NO.
broadcast).
PolicyMode: Disabled or
ColorBlind.
Dedi- All-to-One-Bundling: YES.
cated
UNI and Multiplexing: NO.
E. EPT- E- Deliver Links. Bundling: NO.
LINE. LINE. uncondition-
P. Single L2CP: Tunneling except 1 1
(Wizard (Point ally (unicast, None. 1 A 1 Z
T. multicast, SDH PAUSE. PRIVATE
or manual to PRIVATE PRIVATE
L. broadcast). based Preservation (VLAN. or
link). point).
infra- CoS.): YES.
struc-
ture. PolicyMode: Disabled.

....................................................................................................................................................................................................................................
1350 OMS 11-27
8DG42227DAAA 9.6
Issue 3 December 2012
Generalities Definition of Ethernet Services by MEF
About 1350 OMS PKT application
....................................................................................................................................................................................................................................

M. Old New Service Privacy. Band- Main characteristics. Service pattern.


E. Service Service Frame width
F. Type. Type. Delivery. Profile.

All-to-One-Bundling: NO.
Multiplexing: YES.
Bundling: YES or NO. M
E. Z N
E- Same L2CP on all
V. LAN. UNI. extremities (PAUSE Peer, M
P. (Multi discard, other any value). M Z N
NA. Any values. None. EVC. N Z
L. point to Preservation (VLAN or
multi CoS. M
A. CoS): YES or NO. Z N
point). M
N. PolicyMode: Disabled or N Z
ColorBlind.
MAC forwarding: YES or
NO.
E.
x.
All-to-One-Bundling: YES
t. or NO.
EPT-
e. LINE. Multiplexing: YES or NO.
n. (more E-
UNI. Bundling: YES or NO.
than one LINE. Optional M M
d. Free L2CP on extremities. Z
manual (Point Any values. UNI and EVC. N A N
e. Links. Preservation (VLAN or
links) to CoS. PRIVATE OR SHARED
d. EPLINE point). CoS): YES or NO.
E. EV- PolicyMode: Disabled,
PLINE. ColorBlind, ColorAware +
V.
profile.
P.
L.
E.
x.
t.
All-to-One-Bundling: YES
e. or NO.
n.
M
Multiplexing: YES or NO. Z N
E-
d. LAN. Bundling: YES or NO. M
EPLANE Optional UNI. M Z N
e.
VPLAN (Multi Any values. UNI and EVC. Free L2CP on extremities. N Z
d. unknown. point to Links. Preservation (VLAN or M
multi CoS. M Z N
E. CoS): YES or NO.
point). N Z
V. PolicyMode: Disabled,
ColorBlind, ColorAware +
PRIVATE OR SHARED
P.
profile.
L.
A.
N.

....................................................................................................................................................................................................................................
11-28 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Generalities Definition of Ethernet Services by MEF
About 1350 OMS PKT application
....................................................................................................................................................................................................................................

M. Old New Service Privacy. Band- Main characteristics. Service pattern.


E. Service Service Frame width
F. Type. Type. Delivery. Profile.

All-to-One-Bundling: NO.
Multiplexing: YES.

Deliver Bundling: YES. M


S N
E- conditionally Same L2CP on both
H. TREE. (MAC based) UNI. extremities. M
EVP hub. MxS
S N
S. (Rooted or None. EVC. NxSH
BA. Preservation (VLAN or
I. multi uncondition- CoS. CoS): YES.
point). ally (VLAN M
Based). PolicyMode: Disabled or S N
ColorBlind.
MAC forwarding: YES
(special).
All-to-One-Bundling: NO.
Multiplexing: YES.
M
Bundling: YES. S N
E-
B. BTV. UNI. Same L2CP on both M
TREE. Mx
(Bridge or extremities. SN S N
T. (Rooted Any values. None. EVC. H
ETS Preservation (VLAN or
V. multi CoS.
based). CoS): YES or NO.
point). M
PolicyMode: Disabled or S N
ColorBlind.
MAC forwarding: NO.

UniDirectional: YES.
B. All-to-One-Bundling: YES
r. or NO. N
S
o. Multiplexing: YES or NO.
E-
a. BTV. UNI. Bundling: YES or NO. N
TREE. S
(SDH Same L2CP on both N H
d. (Rooted Any values. None. EVC.
broadcast extremities.
c. multi CoS.
based). Preservation (VLAN or
point). N
a. CoS): YES or NO. S
s. PolicyMode: Disabled or
t. ColorBlind.
MAC forwarding: NO.

....................................................................................................................................................................................................................................
1350 OMS 11-29
8DG42227DAAA 9.6
Issue 3 December 2012
Generalities Network Topology Description
About 1350 OMS PKT application
....................................................................................................................................................................................................................................

Network Topology Description


Overview
Based on the number of terminations, the service is implemented with one or more EVCs.
The topology can be Point to point or Multipoint to multipoint.
The following main topologies used by Ethernet Services are defined:
• “Point to Point Ethernet Topology” (p. 11-30).
• “Hub & spoke Ethernet Topology” (p. 11-31).
• “Full Meshed Topology” (p. 11-33).
• “Boards involved in Ring topology” (p. 11-35).

Point to Point Ethernet Topology


Point to Point Ethernet Topology is defined as a bidirectional flow exchanged between
two ports of different provider edges located at different sites.

Figure 11-4 Point to Point Topology

The Point to point topology can be built directly on an SDH layer.


In the direct mapping, the Ethernet port maps an SDH VC (GFP mapping) or a group of
SDH VCs called packet concatenation.
Packet concatenation uses a group of SDH VCs by the LO packet concatenation on ISA
PR EA or by Virtual concatenation..
....................................................................................................................................................................................................................................
11-30 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Generalities Network Topology Description
About 1350 OMS PKT application
....................................................................................................................................................................................................................................
The boards can additionally implement a transparent or a compressed transmission.

Boards involved in Point to Point topology


The following boards can be involved in the Point to point topology:
• ISA E/FE/GE.
• ISA PR EA.
• ISA PR.
• ISA ES1.
• ISA ES4.
• ISA ES16.
• TSS.
The transport of Ethernet frames is possible by one or more LSP. As LSP, the usage of
ISA PR EA,ISA PR or ISA ES16 is mandatory.

Mixed configuration
Is possible to have also mixed configurations:
• ISA E/FE/GE ↔ ISA PR EA.
• ISA PR EA or ISA ES16 ↔ISA PR.
• ISA E/FE/GE ↔ISA PR EA or ISA ES16 ↔ ISA PR.
• ISA ES ↔ISA ES.
• ISA E/FE/GE ↔ISA PR EA ↔ISA PR ↔ISA PR EA.
• ISA E/FE/GE ↔ISA PR EA ↔ISA PR ↔ISA PR EA ↔ISA E/FE/GE.
Note: The configuration ISA E/FE/GE ↔ISA PR can be obtained only connecting a
physical cable between two Ethernet physical ports belonging to the two cards. The
inter-working is at Ethernet layer.
Note: The configuration ISA PR EA ↔ISA PR supports the inter-working at MPLS
layer using the “Martini encapsulation” on a physical GE interface. This topology is
always managed with a Point to point EVC having associated two unidirectional
Ethernet Segments. Each of Ethernet Segment has specific Traffic Descriptor
(bandwidth and traffic type) and Traffic Classifier (VLAN).

Hub & spoke Ethernet Topology


A Hub & spoke topology for Ethernet Services connects one PE to more than one PE.
The typical use of Hub & spoke topology is the traffic diffusion from a central CE, trough
connected PE, toward the remote CEs or the grooming feature. The grooming feature is
the access of remote sites to the main site.

....................................................................................................................................................................................................................................
1350 OMS 11-31
8DG42227DAAA 9.6
Issue 3 December 2012
Generalities Network Topology Description
About 1350 OMS PKT application
....................................................................................................................................................................................................................................

Figure 11-5 Hub & spoke Topology

The Hub & spoke topology can be built directly on an SDH layer.
In the direct mapping the Ethernet port maps an SDH VC (GFP mapping) or a group of
SDH VCs (packet concatenation).
Packet concatenation uses a group of SDH VCs by the LO packet concatenation on ISA
PR EA or by Virtual concatenation..
The boards can additionally implement a transparent or a compressed transmission.

Boards involved in the Hub & spoke topology


The following boards can be involved in the Hub & spoke topology: ISA E/FE/GE, ISA
PR EA, ISA PR, ISA ES16 at spoke parts; only ISA PR EA, ISA PR,ISA ES16 in the Hub
side.
The mixed configuration is also possible (the configuration are reported per branch or
leg).
• ISA E/FE/GE ↔ISA PR EA or ISA ES16.
• ISA PR EA or ISA ES16 ↔ISA PR.
• ISA E/FE/GE ↔ISA PR EA or ISA ES16 ↔ISA PR.
• ISA E/FE/GE ↔ISA PR EA or ISA ES16 ↔ISA PR ↔ISA PR EA or ISA ES16.
....................................................................................................................................................................................................................................
11-32 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Generalities Network Topology Description
About 1350 OMS PKT application
....................................................................................................................................................................................................................................
Note: The configuration ISA E/FE/GE ↔ISA PR can be obtained only connecting a
physical cable between two Ethernet physical ports belonging to the two cards. The
inter-working is at Ethernet layer.
Note: The configuration ISA PR EA ↔ISA PR supports the inter-working at MPLS
layer using the “Martini encapsulation” on a physical GE interface.

Partial Ethernet traffic aggregation


It is possible to have partial Ethernet traffic aggregation (that is more than one level of
hub).

Figure 11-6 Hub & spoke with multi level aggregation topology

This topology is typically managed using a Point to multipoint EVC having associated a
set of unidirectional Ethernet Segments. Each Ethernet Segment with specific Traffic
Descriptor (bandwidth and traffic type) and Traffic Classifier (VLAN). The cardinality of
this set is the number of the leaf nodes.

Full Meshed Topology


A Full Meshed topology connects one PE to all PEs belonging to the same Ethernet
Service. Alternatively can connect a subset of PE. This topology is like a distributed
LAN.
The typical use of full meshed topology is in the implementation of a Virtual Private Hub
Service (VPHS).
....................................................................................................................................................................................................................................
1350 OMS 11-33
8DG42227DAAA 9.6
Issue 3 December 2012
Generalities Network Topology Description
About 1350 OMS PKT application
....................................................................................................................................................................................................................................
In a Virtual Private Hub Service, a customer (typically an enterprise) requires that all its
own sites connect to each other. Each connectivity between a couple of sites can have
different characteristics, even though probably in the normal case all the sites share the
same connection characteristics).
The topology can be shown this way:

Figure 11-7 Full meshed topology

The full meshed topology can be built directly on an SDH layer.


In the direct mapping the Ethernet port maps an SDH VC (GFP mapping) or a group of
SDH VCs (packet concatenation).
Packet concatenation uses a group of SDH VCs by the LO packet concatenation on ISA
PR EA and ISA ES16..
The boards can additionally implement a transparent or a compressed transmission.
The full meshed topology can also use the MPLS network capability to have better
capacity in grooming and in differentiate service definition.
By using the MPLS approach, a Connection Oriented network is implemented.
Alternatively, by the bridge approach, a connection-less network is implemented.
....................................................................................................................................................................................................................................
11-34 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Generalities Network Topology Description
About 1350 OMS PKT application
....................................................................................................................................................................................................................................
Full meshed topology is managed using a Multipoint to multipoint EVC having
associated a set of couple unidirectional Ethernet Segments. Each Ethernet Segment with
specific Traffic Descriptor (bandwidth and traffic type) and Traffic Classifier (VLAN).
The cardinality of this set, if “n” is the number of nodes, is n (n-1)/2 .

Boards involved in full meshed topology


Using ISA ES family in “bridge mode”, the SDH VC acts as a common Transport Link to
distribute Ethernet frames. The involved ports must belong to the same service. The
service must be based on MAC address or S-VLAN routing capability.
To implement full meshed topology can be used only: ISA PR EA, ISA ESfamily, or ISA
PR. The ISA E/FE/GE can be used but only to control remotely the Ethernet port, without
having any feature related the switching capability.
The mixed configuration is also possible:
• ISA PR EA or ISA ES16 ↔ ISA PR.
• ISA PR EA or ISA ES16 ↔ ISA PR ↔ ISA PR EA or ISA ES16.
• ISA ES ↔ ISA PR EA or ISA ES16.
• ISA ES ↔ ISA PR.
Note: The configuration ISA PR EA ↔ ISA PR supports the inter-working at MPLS
layer using the “Martini encapsulation” on a physical GE interface.

Boards involved in Ring topology


The Ring topology can be show this way:

....................................................................................................................................................................................................................................
1350 OMS 11-35
8DG42227DAAA 9.6
Issue 3 December 2012
Generalities Network Topology Description
About 1350 OMS PKT application
....................................................................................................................................................................................................................................

Figure 11-8 Ring Topology

The ring topology is built directly on SDH layer implementing an RPR like protocol. The
protocol is managed, in the first step, by a specific Network Management system.
The Ethernet frames are mapped on this ring protocol.

Boards involved in Ring topology


When ISA PR EA or ISA ES16 is deployed in ring topology, it still works as an MPLS
board. The mesh topology is taken into account to define LSP. Specific behavior must be
implemented to guarantee the same access capabilities (fairness behavior) to all best
effort traffics coming from all nodes in the ring.
This topology is not directly related the Ethernet connections. This topology is specific of
SDH or RPR technology. This topology is no mapped with a specific EVC.
Any EVC type (Point to point, Point to multipoint, Multipoint to multipoint) can be used
to describe the Ethernet connection on ISA PR ring. When the service crosses the ISA PR
ring, part of an EVC is implemented on the ISA PR ring itself.

....................................................................................................................................................................................................................................
11-36 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Generalities Network Topology Description
About 1350 OMS PKT application
....................................................................................................................................................................................................................................
The ring topology for Ethernet Services is a specific configuration that is possible to
build:
• using ISA PR (the board supplied by Native Network).
• using ISA PR EA or ISA PR ES16.
The main differences is that ISA PR bases its behavior on the ring topology itself (have to
be deployed in this topology) while ISA PR EA or ISA ES16 being an MPLS board can
be “also” deployed in a ring topology and in this case it uses the fairness feature to
manage the best effort traffic (up to now this capability, that is the ring fairness, is not
managed by ISA PR EA and by ISA ES16 and then this topology is managed only for ISA
PR).
The ISA PR boards require to be connected in a ring topology way. The ISA PR boards
implement an RPR like ring.
Inter-working with the ISA PR EA or ISA ES16 is possible trough a GE physical
interface, using the MPLS labels (Martini encapsulation).
The label passed by ISA PR EA or ISA ES16 is swapped at ingressing by ISA PR and
substituted with an internal ISA PR label.
Internal label is maintained trough all crossed ISA PR.
If the ISA PR is a connection with another ISA PR EA, at egressing the ISA PR, the label
is swapped again with another label. Otherwise, if the service is terminated, the label is
popped out.
The inter-working with ISA E/FE/GE is not possible. To connect the ISA PR boards an
external Ethernet cable is needed.

....................................................................................................................................................................................................................................
1350 OMS 11-37
8DG42227DAAA 9.6
Issue 3 December 2012
Generalities Web access
How to access the application
....................................................................................................................................................................................................................................

How to access the application

Web access
Navigate the application by a Web browser
The Web portal provides the user with a view of all the 1350 OMS applications and
allows the user to navigate the application subsystems and components.
To access and navigate the application, the user needs:
• A PC installed with a web browser.
• A network connection.
• The authorization to access the web portal.
• The IP address of the web portal.
• The login name.
• The password.
For a quick reference about the web access and MS-GUI, refer to document [1] 1350
OMS Getting Started Guide.
For a complete description about the web access and MS-GUI, refer to document [2]
1350 OMS Administration Guide, Vol 2: Common GUI Functions.

....................................................................................................................................................................................................................................
11-38 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Generalities The graphical interface (MS-GUI)
How to access the application
....................................................................................................................................................................................................................................

The graphical interface (MS-GUI)


The MS-GUI
The 1350 OMS PKT Multi-Service GUI is the specialization of the MS-GUI for the 1350
OMS PKT application. The MS-GUI framework is the reference graphic environment for
the 1350OMS. The MS-GUI can be accessed by any web browser.
The 1350 OMS PKT MS-GUI main window includes the menu bar, the toolbar and is
split in more section views as shown in the figure. The main view area is managed as set
of tabbed panels, defined by the operator. By default, the main view area shows the
Inventory list panel and the Log panel. According with the MS-GUI common behavior
the main view area supplies filtering and searching facility and table management.
The user accesses the system functions both from the main menu and from the pop-up
menu available from the list, for single or multiple selected items. Functions are grouped
under the main menu and, for the more complex ones, the menu items give access to
specific submenus, organized in a hierarchical tree.
For a quick reference about the web access and MS-GUI, refer to document [1] 1350
OMS Getting Started Guide.
For a complete description about the web access and MS-GUI, refer to the document [2]
1350 OMS Administration Guide, Vol 2: Common GUI Functions.

....................................................................................................................................................................................................................................
1350 OMS 11-39
8DG42227DAAA 9.6
Issue 3 December 2012
Generalities Confirm the action
How to access the application
....................................................................................................................................................................................................................................

Confirm the action


When to use
This function requests the user to confirm or cancel the execution of an action.

Related information
The actions that affect heavily the managed network request a confirmation before the
execution of the ongoing operation.
The confirmation acts as a reminder for the user and gives the user the chance to renounce
the action.
The execution is suspended until the user confirms or cancels the requested action.

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
An ongoing action needs a confirmation from the user.

Task
From MS-GUI main window:
...................................................................................................................................................................................................

1 The user requests an action on one or more objects.


Result: A confirmation box is displayed.
The confirmation box content depends on the number of items selected:
• For a single object selection:
If only one item is involved, confirmation box contains the following options:
– Yes.
– No.
• For a multiple object selection:
If more than one items are involved, confirmation box contains the following
options:
– Yes.
– No.
– All.
– Cancel.

....................................................................................................................................................................................................................................
11-40 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Generalities Confirm the action
How to access the application
....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

2 Select one of the available options:

if…. then….
Click Yes. The command is executed on the current item.
Click No. The command is not executed on the current
item.
Click All. The command is executed on all the selected
items.
Click Cancel. The command is not executed on the
remaining items.

Result: The action is executed according to the chosen option.


E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS 11-41
8DG42227DAAA 9.6
Issue 3 December 2012
Generalities Software interfaces
The application interfaces
....................................................................................................................................................................................................................................

The application interfaces

Software interfaces
Software interface description
The following figure shows the interfaces used by 1350 OMS PKT software.

Figure 11-9 Interface description

Interface features
This CORBA-based interface is used for:
• NE discovery and any configuration change in the NE.
• Provisioning of Ethernet Services.
• Activation or deactivation of the Performance Monitoring counters.
• Ethernet resources upload.
• Alarm notification.
....................................................................................................................................................................................................................................
11-42 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Generalities Software interfaces
The application interfaces
....................................................................................................................................................................................................................................
Note: For a description about integration with other Network Management Systems
(NMS), refer to : “Integrate the 1350 OMS PKT with Other NMSs” (p. 3-8).

Application configuration
The administration functions consist in:
• List the NML-IMs and EML-IMs.
• Add one NML-IM and/or EML-IM.
• Remove one NML-IM and/or EML-IM.
• Setting the 1350 OMS PKT parameters.
Note: For a detailed description about application configuration, refer to: “Access the
System Configuration Window and Configure 1350 OMS PKT” (p. 3-3).

EML and NML Proxies


EML and NML proxies are configured in a way:
• To avoid redundancy of data repository.
• To integrate the 1350 OMS PKT into OSK architecture.
• To manage the proxy stop or start directly from the PMC GUI.
The following proxy entities are available:
• EMLIM_PROXY.
• NMLIM_PROXY.
Note: For a detailed description about proxy configuration, refer to: “Access the
System Configuration Window and Configure 1350 OMS PKT” (p. 3-3), step Step 7
and step Step 8.

....................................................................................................................................................................................................................................
1350 OMS 11-43
8DG42227DAAA 9.6
Issue 3 December 2012
Generalities Multi-Manager environment
The application interfaces
....................................................................................................................................................................................................................................

Multi-Manager environment
Multi-manager environment description
Multi-Manager Management occurs when the user manages part of the network by an
application and the rest of the network using another application.
Multi-Manager Management is a state of network management. A typical example is the
management by the 1350 OMS PKT and along with another application at EML layer.
Note: For a description, refer to: “Multi-Manager Management Overview” (p. 8-2).
For best practice and suggestions, refer to: “Operational Guidelines” (p. 8-3)

....................................................................................................................................................................................................................................
11-44 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Generalities Overview
Functional Domain
....................................................................................................................................................................................................................................

Functional Domain

Overview about functional domains


The Ethernet connectivity
The Ethernet traffic is carried by different technologies:
• SDH.
• OTH.
• MPLS.
• RPR-like rings.
The different technologies are structured on a dedicated domain.

Figure 11-10 Ethernet Service delivered using different technologies

Management areas
For Ethernet services, the main management areas are:
• “Network Topology Construction” (p. 11-47)
– NE or ENE management.
– Subnetwork management.
– Domain management.
– Ethernet Physical port management.
– Transport link management.
• “Traffic Management” (p. 11-53)
– Customer or Ethernet Service management.
– EVC or Ethernet Segment management.
– VLAN management.
– Policy control.

....................................................................................................................................................................................................................................
1350 OMS 11-45
8DG42227DAAA 9.6
Issue 3 December 2012
Generalities Overview about functional domains
Functional Domain
....................................................................................................................................................................................................................................
• “MPLS Management” (p. 11-65)
– Transport link management.
– Traffic Descriptor management.
– LSP management.
• “Maintenance Management” (p. 11-69)
– Alarms management.
– Fault Localization.
– Performance Monitoring management (measurements).
• Chapter 23, “Network Utilities”
– Audit.
– Alignment and Force alignment.
– Reserve and Recovery.
• System management.

....................................................................................................................................................................................................................................
11-46 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Generalities Network Topology Construction
Functional Domain
....................................................................................................................................................................................................................................

Network Topology Construction


Overview
The Network Construction can be divided in Subnetwork management, NE management,
ENE management, Transport Link management, and Ethernet Segments port
management.

Subnetwork management
The subnetwork management allows to organize the network in a set of subnetwork and
build a hierarchical view of the network.
A configurable number of levels (up to 4 by default) is possible.
The network hierarchical view allows having different synthesis of the network structure.

Domain management
The domain management allows to partition a large network according to a common
criteria.

NE management
The NE management is the NE assignment to 1350 OMS PKT application, the NE
discovery, and the communication link management.
When needed, the differences in the 1350 OMS PKT management approaches, for those
two classes of board, are detailed in each related section of this documentation.
1350 OMS PKT is able to run under two independent modes. The two modes are related
to the fact that it manages the NE synchronously along with the SDH NML. The NML
application is 1350 OMS SDH. This mode, which is called 1350 OMS PKT - 1350 OMS
SDH independence mode, is global for all the managed NEs.
The SDH path management is linked to the 1350 OMS PKT - 1350 OMS SDH
independence mode.
The Q3 boards cannot be managed by the 1350 OMS PKT with 1350 OMS PKT - 1350
OMS SDH independence mode. The Q3 boards are managed through the 1350 OMS
SDH.

NE resources
In the scope of the construction domain, NEs are characterized by a set of the following
resources
• Ethernet physical ports (local ports).
• TDM terminations (remote ports).
Note: To avoid confusion between local ports and remote ports, the word “port” is
reserved for the denomination of the Ethernet physical ports. The remote ports are
named “TDM terminations”.
....................................................................................................................................................................................................................................
1350 OMS 11-47
8DG42227DAAA 9.6
Issue 3 December 2012
Generalities Network Topology Construction
Functional Domain
....................................................................................................................................................................................................................................
NE boards
A NE corresponds physically to an ISA Ethernet board in OMSN: ISA E/FE/GE, ISA PR
EA, ISA ES1/4, ISA ES16 respectively named E/FE/GE NE, PR EA NE, ES1/4 NE, ES16
NE.
The NE are divided in two main classes, following the way they are administrated. They
are referred as:
• Q3 boards (ISA E/FE and GE).
• SNMP boards (ISA PR EA and ES).
Note: The ES1/4 NE introduces the bridging capability in the network
(Connection-less). However, in ETS mode, it provides only Point to point connection
between two interfaces, without traffic classification.
Note: ES16 board is managed with the same level of functionality as PR EA
augmented with the bridging capability of the ES1/4.

ENE management
The ENE management allows the user to define NEs, networks, Customer Edges. The
ENE give the user a complete view of the network.

Inner equipment or Provider equipment


In a topology, some ENEs can be added to represent a NE or a set of NEs.
Added ENEs are internal to the managed network but not directly administrated by the
1350 OMS PKT.
Internal ENEs have the role Inner, and are connected to one or more NEs through IWI or
NNI interfaces.
The interface type of the Transport Link depends on the role of the ENE:
• If the ENE role is Inner Equipment, then the interface type is NNI.
• If the ENE role is Inner Provider, then the interface type is IWI.
The NEs next to the ENE and part of the 1350 OMS PKT managed network, are known
as the Customer Premise Equipment (CPE).

....................................................................................................................................................................................................................................
11-48 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Generalities Network Topology Construction
Functional Domain
....................................................................................................................................................................................................................................

Figure 11-11 Inner ENE

Transport links between NE and inner ENE can be either Link Over Cable or Link Over
TDM. Inter-working with SDH always involves an inner ENE.
An RPR ring is viewed like an inner ENE by the 1350 OMS PKT.

Customer Edge
An ENE can be used also to represent Customer Edge (CE) devices.
This object is defined to improve the GUI representation.
The CE is connected to a CPE through an UNI interface. By convention in the 1350 OMS
PKT, an UNI is always related to an Ethernet physical port.
The following figure shows that concepts:

....................................................................................................................................................................................................................................
1350 OMS 11-49
8DG42227DAAA 9.6
Issue 3 December 2012
Generalities Network Topology Construction
Functional Domain
....................................................................................................................................................................................................................................

Figure 11-12 Customer Edge

Transport link management


To provide the infrastructure of the Ethernet, the Ethernet application uses the Transport
Links. “uses” means that it asks for creation or it uploads the needed Transport Links.
The topology of Transport links can be Point to point, or Point-to-multi-point, or
multi-point-to-multi-point.
Transport links for Ethernet Services can be:
• Link Over TDM.
Details over TDM Transport link for Ethernet Services:
– Link Over TDM uses SDH or SONET technologies.
– Path directly supports Ethernet frames. (Paths supporting the LSP tunnels are
managed by MPLS management layer).
– Paths directly supporting Ethernet frames can have fixed or variable rate. If the
path is a Virtual Concatenated or a Packet Concatenated path, the rate is variable.
– Paths can be defined and configured to be assigned to Connection Oriented
management (configured in ETS mode) or to Connection-less management
(configured in ETB mode).
• Link Over Cables.

....................................................................................................................................................................................................................................
11-50 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Generalities Network Topology Construction
Functional Domain
....................................................................................................................................................................................................................................
Details about Link Over Cable Transport link for Ethernet Services:
– The Ethernet cable is the connection between an ISA E/FE/GE (Q3 board) or ISA
ES1/4 (SNMP board) and an ISA PR.
– Link Over Cable is different from “Martini cable”. “Martini cable” is a connection
from ISA PR EA or ISA ES16 and ISA PR. The inter-working is at MPLS level
and uses just one label (VC-LSP level).
– Ethernet cables can be defined and configured to be assigned to Connection
Oriented management (configured in ETS mode) or to Connection-less
management (configured in ETB mode).
• .
Link Over WDM.
Details about Link Over WDM Transport link for Ethernet Services:
– They are managed by external applications.
Refer to the document: [5] 1350 OMS WDM Guide
• .
Link Over MPLS.
Details over MPLS Transport link for Ethernet Services:
– VC-LSP is the connection individuated by the VC label (inner label): this
connection is associated just to a single transport and then to an Ethernet link.
– LSP tunnel is the infrastructure that carries more than one VC connection. LSP
tunnel is managed by MPLS manager.
– Alcatel-Lucent MPLS implementation foresees the usage of two labels differently
by Native implementation that uses only one label.
• Link Over RPR.
Details over RPR Transport link for Ethernet Services:
– To manage ISA PR, in the ring implemented with ISA PR (Native ring), the
connectivity links need further definition after consolidation of the interface.
• Links Over WDM are managed by external applications.
Refer to the document: [5] 1350 OMS WDM Guide

Ethernet Edge Port management


Ethernet ports are managed to give a customer the possibility to connect the Ethernet
Services.
Ethernet port can be defined and configured in:
• ETS mode to be assigned to Connection Oriented management.
• ETB mode to be assigned to connection-less management.
When Ethernet connectivity is based on SDH technology and is not terminated in the
scope of 1350 OMS PKT, Ethernet ports are considered Edge ports. It depends on the
particular characteristics of the specific Ethernet connection.

....................................................................................................................................................................................................................................
1350 OMS 11-51
8DG42227DAAA 9.6
Issue 3 December 2012
Generalities Network Topology Construction
Functional Domain
....................................................................................................................................................................................................................................
Autonegotiation
Autonegotiation is used to check the consistency of the Ethernet interfaces. The check is
done between CPE and CE Ethernet ports. The following characteristics are exchanged
between peers:
• Duplex mode (half or full duplex).
• Interface speed (10Base-TX, 100Base-T).
• Symmetric or asymmetric Flow control Pause function capability.
Note: Autonegotiation is not available on GE interfaces.
Autonegotiation is used to warn the user when the two peers are not aligned regarding
duplex mode and interface speed. The autonegotiation process must not mandatory
choose between interface speeds or duplex modes. For this reason, 1350 OMS PKT
always chooses, for E/FE port, an interface speed between 10 Mbit/s and 100 Mbit/s.
In case of detected misalignment, the NE raises a LOS alarm.
Autonegotiation is triggered when the interface is activated. During the autonegotiation,
traffic is interrupted.
It exists a relation between autonegotiation and flow control configuration:
• If autonegotiation is activated on an Ethernet Port, then the user simply configures a
preferred configuration for flow control activation. Then autonegotiation decides for
the final state of flow control (Depending on the CE capability).
• If autonegotiation is not activated on the Ethernet Port, then the user explicitly enables
or disables the flow control.
On port basis, the user can enable or disable the Auto-negotiation mode. In case of
enabling the user optionally set the advertised characteristics, to allow connecting a CE
with characteristics different from the default ones. The user provides:
• Exclusive 10Base-TX or 100Base-T for an E/FE port.
• Duplex mode (Half or Full).
After port activation and autonegotiation completed, 1350 OMS PKT uploads the
negotiation result. If Flow Control is enabled or disabled, the user is warned.

....................................................................................................................................................................................................................................
11-52 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Generalities Traffic Management
Functional Domain
....................................................................................................................................................................................................................................

Traffic Management
Overview
The traffic management is related to the Ethernet Service, EVC management, VLAN
management, Policy control, and SLA management.
Note: SLA management function must be confirmed and then detailed: for this reason
no further information is reported in this version, only a simple “label reference” is
managed, without any elaboration or control.

Ethernet Service Management


A service belongs to a given customer.
Note: In the “broadband access” service, more end-user customers use the same
service: in this case the customer is the ISP for which telecommunications user has
created the service.
A service can connect two or more PEs, each associated to a CE.
A service is composed of one or more EVC.
An Ethernet Service is described in term of customer, associated EVC and referred SLA.
An EVC is described in term of its end points and associated Ethernet Segments.
An Ethernet Segment is described in term of its end points (two), directionality and QoS
(Traffic Descriptor and Traffic Classifier).
The Ethernet Service is a simple and flexible EVC collector.

EVC Management
The EVC management provides the following main operations:
• Creation of the EVC: type, access points, unicast, or multicast.
• Creation of the Ethernet Segments: the number of unidirectional End-to-End Ethernet
Segments that must be defined depends on the EVC topology. Definition requires
Traffic Descriptor, Color Profile, policy mode, and Traffic Classifier. The route of
each Ethernet Segment is manually defined by the user. No complete automatic
routing at Ethernet layer is foreseen: it can be semi-automatic that is supplying one or
more constraints.
• Creation of Transport Link: for each Ethernet Segment one or more Transport Links
are “associated”. The 1350 OMS PKT uses Transport links created by specific
manager. If Transport links are not available, 1350 OMS PKT requires the
implementation of the needed Transport Link to the specific manager.
• Supervision: the 1350 OMS PKT provides the complete control of an EVC and
associated Ethernet Segments status management, connectivity end-to-end test, alarm
management, and PM. (The supervision operation is listed here but it belongs to
Ethernet Maintenance management area)..

....................................................................................................................................................................................................................................
1350 OMS 11-53
8DG42227DAAA 9.6
Issue 3 December 2012
Generalities Traffic Management
Functional Domain
....................................................................................................................................................................................................................................
VLAN management
One important feature of the Alcatel-Lucent ISA boards is the support and the
management of the VLAN tag (often called simply VLAN ).
Note: Only Edge VLAN is supported for ISA PR EA 1.1.
Only Stacked VLAN is supported for ISA PR EA 1.2 and ISA ES family.
The VLAN tag on Ethernet frames is a way to segregate Ethernet traffic.
The VLAN tag is composed of 4 bytes:
• the first two are the VLAN Tag Protocol Type (802.1Q Tag Type), whose standard
value is 0x8100 .
• the second 2 bits are the Tag Control Information (TCI). TCI is split into VLAN Id
(12 bits) and Priority Id (3 bits).
The following Figure represents the formats of the Ethernet Frame.

Figure 11-13 Ethernet Frame Format

Preamble 7 octects Preamble 7 octects Preamble


7 octects
Start Frame Delimiter 1 octects Start Frame Delimiter 1 octects Start Frame Delimiter
1 octects
Destination Address 6 octects Destination Address 6 octects Destination Address
6 octects
Source Address 6 octects Source Address 6 octects Source Address
6 octects
Length/Type 2 octects Q-Tag Protocol Type
2 octects P-Tag Protocol Type
2 octects
Q-Tag Control Information P-Tag Control Information
2 octects 2 octects
Length/Type 2 octects Q-Tag Protocol Type
2 octects
Data 46 .. 1500 Q-Tag Control Information
2 octects
octects Length/Type 2 octects
Data
46 .. 1500
Padding octects
Data 46 .. 1500
Frame Check Sequence 4 octects octects
Padding
MAC Frame
Frame Check Sequence 4 octects Padding
Tagged MAC Frame
Frame Check Sequence
4 octects

Stacked Vlan Frame

....................................................................................................................................................................................................................................
11-54 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Generalities Traffic Management
Functional Domain
....................................................................................................................................................................................................................................
Figure 11-14 Q-Tag Prefix Format

Ethernet Frame Hierarchy


The ISA PR EA boards and ISA ES16 boards handle all the frame types of the Ethernet
Frame hierarchy: untagged, Q-tagged, and P-tagged frames.
The following figure shows the place of those objects in the topology:

....................................................................................................................................................................................................................................
1350 OMS 11-55
8DG42227DAAA 9.6
Issue 3 December 2012
Generalities Traffic Management
Functional Domain
....................................................................................................................................................................................................................................

Figure 11-15 Ethernet Frame Hierarchy

VLAN Tag, VLAN Id, Priority Id


The management of the VLAN Tag Protocol Type (Standard Q-TAG or proprietary Tag)
is logically separated from the management of the VLAN Id and Priority Id.
The VLAN Tag Protocol Type is managed on Ethernet Interface basis.
The VLAN Id and Priority Id are managed on Ethernet Flow (Ethernet Segment) basis.
The VLAN Id is used to direct Ethernet traffic to those Ethernet ports (UNI) that are
members of a given VLAN tag.
VLAN Tag and VLAN Id ensure that tagged frames are accessible only by the proper end
user, they implement traffic segregation.

....................................................................................................................................................................................................................................
11-56 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Generalities Traffic Management
Functional Domain
....................................................................................................................................................................................................................................
The 12 bits of the VLAN Id permit a maximum of 4096 different VLAN in a single
Ethernet Segment.
The VLAN Tag Protocol Type associated to an Ethernet interface is used to determine
whether a frame is tagged or untagged:
• If the protocol type matches the one provisioned on the interface, such a frame is
considered tagged.
• If the protocol type does not match the one provisioned on the interface, such a frame
is considered untagged.
• If the protocol type is missing as in the case of untagged frames, such a frame is
considered untagged.
Then the frame is subjected to the classification using the Traffic Classifiers.
The VLAN tag has a major problem when used for implementing Ethernet Services on a
transport network: it does not allow designing a global and scalable solution for switching
Ethernet frames on a transport network.

Alcatel-Lucent solution
Alcatel-Lucent solution allows the use of VLAN tag in different ways:
• Transparently. The VLAN tag is passed from the ingress to the egress port without
any elaboration. The VLAN is not used by Alcatel-Lucent network but only by the
customer.
• To switch the Ethernet frames. In the VPAS service, the customer must use different
VLANs for different ports (at least one VLAN for each port). The Ethernet frames are
sent from hub only to the selected spoke site.
• To swap a received VLAN tag (provider VLAN) with another one.
• To pop the internally used VLAN tag before to egress the frame.
• To swap the used VLAN tag with another one.

The use of VLAN tag


The VLAN tag is introduced for splitting the network into different broadcast (or
multicast) domains. The VLAN tag solve security, privacy, bandwidth management, and
increase the performance.
The VLAN tag can be used to switch traffic in different contexts:
• To define Ethernet VPNs (VPHS service).
• To optimize the implementation of the VPAS service (avoiding to send frame
broadcast when direction is from hub to spoke port).
• To switch broadband access traffic to the selected ISP. For instance, the use of
customer-based VLAN for routing purposes in the network couples the operational
aspects of the customer and network domain.

....................................................................................................................................................................................................................................
1350 OMS 11-57
8DG42227DAAA 9.6
Issue 3 December 2012
Generalities Traffic Management
Functional Domain
....................................................................................................................................................................................................................................
• To allows inter-working with external equipment. It uses non standard VLAN tag of
other suppliers. The network inter-working can be chosen using a transit mode
(tunneling) or using a peer-to-peer model (mapping mode). Operations are: VLAN
push, pop, and swap.
• To segregate, in a bridge network, different customer traffic on the same Transport
Link by using the VLAN stacking mechanism.

VLAN tag degrees of implementation


The VLAN tag management has various degrees of implementation:
1. Traffic classification and policy management. Tagged and untagged frames are
handled and the VLAN tag, when present, is used for classification (Traffic
Classifiers) and policy management (Policy Mode and Color Profile).
2. Full support of C-VLAN (Customer VLAN) and P-VLAN (Provider VLAN) frames
at UNI and IWI. In addition to traffic classification and policy management, push
(insertion) and pop (extraction) of VLAN tag are allowed on the Ethernet frames. The
VLAN tag management is supported to guarantee a correct inter-working with
customer equipment (UNI) or with external provider equipment (IWI).
3. Traffic engineering through C-VLAN and P-VLAN. In addition to full support of
C-VLAN and P-VLAN frames at UNI and IWI. The VLAN management is supported
also in the internal interfaces of the ETS network, not only at UNI and IWI.
Note: In terms of VLAN management, the 1350 OMS PKT scope is the full support
of C-VLAN and P-VLAN frames at UNI and IWI. See the description at point 2.
The description at point 3 is out of the scope of the current release. No manipulation
(push, pop, swap, and so forth) of the VLAN tag is allowed in internal interfaces. (that
is non-UNI and non-IWI) or for purposes different from the inter-working with
external equipment (customer or provider).

Tagged frame management


VLAN tag management feature has two aspects:
• The management of a pop or push of a VLAN tag.
• The configuration of the VLAN Tag Protocol Type at the interfaces (Ethernet ports or
TDM terminations).
The interface of the NE must be provisioned with a value of VLAN tag protocol type to
recognize the frames and classifies them. By default, the interfaces support the standard
VLAN tag protocol type (Q-tag: 8100).
For an incoming VLAN tagged frame, the NE processing has the following sequence:
• The arrival of the frame on the interface.
• The comparison of the VLAN tag protocol type of the frame with the one configured
on the interface. If they match, the frame is handled as a VLAN tagged frame. If
protocol types are different or the incoming frame is untagged, the frame is
considered untagged.
• The classification of the frame according to the P-VLAN Id, C-VLAN Id, or
untagged. If no classifier matches then the frame is discarded.
....................................................................................................................................................................................................................................
11-58 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Generalities Traffic Management
Functional Domain
....................................................................................................................................................................................................................................
• The pop or push operation.
• When a pop is performed, the topmost VLAN tag is removed from the frame.
• When a push is performed, a new VLAN tag is inserted in the outgoing frame. The
VLAN protocol type value is taken from the egress interface and a given VLAN Id.
• The transmission of the frame.

Tagged frame transmission models


Two VLAN models of VLAN tagged frame transmission are identified:
• Mapping Model:
Mapping Model implements the inter-working with the customer edge equipment or
the provider networks, at edge or crossed equipment. The VLAN tag of the frame
must be removed (pop) or added (push) at UNIs or IWIs. The following basic cases of
VLAN tag management are described. Any combination of these cases can occur in
the network.
– “Customer VLAN mapping” (p. 11-59).
– “Provider VLAN mapping” (p. 11-60).
• Tunneling Model:
In Tunneling Model, the VLAN tag is preserved across the network. The two cases of
tunneling are:
– “Customer VLAN tunneling” (p. 11-61).
– “Provider VLAN tunneling” (p. 11-61).

Customer VLAN mapping


For the inter-working with the customer edge equipment, the VLAN tag of the frame
must be removed (pop) at UNIs.
C-VLAN tag removal.

Figure 11-16 Customer VLAN Removal

Note: To avoid a discarding of the C-VLAN tagged frame, the NE contains a


classifier with VLAN Id equal to C-VLAN Id.
....................................................................................................................................................................................................................................
1350 OMS 11-59
8DG42227DAAA 9.6
Issue 3 December 2012
Generalities Traffic Management
Functional Domain
....................................................................................................................................................................................................................................
Provider VLAN mapping
Provider VLAN mapping manages the inter-working with external networks. An external
network belongs to an external provider. An external network can be edge or crossed. The
VLAN tag of the frame must be removed (pop) or added (push) at IWIs.
P-VLAN tag removal.

Figure 11-17 Provider VLAN Removal

Note: The interface of the NE must be configured with P-VLAN protocol type. To
avoid a discarding of the frame, the NE contains a classifier with VLAN Id equal to
P-VLAN Id.
P-VLAN tag addition

Figure 11-18 Provider VLAN Addition

Note: The interface of the NE must be configured with the P-VLAN protocol type.

....................................................................................................................................................................................................................................
11-60 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Generalities Traffic Management
Functional Domain
....................................................................................................................................................................................................................................
P-VLAN tag addition + removal

Figure 11-19 Provider VLAN Addition and Removal

Note: The interfaces of the NEs connected to the provider network must be
configured with the P-VLAN protocol type. To avoid a discarding of the frame, the
NE of the pop operation contains a classifier with VLAN Id equal to P-VLAN Id.

Provider VLAN tunneling


It provides a tunneling capability called P-VLAN Tag preservation.
Provider VLAN tunneling does not allow any push or pop of the VLAN Tag between the
two NEs within the route of the Ethernet Service.

Figure 11-20 Provider Tunneling Mode

Customer VLAN tunneling


It provides a tunneling capability called C-VLAN Tag preservation.
The following Ethernet Service can use a provider network as a transport. In a provider
network, a push and a pop of the P-VLAN Tag can occur at any point in the route. Refer
to the basic case of mapping model in “P-VLAN tag addition + removal” (p. 11-61).

....................................................................................................................................................................................................................................
1350 OMS 11-61
8DG42227DAAA 9.6
Issue 3 December 2012
Generalities Traffic Management
Functional Domain
....................................................................................................................................................................................................................................

Figure 11-21 Customer Tunneling Mode

VLAN Tag Protocol Type configuration


The VLAN Tag Protocol Type configuration is needed for the mapping mode and the
tunneling mode. See also “Configure a transport Link” (p. 19-30).
In Ethernet port or TDM termination, theVLAN tag protocol type of crossing interface is
compared with of the VLAN tag protocol type of the frame. If they do not match, the
frame is considered as an untagged frame. If the interface is not associated to an untagged
classifier, the frame is discarded.
Untagged classifier has VLAN Id equal to 4096.
VLAN Tag Protocol Type configuration:
• In the case of mapping mode, the add or remove of the P-VLAN tag is supported.
Only the interfaces connected to the provider network must be configured.
• In the case of tunneling mode, P-VLAN tag preservation is accomplished.
In tunneling mode, two kinds of connections exist:
– The tagged frames can have different destinations.
For example: the provider network A sends toward Z only the P-VLAN frames
with a VLAN Id equal to 2. The other P-VLAN tagged frames are sent toward
another destination. See Figure 11-22, “Protocol Type configuration for multiple
destinations” (p. 11-63).
To avoid this operation, a “low cost” solution is to encapsulate the frame in a
VC-LSP, to cross the network. In this case, only the interfaces connected to the
provider networks are configured. See Figure 11-23, “Low Cost solution”
(p. 11-63).
– The P-VLAN tagged frames have only one destination.
For example, the provider network A sends all the P-VLAN tagged frames only
toward Z. See Figure 11-24, “Protocol Type configuration for single destination”
(p. 11-64).

....................................................................................................................................................................................................................................
11-62 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Generalities Traffic Management
Functional Domain
....................................................................................................................................................................................................................................

Figure 11-22 Protocol Type configuration for multiple destinations

Note: For Ethernet Service with multiple destinations, the associated classifier
contains a VLAN Id equal to 2 and the P-VLAN tag protocol type is configured in
each crossed interface.

Figure 11-23 Low Cost solution

....................................................................................................................................................................................................................................
1350 OMS 11-63
8DG42227DAAA 9.6
Issue 3 December 2012
Generalities Traffic Management
Functional Domain
....................................................................................................................................................................................................................................
Figure 11-24 Protocol Type configuration for single destination

Note: For Ethernet Service single destination, the associated classifier contains a
VLAN Id equal to 4096 (untagged value). All the frames from the provider network A
are sent to the Z. No VLAN tag protocol type configuration is required at the
interfaces.

Policy Control
The policy control is an application to configure the edge nodes with QoS parameters,
IEEE 802.1p defines 8 priority levels and how Ethernet Service utilizes these priorities.
At the edge of the network, frames (identified by port and VLAN) are classified in a set
of priority levels and tagged according to classification criteria. In the core of the
network, frames are switched using different queues, based on their priority tag.
The Ethernet frame priority bits are used together the VLAN Id. They form just a single
value. Priority bits individuate an Ethernet traffic flow. To the traffic flow is associated a
traffic type (Guaranteed, Regulated or Best Effort) and bandwidth. When ISA PR EA is
an Edge node, traffic type and bandwidth are mapped on PIR, CIR, and CBS and PBS.
The priority permits to classify the frame in term of green, yellow, or red frames. Frames
are then mapped on MPLS layer or on SDH VC. In case of ISA E/FE/GE board (Q3
board) these bits are transparently transported.
The ingress of Ethernet frames can be managed by a policy “color blind” (the incoming
classification is not used) or “color aware”. In “color aware”, the priority bits are
considered by ISA board family.

....................................................................................................................................................................................................................................
11-64 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Generalities MPLS Management
Functional Domain
....................................................................................................................................................................................................................................

MPLS Management
Overview
The MPLS management is linked to the following entities:
• “MPLS/T-MPLS Transport link” (p. 11-65).
• “Traffic Descriptor” (p. 11-66).
• “LSP Tunnel” (p. 11-66).
• “VC-LSP” (p. 11-67).

T-MPLS Transport link


See “MPLS/T-MPLS Transport link” (p. 11-65).

MPLS/T-MPLS Transport link


For general information about Transport Links, see: “Transport link management”
(p. 11-50).
A Transport Link is the image, in the MPLS Management Domain, of a Link Over TDM
or a Link Over Cable. Its end points are Transport Link End Points.
A Transport Link (MPLS) is always Point to point:
• If based on a Link Over TDM, it provides the transport of LSP tunnel between two
NEs or between a NE and an ENE.
• If based on a Link Over Cable, a VC-LSP between a NE and an ENE carries it.
Only the PR EA NE and ES16 NE provide the MPLS features.
Transport links, displayed in the maps, allow to rationalize and to determine easily the
route of LSP Tunnel.
The MPLS Label range is attached to the Transport link. The MPLS labels are distributed
between LSP tunnel and VC-LSP.
The operation provided for a Transport link is:
• Characteristic definition.
• Get bandwidth indication.
• Get properties, extremities, inventory.
Characteristic definition consists of the configuration of the MPLS label range. This
operation is automatic after the creation of the Transport Link. However, the user could
modify this parameter.
A Transport Link can be a Unidirectional or a Bi-directional Entity.

....................................................................................................................................................................................................................................
1350 OMS 11-65
8DG42227DAAA 9.6
Issue 3 December 2012
Generalities MPLS Management
Functional Domain
....................................................................................................................................................................................................................................
Traffic Descriptor
Each LSP is characterized by a Traffic Descriptor. It indicates the QoS and the traffic
parameters according to these rules:
• BE: related to the best effort. No bandwidth is reserved but a maximum number of
VC-LSP by transmission path is checked. The system also checked that PIR is greater
than 0, CIR is equal to 0, PBS is greater than 0, and CBS is equal to 0.
• EF: related to the guaranteed traffic. The reserved bandwidth is equal to CIR and PIR
equal to CIR, CBS equal to PBS and CBS greater than 0.
• AF: related to regulated traffic. The reserved bandwidth is equal to CIR and PIR
greater than CIR, PBS greater than 0 and CBS greater than or equal to 0.
Actions on a Traffic Descriptor
The possible actions that involve a Traffic Descriptor are:
• Creation, deletion, modification.
• Get properties, inventory.
Main attributes of a Traffic Descriptor
The Traffic Descriptors are composed by the following information:
• Traffic Descriptor User label.
• Comment.
• QoS: BE, AF, EF.
• PIR, CIR, PBS, and CBS values.

LSP Tunnel
An LSP tunnel is a Point to point unidirectional connection, carried by Transmission
paths with a Transport type sets to the SDH value.
To route an LSP tunnel, the user gives the full path of the LSP Tunnel as a list of
constraints. Constraints are Transmission paths and, optionally, MPLS labels.
To allocate, the user defines a list of constraints corresponding to the list of the Transport
Links.
To provision the LSP tunnel, the system configures each involved NE to implement the
related Traffic Descriptor and to implement theLSR or LER cross connections. This
infrastructure can carry one or more VC-LSP with the same QoS.
Actions on a LSP tunnel
The possible actions that involve a LSP tunnel are:
• Creation, deletion, modification.
• Get properties, extremities, route, inventory.
• Allocation or de-allocation of LSP tunnel.
• Implementation or de-implementation of LSP tunnel.
• Indication of bandwidth loading.

....................................................................................................................................................................................................................................
11-66 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Generalities MPLS Management
Functional Domain
....................................................................................................................................................................................................................................
• State management.
• Fault Localization.
The LSP tunnel states
The LSP tunnel states are:
• Provisioning state:
– Defined, Allocated, Partially Implemented, Implemented.
– The provisioning state indicates the result of each operation used to implement an
LSP tunnel in a network.
– If the implementation does not completes, then the provisioning state changes to
Partially Implemented. The same rule is applied to the de-implementation.
• Usage state:
– Idle, Busy, Reserved.
– If the LSP Tunnel supports at least one VC-LSP, it changes to busy. In addition, at
each changing, the available bandwidth must be computed.
• .
Availability status:
– Normal, Degraded, In failure.
– The availability status is related to the presence or not of alarms.
• .
Working state:
– Normal, Removing, Allocating, De-Allocating, Implementing, De-Implementing.
– The Working state is related to the action on going on the object.

VC-LSP
A VC-LSP is provisioned only at its extremities. No cross connection is allowed on
intermediate NE.
A VC-LSP is carried by one LSP tunnel or by one Transmission path and the Type set to
Ethernet value. This infrastructure can carry one Ethernet Service.
Actions on a VC-LSP
The possible actions that involve a VC-LSP are:
• Creation, deletion, modification.
• Get properties, extremities.
• Implementation, de-implementation.
• Commission, de-commission.
• State management.
The VC-LSP states
The VC-LSP states are:
• Provisioning state:

....................................................................................................................................................................................................................................
1350 OMS 11-67
8DG42227DAAA 9.6
Issue 3 December 2012
Generalities MPLS Management
Functional Domain
....................................................................................................................................................................................................................................
Defined, Partially Implemented, Implemented, Commissioned.
• Availability status:
Normal, Degraded, In failure.
The availability status is related to the presence or not of alarms.
• Working state:
Normal, Removing, Implementing, De-Implementing, Commissioning,
De-Commissioning.

....................................................................................................................................................................................................................................
11-68 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Generalities Maintenance Management
Functional Domain
....................................................................................................................................................................................................................................

Maintenance Management
Overview
The maintenance management is related to Alarms, Fault Localization, PM management,
and Inventory.

Alarms
The only available alarms are the “equipment alarms”: no specific Ethernet transmission
alarm is available; only an alarm related the link between CE and PE are available at
Ethernet port level. The alarm coming from SDH failure is signaled and associated to the
Ethernet link termination supported by the alarmed SDH path.
The application evaluates the service status on Ethernet Services starting from EVC and
Ethernet Segments. On Ethernet Segments, the availability status is calculated based on:
• Alarms on the server Transport Links: SDH alarms, MPLS VC-LSP alarms.
• Alarms on Ethernet ports.
Note: For SDH paths, the alarm working state is available..
The alarms received are used to calculate the “availability status” of each affected objects.
The alarm received is elaborate and a new specific alarm is generated. These alarms with
a specific Network Management Level probable causes are sent to Fault Management.
Affected objects are the different type of Transport Link (called “Link Over…”
technology specific), the MPLS LSP tunnel and the Ethernet Segment.

Fault Localization
The Fault Localization allows a user to determine the list of elementary alarms affecting a
managed resource. Examples of managed resource are Ethernet Segments, Transport
Links, and LSP tunnels.
The Fault Localization distinguishes problems related to the Ethernet Service from
problems in the underlying transport network. Fault Localization helps the user in
verifying where the fault is located, which board, which connection. The methods used
are the loop back operation and selective PM counters collection.
Fault Localization is called by choosing an alarm on AS: the overall elementary alarms
affect the objects are visualized.
The Fault Localization List window can be invoked either from Fault Management GUI
or from Construction, Ethernet Management, or MPLS GUI.

Quality of service: PM management


The PM management allows the collecting of detailed performance measurements on user
Ethernet traffic. Statistics are computed on a per service, per EVC, per Ethernet Segment.
These data can be used as base for QoS data or for maintenance reason (Fault
Localization, preventive maintenance, and so forth). The use depending on the counter
type (aggregation counters or flow counters) and on the frequency of the collection.
....................................................................................................................................................................................................................................
1350 OMS 11-69
8DG42227DAAA 9.6
Issue 3 December 2012
Generalities Maintenance Management
Functional Domain
....................................................................................................................................................................................................................................
Inventory
The inventory requires information about the resources used by a service: from Ethernet
Service until the transmission resources.

....................................................................................................................................................................................................................................
11-70 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Generalities User Profile Management
Functional Domain
....................................................................................................................................................................................................................................

User Profile Management


System Management
The main system management offered functions concern the User Profile management.
The System management is taken in charge by the System Management Function (SMF)
external application of ALMAP.
For more information about SMF, refer to the document: [2] 1350 OMS Administration
Guide, Vol 2: Common GUI Functions.

User Profile concepts


User Profile is a set of services based on the following concepts:
• FAD: Set of functional access domains, for example a set of management functions.
• NAD: Set of network access domains.
• Functional resources.
A set of functional resources can be:
– An External Termination Point (ETP).
– Indirect Transport link for which NAD is inherited from terminations.
– an Ethernet Segment.
• Initiator: Gives the access rights on the NAD. By default, they are seven initiators:
“Administrator”, “Free Pool”, “NAD1”, …, “NAD5”.
• User Profile: Set of FADs that a user is allowed to access.
• User: The user is identified by a login and a password and associated to one User
Profile and one initiator. A user is only allowed to access the management functions
and the management entities included in profile and initiator the user is assigned to.
• Access control database: The database which contains all the information relative to
the access control management (for example users, user profiles, User Profile
assignments, and so on).

The actors
The actors who interact with this set of services are the following:
• The Administrator is a user allowed to administer the 1350 OMS PKT application
and to operating system.
• The Constructor has the rights to manage only the subnetworks, NEs, ENEs, Links
Over TDM, cable, MPLS.
• The Operator has the rights to configure and get information about the network.
• The Viewer has the rights only to get information about the network.
• The north interface manager has the rights to configure and get information about
the network.
• The north interface viewer has the rights only to get information about the network.

....................................................................................................................................................................................................................................
1350 OMS 11-71
8DG42227DAAA 9.6
Issue 3 December 2012
Generalities User Profile Management
Functional Domain
....................................................................................................................................................................................................................................
For a detailed description on available operations for each actor, refer to: Chapter 5,
“1350 OMS PKT User Management”.

Relationship between resource and initiator


The “Free Pool” NAD is a set of resources available to all 1350 OMS PKT users. The
“1350 OMS PKT Administrator” NAD groups resources available to users with the “1350
OMS PKT Administrator” initiator.

NAD of the resource. Required initiator to modify the NAD of the


resource.
1350 OMS PKT Administrator. 1350 OMS PKT Administrator.
Free Pool. 1350 OMS PKT Administrator; Free Pool.
Other. 1350 OMS PKT Administrator; Other.

The NAD values


The NAD value is a numerical value between 0 and 99999. The following NAD values
have specific meaning:
• NAD=0 identifies a free pool object. The free pool object is not assigned to any
specific Network Partition. The free pool objects are visible and accessible by each
user and by external applications. (External access is not checked by 1350 OMS
PKT).
• NAD=999 identifies a dedicated free pool object. The dedicated free pool is a
second set of FREE POOL objects. The dedicated free pool objects are not assigned
to any specific Network Partition neither to the Free Pool set. The dedicated free
pool objects are visible and accessible by each user and by external applications.
(External access is not checked by 1350 OMS PKT).
• NAD value in the range from 1 to 998 and from 1000 to the unsigned integer limit
identifies a Network Partition. The Network Partition objects are visible only to users
having the privileges on that Network partitions. (In the scope of 1350 OMS PKT, no
user access right are connected to NAD values, so that the external applications
supply the appropriate filtering criteria to access and operate on the right set of
objects).

....................................................................................................................................................................................................................................
11-72 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
12 Managing your Network
12

Overview
Purpose
This chapter gives operational guidelines for managing the network, it provides the
conceptual information and the associated tasks for the Network configuration of the1350
OMS PKT application. The network construction consists in representing the managed
network with the necessary submaps and creating all the required objects in the data
bases.

Contents

Network configuration 12-3


Create the network objects 12-3
External Network Reference 12-14
Create Physical Connection 12-20
Create LAG 12-24
Create Domain 12-27
Create Domain 12-27
Assign resource to Domain 12-31
Define NE 12-35
Traffic categories 12-39
Create Traffic Descriptor 12-39
Create Traffic Classifier 12-43
L2 Encapsulation 12-46
NML-EML synchronization 12-60
1350 OMS PKT resynchronization 12-60
Alignment after deletion and recreation of SDH Path 12-61
VPWS Ethernet PM management procedure 12-62
PM feature for the ISA ES1 1.0 board 12-62

...................................................................................................................................................................................................................................
1350 OMS 12-1
8DG42227DAAA 9.6
Issue 3 December 2012
Managing your Network Overview

....................................................................................................................................................................................................................................

Provider network operating as a distributed MAC Bridge 12-67


Single-Customer, No-VLAN, RSTP provisioning 12-69
Provisioning procedure (MAC-SC-NV-RSTP) 12-70
VLAN configuration scenario 12-75
VLAN configuration 12-75
MAC Bridge Network Configuration 12-77
MAC Bridge Basics 12-77

....................................................................................................................................................................................................................................
12-2 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Managing your Network Create the network objects
Network configuration
....................................................................................................................................................................................................................................

Network configuration

Create the network objects


When to use
Use this task to create new network objects.

General
During this activity, the operator has to create all the submaps according to the network
partitioning levels and insert inside them all the objects (network, subnetworks, 2nd level
subnetworks, nodes, ports and connections).

Before you begin


Open a Web Portal application.

....................................................................................................................................................................................................................................
1350 OMS 12-3
8DG42227DAAA 9.6
Issue 3 December 2012
Managing your Network Create the network objects
Network configuration
....................................................................................................................................................................................................................................
Create Subnetwork
...................................................................................................................................................................................................

1 Point to the parent object where you wish to create the subnetwork and issue Actions >
Create Subnetwork

Figure 12-1 Actions>Create Subnetwork

...................................................................................................................................................................................................

2 The Create Subnetwork box is displayed. Enter name. The starting object, i.e. the parent
one, is already selected. In case you want to modify the choice, select the Starting Object
(left click) field. This will retrieve a list of potential parent objects, where to select the
starting object,

....................................................................................................................................................................................................................................
12-4 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Managing your Network Create the network objects
Network configuration
....................................................................................................................................................................................................................................
Click on OK to confirm the creation.

Figure 12-2 Create Subnetwork box

....................................................................................................................................................................................................................................
1350 OMS 12-5
8DG42227DAAA 9.6
Issue 3 December 2012
Managing your Network Create the network objects
Network configuration
....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

3 Select the node to assign and click on V to confirm.

Figure 12-3 Create Subnetwork: Assign Children Nodes

....................................................................................................................................................................................................................................
12-6 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Managing your Network Create the network objects
Network configuration
....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

4 Select the node to assign to the subnetwork being created and click on OK.

Figure 12-4 Node to assign to subnetwork

....................................................................................................................................................................................................................................
1350 OMS 12-7
8DG42227DAAA 9.6
Issue 3 December 2012
Managing your Network Create the network objects
Network configuration
....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

5 The node is now assigned. Click on OK to confirm the subnetwork creation.

Figure 12-5 Confirm subnetwork creation

....................................................................................................................................................................................................................................
12-8 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Managing your Network Create the network objects
Network configuration
....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

6 The new subnetwork is now present in the map

Figure 12-6 Subnetwork present in the map

E...................................................................................................................................................................................................
N D O F S T E P S

Creating Nodes
Note: Nodes to add have been previously created.
The following steps must be executed
• From the main menu bar select
Action > EML > Create > NE to declare the NE
• Search > EML > NE to verify that the NE has been created
• Select the NE in the list and then with the right mouse button select from the
popup menu Actions > NE Address

....................................................................................................................................................................................................................................
1350 OMS 12-9
8DG42227DAAA 9.6
Issue 3 December 2012
Managing your Network Create the network objects
Network configuration
....................................................................................................................................................................................................................................
All NEs of the managed EML layer are automatically created and present in the database.
They can be inserted by the user in the target topology.
...................................................................................................................................................................................................

1 Select the subnetwork where you want to create the node and issue Actions>Modify
subnetwork

Figure 12-7 Actions>Modify subnetwork

....................................................................................................................................................................................................................................
12-10 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Managing your Network Create the network objects
Network configuration
....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

2 The Modify Subnetwork dialog box is displayed.

Figure 12-8 Modify subnetwork

....................................................................................................................................................................................................................................
1350 OMS 12-11
8DG42227DAAA 9.6
Issue 3 December 2012
Managing your Network Create the network objects
Network configuration
....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

3 The Modify Subnetwork dialog box is displayed. Click on button Contained Nodes and
Subnetworks. The relevant list is opened as a subwindow. see following figure. Select the
node (TSS-A in this case) to add and click on V to confirm.

Figure 12-9 Select the node to add

....................................................................................................................................................................................................................................
12-12 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Managing your Network Create the network objects
Network configuration
....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

4 Click on OK to confirm.

Figure 12-10 Modify subn: adding a node

...................................................................................................................................................................................................

5 The new node is created and its relevant icon is displayed in the relevant map.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS 12-13
8DG42227DAAA 9.6
Issue 3 December 2012
Managing your Network External Network Reference
Network configuration
....................................................................................................................................................................................................................................

External Network Reference


When to use
Use this task to create an external network reference.

Description
External Networks are used to describe a connection between various SDHs or to create a
path terminated on a node non controlled by SDH. A path is defined as non terminated if
either one of the NAPs or both are not in the SDH domain. A non-terminated path
describes a path between a Trail Termination Point (TTP) associated to a PDH port and a
Connection Termination Point (CTP).

Before you begin


Open a Web Portal application.

Create the External Network Reference


Task
...................................................................................................................................................................................................

1 Select from the main menu bar Actions > Physical > Create External Network

Figure 12-11 Actions>Physical>Create External Network

....................................................................................................................................................................................................................................
12-14 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Managing your Network External Network Reference
Network configuration
....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

2 The Create External Network. dialog box is presented. Enter userlabel, sitename and click
on OK

Figure 12-12 Create Ext Netw. dialog box

....................................................................................................................................................................................................................................
1350 OMS 12-15
8DG42227DAAA 9.6
Issue 3 December 2012
Managing your Network External Network Reference
Network configuration
....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

3 Select the destination topology and issue Actions > Modify subnetwork

Figure 12-13 Actions>Modify subnetwork

....................................................................................................................................................................................................................................
12-16 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Managing your Network External Network Reference
Network configuration
....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

4 The Modify Subnetwork dialog box is displayed. Click on button Contained Nodes and
Subnetworks. The relevant list is opened as a subwindow. see following figure. Select the
node (virtual in this case) to add and click on V to confirm.

Figure 12-14 Modify subnetwork

....................................................................................................................................................................................................................................
1350 OMS 12-17
8DG42227DAAA 9.6
Issue 3 December 2012
Managing your Network External Network Reference
Network configuration
....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

5 The Modify Subnetwork dialog box now contains the new added node in its node list

Figure 12-15 Modify Subn box: new added node

....................................................................................................................................................................................................................................
12-18 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Managing your Network External Network Reference
Network configuration
....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

6 The icon of the new added node is present in the target subnetwork.

Figure 12-16 New added node in the target map

E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS 12-19
8DG42227DAAA 9.6
Issue 3 December 2012
Managing your Network Create Physical Connection
Network configuration
....................................................................................................................................................................................................................................

Create Physical Connection


When to use
This procedure is used to create the Physical Connection

Related Information
This task does not have any related information.

Before you begin


Display the map on the Network Management GUI.

Task
...................................................................................................................................................................................................

1 From the main menu bar issue Actions > Physical > Create Physical Connection

Figure 12-17 Create>Physical Connection

....................................................................................................................................................................................................................................
12-20 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Managing your Network Create Physical Connection
Network configuration
....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

2 The Create Physical connection box is presented. Enter userlabel, select Connection
type= Ethernet. Click on Next button

Figure 12-18 Physcon create

...................................................................................................................................................................................................

3 Select the starting node, if not already selected, clicking on A-node empty box.. From the
node list select the relevant node and click on V. Select the port. Click on A Port. The list
of selectable ports is displayed in the left-lower area of the window. Select the port and
confirm by clicking on Exec (green V) button.

....................................................................................................................................................................................................................................
1350 OMS 12-21
8DG42227DAAA 9.6
Issue 3 December 2012
Managing your Network Create Physical Connection
Network configuration
....................................................................................................................................................................................................................................
The A port icon is now present in the selection area. With the same modality, perform the
selection of Z Port

Figure 12-19 Physcon create: port selection

...................................................................................................................................................................................................

4 From the Physical Connection list, displayed via Search > Physical > Physical
Connections, you can see that the Ethernet physical connection has been created as
defined.

....................................................................................................................................................................................................................................
12-22 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Managing your Network Create Physical Connection
Network configuration
....................................................................................................................................................................................................................................
Note: the Ethernet physical connection status will remain defined since the HO
payload is not applicable to an Ethernet physical connection

Figure 12-20 Physcon list: Eth physcon defined

...................................................................................................................................................................................................

5 The notification mechanism allows to see the just created Eth Physical connection in the
list of Link over Cable.

Figure 12-21 Link over Cable list

E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS 12-23
8DG42227DAAA 9.6
Issue 3 December 2012
Managing your Network Create LAG
Network configuration
....................................................................................................................................................................................................................................

Create LAG
When to use
The scope of this procedure is Create a LAG (Link Aggregation Group).

Related Information
This task does not have any related information.

Before you begin


All needed conditions are detailed along the procedure.

Task
...................................................................................................................................................................................................

1 From the main menu bar select Actions > Packet > Construction > Create LAG Port

Figure 12-22 Actions>Packet>Construction>Create LAG Port

...................................................................................................................................................................................................

2 In the Create LAG Port subwindow select:


• LAG size. As an example, set size=2. and assign to the LAG 3 ports. The first 2 ports
assigned will be the working ports of the LAG, while the 3rd will act as protecting.
• Client Type=ETS or PB (provider bridge)
• LACP = TRUE. Means Link Aggregation Control Protocol=True.
....................................................................................................................................................................................................................................
12-24 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Managing your Network Create LAG
Network configuration
....................................................................................................................................................................................................................................
• Hash Key.= not meaningful.
•Select node and ports via the usual selection mechanism.
Click on Apply to confirm.

Figure 12-23 Create LAG Port

...................................................................................................................................................................................................

3 The LAG port is now displayed in the Port list.

....................................................................................................................................................................................................................................
1350 OMS 12-25
8DG42227DAAA 9.6
Issue 3 December 2012
Managing your Network Create LAG
Network configuration
....................................................................................................................................................................................................................................
Click twice on LAG port row; a +(expand ) mark will appear on the left area in
correspondence to the LAG port. Select +(expand ); you will get the LAG port detail.

Figure 12-24 LAG port and LAG port detail

E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
12-26 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Managing your Network Create Domain
Create Domain
....................................................................................................................................................................................................................................

Create Domain

Create Domain
When to use
The scope of this procedure is Create a Domain.

Related Information
This task does not have any related information.

Before you begin


All needed conditions are detailed along the procedure.

Task
...................................................................................................................................................................................................

1 From the main menu bar select Actions > Packet > Construction > Create Domain

Figure 12-25 Actions>Packet>Construction>Create Domain

....................................................................................................................................................................................................................................
1350 OMS 12-27
8DG42227DAAA 9.6
Issue 3 December 2012
Managing your Network Create Domain
Create Domain
....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

2 For Domain type=Bridge you further select bridge type. In particular, selecting
MAC-802-1D you will select the STP (spanning tree protocol) type.

Figure 12-26 Create Domain MAC-802.1D

...................................................................................................................................................................................................

3 No particular setting for create Domain T-MPLS or ETS (over SDH)

....................................................................................................................................................................................................................................
12-28 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Managing your Network Create Domain
Create Domain
....................................................................................................................................................................................................................................
Click on OK.

Figure 12-27 Create Domain

...................................................................................................................................................................................................

4 To check the created domain select Search > Packet > Construction > Domains

Figure 12-28 Search>Packet>Construction>Domains

....................................................................................................................................................................................................................................
1350 OMS 12-29
8DG42227DAAA 9.6
Issue 3 December 2012
Managing your Network Create Domain
Create Domain
....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

5 The Domain list is shown below.

Figure 12-29 Domain list

E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
12-30 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Managing your Network Assign resource to Domain
Create Domain
....................................................................................................................................................................................................................................

Assign resource to Domain


When to use
The scope of this procedure is Assign resource to Domain

Related Information
This task does not have any related information.

Before you begin


All needed conditions are detailed along the procedure.

Task
...................................................................................................................................................................................................

1 From the main menu bar issue Search > Packet > Construction > Network Elements >
Defined NEs

Figure 12-30 Search>Packet>Construction>Network Elements>Defined NEs

....................................................................................................................................................................................................................................
1350 OMS 12-31
8DG42227DAAA 9.6
Issue 3 December 2012
Managing your Network Assign resource to Domain
Create Domain
....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

2 The list of the Defined NEs is displayed. Select the NE to assign and issue

Figure 12-31 NE: Search>Ethernet Physical Ports

...................................................................................................................................................................................................

3 From the Ethernet Ports list you can see that the involved ports are now busy

Figure 12-32 Eth Ports: the port is now busy

....................................................................................................................................................................................................................................
12-32 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Managing your Network Assign resource to Domain
Create Domain
....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

4 Select the LoC and issue Actions > Assign Resources to Domain

Figure 12-33 LoC: Actions>Assign Resources to Domain

...................................................................................................................................................................................................

5 The Assign Resources to Domain box is displayed.


Click on icon Domains. The Selectable Domain list is displayed. Select Domain T-MPLS
and click on V to confirm.

....................................................................................................................................................................................................................................
1350 OMS 12-33
8DG42227DAAA 9.6
Issue 3 December 2012
Managing your Network Assign resource to Domain
Create Domain
....................................................................................................................................................................................................................................
In the main Assign Resources to Domain box click on OK to confirm.

Figure 12-34 Assign Resources to Domain

E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
12-34 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Managing your Network Define NE
Create Domain
....................................................................................................................................................................................................................................

Define NE
When to use
The scope of this procedure is to make known (define) an NE to PKT.

Related Information
This task does not have any related information.

Before you begin


All needed conditions are detailed along the procedure.

Task
...................................................................................................................................................................................................

1 From the main menu bar select Search > Packet > Construction > Defined NEs

Figure 12-35 Defined NEs list

...................................................................................................................................................................................................

2 Navigate to the involved port via the NE Show Equipment.

....................................................................................................................................................................................................................................
1350 OMS 12-35
8DG42227DAAA 9.6
Issue 3 December 2012
Managing your Network Define NE
Create Domain
....................................................................................................................................................................................................................................
The Port Administrative state=DOWN

Figure 12-36 Port Administrative state=DOWN

....................................................................................................................................................................................................................................
12-36 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Managing your Network Define NE
Create Domain
....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

3 From the main menu bar select Actions > Packet > Construction > Define Network
Element.

Figure 12-37 Actions>Packet>Construction>Define Network Element

...................................................................................................................................................................................................

4 The Define Network Element box is displayed.


Select the NE thorough the usual selection mechanism.

....................................................................................................................................................................................................................................
1350 OMS 12-37
8DG42227DAAA 9.6
Issue 3 December 2012
Managing your Network Define NE
Create Domain
....................................................................................................................................................................................................................................
Click on OK.

Figure 12-38 Define Network Element

...................................................................................................................................................................................................

5 The NE which has been defined is now present in the list of defined NEs and the ports
involved in the LoC have Administative status = UP.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
12-38 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Managing your Network Create Traffic Descriptor
Traffic categories
....................................................................................................................................................................................................................................

Traffic categories

Create Traffic Descriptor


When to use
The scope of this procedure is to create a Traffic Descriptor.
The Traffic Descriptor describes the band and the COS -class of service (Guaranteed/Best
Effort/Regulated)

Related Information
This task does not have any related information.

Before you begin


All needed conditions are detailed along the procedure.

....................................................................................................................................................................................................................................
1350 OMS 12-39
8DG42227DAAA 9.6
Issue 3 December 2012
Managing your Network Create Traffic Descriptor
Traffic categories
....................................................................................................................................................................................................................................
Task
...................................................................................................................................................................................................

1 From the main menu bar select Actions > Packet > Services > Create Traffic
Descriptor.

Figure 12-39 Actions>Packet>Services>Create Traffic Descriptor

...................................................................................................................................................................................................

2 In the Create Traffic Descriptor box you may select COS=Guaranteed.

....................................................................................................................................................................................................................................
12-40 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Managing your Network Create Traffic Descriptor
Traffic categories
....................................................................................................................................................................................................................................
The following is an example of Traffic Descriptor: COS = Regulated. It means a mix of
Guaranteed+Best Effort.

Figure 12-40 Create Traffic Descriptor:Regulated

....................................................................................................................................................................................................................................
1350 OMS 12-41
8DG42227DAAA 9.6
Issue 3 December 2012
Managing your Network Create Traffic Descriptor
Traffic categories
....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

3 The following is an example of COS=Best Effort

Figure 12-41 Create Traffic Descriptor: Best Effort

E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
12-42 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Managing your Network Create Traffic Classifier
Traffic categories
....................................................................................................................................................................................................................................

Create Traffic Classifier


When to use
The scope of this procedure is to create a Traffic Classifier.
The Traffic Classifier is the Customer VLAN ID.

Related Information
This task does not have any related information.

Before you begin


All needed conditions are detailed along the procedure.

Task
...................................................................................................................................................................................................

1 From the main menu bar select Actions > Packet > Services > Create Traffic Classifier

Figure 12-42 Actions>Packet>Services>Create Traffic Classifier

....................................................................................................................................................................................................................................
1350 OMS 12-43
8DG42227DAAA 9.6
Issue 3 December 2012
Managing your Network Create Traffic Classifier
Traffic categories
....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

2 In the Create Traffic Classifier box enter name, VLAN ID

Figure 12-43 Create Traffic Classifier

....................................................................................................................................................................................................................................
12-44 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Managing your Network Create Traffic Classifier
Traffic categories
....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

3 The Traffic Classifier list is shown below.

Figure 12-44 Traffic Classifier list

E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS 12-45
8DG42227DAAA 9.6
Issue 3 December 2012
Managing your Network L2 Encapsulation
Traffic categories
....................................................................................................................................................................................................................................

L2 Encapsulation
When to use
The scope of this procedure is to create a L2 Encapsulation profile.
The L2 Encapsulation profile is used in VLAN.

Related Information
This task does not have any related information.

Before you begin


All needed conditions are detailed along the procedure.

Display default L2 encapsulation for tunnel


...................................................................................................................................................................................................

1 From the main menu bar select Actions > Packet > T-MPLS > Create T-MPLS Tunnel

....................................................................................................................................................................................................................................
12-46 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Managing your Network L2 Encapsulation
Traffic categories
....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

2 In the Create T-MPLS Tunnel box, enter Tunnel name, main attributes and QoS attributes.
For detail see sect. 3.2 T-MPLS Tunnel create.

Figure 12-45 Create T-MPLS Tunnel step1

....................................................................................................................................................................................................................................
1350 OMS 12-47
8DG42227DAAA 9.6
Issue 3 December 2012
Managing your Network L2 Encapsulation
Traffic categories
....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

3 Select destinations and constraint.

Figure 12-46 Create T-MPLS Tunnel step2

...................................................................................................................................................................................................

4 Allocate the tunnel.

....................................................................................................................................................................................................................................
12-48 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Managing your Network L2 Encapsulation
Traffic categories
....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

5 Issue the display of the tunnel list via command Search>Packet>T-MPLS>T-MPLS


Tunnels. The list is displayed.

Figure 12-47 Tunnel list

...................................................................................................................................................................................................

6 Implement the tunnel.


...................................................................................................................................................................................................

7 Display the segments of the T-MPLS tunnel via Search>T-MPLS Segments pop-up menu.

Figure 12-48 Tunnel:Search>T-MPLS Segments

....................................................................................................................................................................................................................................
1350 OMS 12-49
8DG42227DAAA 9.6
Issue 3 December 2012
Managing your Network L2 Encapsulation
Traffic categories
....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

8 Select the segment (in this case you can manage only the real segment) and issue
Search>T-MPLS L2 Encapsulation Profiles

Figure 12-49 T-MPLS segment:Search>T-MPLS L2 Encapsulation Profiles

...................................................................................................................................................................................................

9 The default L2 Encapsulation profile is assigned to the segment.

Figure 12-50 Default L2 Encapsulation profile

E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
12-50 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Managing your Network L2 Encapsulation
Traffic categories
....................................................................................................................................................................................................................................
Create T-MPLS L2 Encapsulation Profile
...................................................................................................................................................................................................

1 From the main menu bar select Actions>Packet>T-MPLS>Create T-MPLS L2


Encapsulation Profile

Figure 12-51 Actions>Packet>T-MPLS>Create T-MPLS L2 Encapsulation Profile

...................................................................................................................................................................................................

2 In the Create T-MPLS L2 Encapsulation Profile dialog box enter:


name
mac address
tag=yes
vlan ID
priority
drop eligibility

....................................................................................................................................................................................................................................
1350 OMS 12-51
8DG42227DAAA 9.6
Issue 3 December 2012
Managing your Network L2 Encapsulation
Traffic categories
....................................................................................................................................................................................................................................
Click on OK to confirm the creation.

Figure 12-52 Create T-MPLS L2 Encapsulation Profile

...................................................................................................................................................................................................

3 Display the list of the L2 Encapsulation Profiles via Search>Packet>T-MPLS>QOS>T-


MPLS L2 Encapsulation Profiles

....................................................................................................................................................................................................................................
12-52 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Managing your Network L2 Encapsulation
Traffic categories
....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

4 The profile which has been just created is included in the list.

Figure 12-53 L2 Encapsulation Profiles list

E...................................................................................................................................................................................................
N D O F S T E P S

L2E-Configure tunnel segment


...................................................................................................................................................................................................

1 Select the segment and issue Actions>Configure

Figure 12-54 T-MPLS Segment: Actions>Configure

...................................................................................................................................................................................................

2 The T-MPLS Segment configuration box is displayed.


the T-MPLS segment is already selected
select the T-MPLS PHB profile

....................................................................................................................................................................................................................................
1350 OMS 12-53
8DG42227DAAA 9.6
Issue 3 December 2012
Managing your Network L2 Encapsulation
Traffic categories
....................................................................................................................................................................................................................................
select the T-MPLS L2 Encapsulation profile
select the virtual transport
select the PM granularity (if any)
Click on Apply.

Figure 12-55 T-MPLS Segment configuration

....................................................................................................................................................................................................................................
12-54 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Managing your Network L2 Encapsulation
Traffic categories
....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

3 Select the segment (in this case you can manage only the real segment) and issue
Search>T-MPLS L2 Encapsulation Profiles

Figure 12-56 Segment:Search>T-MPLS L2 Encapsulation Profiles

...................................................................................................................................................................................................

4 The L2 Encapsulation Profile has been associated.

Figure 12-57 L2 Encapsulation Profiles list

E...................................................................................................................................................................................................
N D O F S T E P S

L2 Encapsulation on Pseudo Wires


...................................................................................................................................................................................................

1 Create a Pseudo Wires. Select Actions>Packet>T-MPLS>Create T-MPLS Pseudo Wire


...................................................................................................................................................................................................

2 In the Pseudo Wires create dialog step1


Enter Pseudo Wires name, main attributes and QoS attributes. For detail see sect. 3.3
T-MPLS PW create.

....................................................................................................................................................................................................................................
1350 OMS 12-55
8DG42227DAAA 9.6
Issue 3 December 2012
Managing your Network L2 Encapsulation
Traffic categories
....................................................................................................................................................................................................................................
Click on Next.

Figure 12-58 Create T-MPLS Pseudo Wire

...................................................................................................................................................................................................

3 In Create T-MPLS PW step2 select the destinations.


Click on the left button on the right-hand side of the Constraints subwindow Select
a section as constraint.
In addition, set PW on section attribute to True. See below figure.

....................................................................................................................................................................................................................................
12-56 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Managing your Network L2 Encapsulation
Traffic categories
....................................................................................................................................................................................................................................
Click on Apply/OK to confirm the creation.

Figure 12-59 Create T-MPLS PW step2

...................................................................................................................................................................................................

4 To verify the successful creation, issue Search>Packet>T-MPLS>T-MPLS Pseudo Wires


...................................................................................................................................................................................................

5 The PW list is displayed. See below figure.

Figure 12-60 PW list

....................................................................................................................................................................................................................................
1350 OMS 12-57
8DG42227DAAA 9.6
Issue 3 December 2012
Managing your Network L2 Encapsulation
Traffic categories
....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

6 Select the PW just created and issue Search>T-MPLS Segments.

Figure 12-61 PW: Search>T-MPLS Segments

...................................................................................................................................................................................................

7 Select the segment and issue Actions>Configure

Figure 12-62 PW segment: Actions>Configur

...................................................................................................................................................................................................

8 The T-MPLS Segment configuration box is displayed.


the T-MPLS segment is already selected
select the T-MPLS PHB profile
select the T-MPLS L2 Encapsulation profile

....................................................................................................................................................................................................................................
12-58 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Managing your Network L2 Encapsulation
Traffic categories
....................................................................................................................................................................................................................................
Click on Apply/OK to confirm the creation.

Figure 12-63 T-MPLS Segment configuration box for PW

...................................................................................................................................................................................................

9 Select the segment (in this case you can manage only the real segment) and issue
Search>T-MPLS L2 Encapsulation Profiles

Figure 12-64 T-MPLS L2 Encapsulation Profiles for PW

E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS 12-59
8DG42227DAAA 9.6
Issue 3 December 2012
Managing your Network 1350 OMS PKT resynchronization

....................................................................................................................................................................................................................................

NML-EML synchronization

1350 OMS PKT resynchronization


Overview
At startup, the 1350 OMS PKT synchronizes the TDM terminations and Links Over TDM
tables with 1350 OMS SDH NAPS and SDH paths.
In case the 1350 OMS PKT has detected a de-synchronization with the 1350 OMS SDH,
at the GUI start up, the user receives a message indicating the loss of synchronization.
To start a manual synchronization, click the menu: Action > Construction >
Synchronization > Manual synchronization.
A confirmation message is displayed.
After confirmation, the synchronization is performed on TDM terminations and Links
Over TDM entities.
The 1350 OMS PKT and 1350 OMS SDH synchronization is fulfilled in the following
cases:
• At the 1350 OMS PKT startup.
• During the lifetime of the two managers (1350 OMS PKT and 1350 OMS SDH).
• After the end of 1350 OMS SDH isolation.
The synchronization status can be checked at any time, by Action > Construction >
Synchronization > Check synchronization status command.

....................................................................................................................................................................................................................................
12-60 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Managing your Network Alignment after deletion and recreation of SDH Path
NML-EML synchronization
....................................................................................................................................................................................................................................

Alignment after deletion and recreation of SDH Path


AlignDBSDHPathID offline procedure
The procedure aligns 1350 OMS PKT data base after the deletion and subsequent
recreation of the same SDH Path in 1350 OMS SDH.
The Tool AlignDBSDHPathId.sh is applicable when following conditions occurs:
• An SDH Path under 1350 OMS PKT control (and known as Link Over TDM) has
been deleted and recreated from 1350 OMS SDH.
• The SDH path deleted and recreated from 1350 OMS SDH must have the same
characteristics. They must have the same User Label, the same end points, rate, and so
forth.
• The Link Over TDM inside 1350 OMS PKT is visible both to MS-GUI.
• The Link Over TDM inside Core GUI is marked as not Consistent.
Note: This procedure is a shell script that runs offline.
For a description of the alignment tool, refer to: Chapter 10, “1350 OMS PKT
AlignDBSDHPathID Tool”.

....................................................................................................................................................................................................................................
1350 OMS 12-61
8DG42227DAAA 9.6
Issue 3 December 2012
Managing your Network PM feature for the ISA ES1 1.0 board
VPWS Ethernet PM management procedure
....................................................................................................................................................................................................................................

VPWS Ethernet PM management procedure

PM feature for the ISA ES1 1.0 board


When to use
The procedure describes the use the Performance Monitoring on an ISA ES1 1.0 board
and of a port-to-port connection.

Additional information
This case is supplied in the scope of one VPWS (Virtual Private Wire Service). The
established connectivity is bidirectional between two Ethernet ports fully dedicated to this
service.
The procedure is based on the service definition and management from the 1350 OMS
PKT. The PM operations are done through Navigation in the scope of the 1350 OMS
EML.
The goal of this procedure is to activate the Performance measurement on each extremity
of the service to analyze the rendering of the connection.
The following figure aims to describe the application case of the procedure:

The procedure aims to describe the different steps the user must do. Procedure starts from
a VPWS Service between two extremities: ISA #A Port N and ISA #Z port M. The user
aims to observe the corresponding Performances.

Before you begin


The system is running.
The system is properly configured.
....................................................................................................................................................................................................................................
12-62 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Managing your Network PM feature for the ISA ES1 1.0 board
VPWS Ethernet PM management procedure
....................................................................................................................................................................................................................................
The system is connected by MS-GUI.
Pre-requisite
This chapter aims to list the necessary steps requested to go on with the following
procedure:
• All NEs are under the 1350 OMS PKT management, the required resources in term of
port and Link Over TDM have already been built.
• The Ethernet Service of type VPWS has been created.
• The contained EVC and Ethernet Segment have been allocated and implemented.

Task
From MS-GUI main window:
...................................................................................................................................................................................................

1 List of the Ethernet Services:


The Ethernet Service List window presents all the Ethernet Services and their attributes.
Select the menu: Search > Packet > Services > Services.
Result: The Ethernet Service List window presents all the Ethernet Services and their
attributes.
Following window is displayed:

...................................................................................................................................................................................................

2 From the Ethernet Service List, select one VPWS service.


Select the desired VPWS service and require the list of EVC termination:
...................................................................................................................................................................................................

3 Select the menu: Search > Inventory from Service > List EVC Terminations.
Result: The EVC Termination List window presents all the terminations of the
selected EVC and their attributes.
...................................................................................................................................................................................................

4 Open the list of the NE:


....................................................................................................................................................................................................................................
1350 OMS 12-63
8DG42227DAAA 9.6
Issue 3 December 2012
Managing your Network PM feature for the ISA ES1 1.0 board
VPWS Ethernet PM management procedure
....................................................................................................................................................................................................................................
Select the menu: Search > Packet > Construction > Network Elements > Defined NE.
Result: NE list presents all the NEs managed (that is already defined) by the 1350
OMS PKT, and their attributes.
Following window is displayed:

...................................................................................................................................................................................................

5 Navigate toward the NEs:


For each EVC termination, the user must note the reference of the NE and also the user
label of the port.
Starting from the MS-GUI, the user can open the NE list and Navigate for each of them
toward the 1350 OMS EML GUI:
select one NE in the list.
...................................................................................................................................................................................................

6 Select: Search > Inventory from Network Elements > Zoom-in.

....................................................................................................................................................................................................................................
12-64 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Managing your Network PM feature for the ISA ES1 1.0 board
VPWS Ethernet PM management procedure
....................................................................................................................................................................................................................................
Result: The equipment view of the selected NE is opened (like on the 1350 OMS
EML or 1320CT).
...................................................................................................................................................................................................

7 Activate the Performance points:


For each EVC termination (that is each local interface termination of the EVC in the
context of the 1350 OMS PKT), the user activates the performance point:
From the 1350 OMS EML View, select the Performance tab == > Select the desired Local
interface into the resource tree area.
...................................................................................................................................................................................................

8 From the 1350 OMS EML View, on the top right-hand side of the menu bar, select the
menu Performance == > Ethernet Port Management == > Configure Eth Aggr..
Result: The following window is displayed:

Note: Some small differences appear between the 1320CT GUI and the 1350 OMS
EML GUI. This procedure has been built from the 1320CT GUI.
...................................................................................................................................................................................................

9 For each area in the window (Incoming, Outgoing), activate the Performance activity:
Select the Data collection tic == > close.
...................................................................................................................................................................................................

10 Display the results of the Performance points through PM.


For each local interface termination of the EVC, the user displays the results of the
performance point:
From the 1350 OMS EML View, select the menu diagnosis > Performance Data > 1
Hour.

....................................................................................................................................................................................................................................
1350 OMS 12-65
8DG42227DAAA 9.6
Issue 3 December 2012
Managing your Network PM feature for the ISA ES1 1.0 board
VPWS Ethernet PM management procedure
....................................................................................................................................................................................................................................
Result: The PM windows (graphical display, reports) are opened with the list of active
Performance points on the NE.
Note: The Navigation toward PM is, at the moment, only based on NE, not on
termination granularity.
The first results are available about 3 h after the start of the PM activity. In the mean
while, the display of PM result is empty of any data.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
12-66 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Managing your Network Provider network operating as a distributed MAC Bridge
VPWS Ethernet PM management procedure
....................................................................................................................................................................................................................................

Provider network operating as a distributed MAC Bridge


When to use
This procedure explains how Provider network operates as a distributed MAC Bridge.

Related information

Figure 12-65 Provider network operating as a distributed MAC Bridge

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.

....................................................................................................................................................................................................................................
1350 OMS 12-67
8DG42227DAAA 9.6
Issue 3 December 2012
Managing your Network Provider network operating as a distributed MAC Bridge
VPWS Ethernet PM management procedure
....................................................................................................................................................................................................................................
Scheme

Figure 12-66 Provider network operating as a distributed MAC Bridge

Description
When a new Ethernet Service has to be realized for a new customer, the user must be
aware of the following information:
• All ISA switches and all switching ports must be used by the same customer.
• All infrastructure links connecting switching ports must be used by the same
customer.
• Traffic engineering is conditioned by the spanning tree protocol.
Tagged and untagged frames are carried in the same way across the network.

....................................................................................................................................................................................................................................
12-68 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Managing your Network Single-Customer, No-VLAN, RSTP provisioning
VPWS Ethernet PM management procedure
....................................................................................................................................................................................................................................

Single-Customer, No-VLAN, RSTP provisioning


Network scenario
This network scenario is characterized as follows:
• Single customer.
• No VLAN management in the provider network.
• Spanning tree protocol: RSTP.
All traffic is routed on the active topology. Links not belonging to the current active
topology are unused by data traffic. Traffic classification do not apply: even if different
classes of traffic exist for the same user, they are not managed inside the provider
network.

Figure 12-67 Single-Customer, No-VLAN, RSTP-enabled

....................................................................................................................................................................................................................................
1350 OMS 12-69
8DG42227DAAA 9.6
Issue 3 December 2012
Managing your Network Provisioning procedure (MAC-SC-NV-RSTP)
VPWS Ethernet PM management procedure
....................................................................................................................................................................................................................................

Provisioning procedure (MAC-SC-NV-RSTP)


When to use
This procedure permits to provision MAC-SC-NV-RSTP .

Related information
For a description of the function, refer to the topic “Single-Customer, No-VLAN, RSTP
provisioning” (p. 12-69).
For a description of VLAN, refer to the topic “VLAN management” (p. 11-54).
For a description of MAC Bridge and Spanning Tree, refer to the topic “MAC Bridge
Basics” (p. 12-77).

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
Restrictions
The current procedure does not address the following items:
• Filtering database management.
• RSTP tuning.
• ASAP configuration.
• Flow control.
• Auto-negotiation.
• Rate limiting management.

Task
...................................................................................................................................................................................................

1 For each ISA board to be configured as a switching NE:


For each local or remote Interface Port belonging to the switching NE, in case the port
must be configured as a switching port:
Execute the procedure.
...................................................................................................................................................................................................

2 For each local or remote Interface Port belonging to the switching NE and to be
configured as a switching port (either UNI, IWI or NNI):
Execute the procedure: “Configure UNI, IWI, or NNI switching ports” (p. 12-72).

....................................................................................................................................................................................................................................
12-70 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Managing your Network Provisioning procedure (MAC-SC-NV-RSTP)
VPWS Ethernet PM management procedure
....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

3 For each local or remote Interface Port belonging to a switching NE and to be configured
as an internal (that is NNI) switching port:
Execute the procedure: “Configure internal switching port” (p. 12-72).
...................................................................................................................................................................................................

4 For each local or remote Interface Port belonging to a switching NE and to be configured
as an edge (that is UNI or IWI) switching port:
Execute the procedure: “Configure edge switching port” (p. 12-73).
E...................................................................................................................................................................................................
N D O F S T E P S

Configure switching port


For each local or remote Interface Port belonging to the switching NE:
...................................................................................................................................................................................................

1 If the port is active, then deactivate the port, by means of conditioning port administrative
status to down. Operation is performed through navigation to 1350 OMS EML:
Note: Search > Packet > Construction > Network Elements > Available NEs >
Navigate to EML.
Transmission View > Select Local/Remote Interface > Configure Ethernet Port >
Admin Status > down.
...................................................................................................................................................................................................

2 Set the ISA NE as a member of connection-less 802.1D network, by means of


conditioning bridge type to MAC (IEEE 802.1D). This operation is performed directly by
1350 OMS PKT:
Search > Packet > Construction > Network Elements > Defined NEs.
Select NE then click Configure > Bridge Type > MAC.
...................................................................................................................................................................................................

3 Set the type of spanning tree protocol to be used in the connection-less network, by means
of conditioning protocol type to RSTP. Operation is performed through navigation to
1350 OMS EML:
Select Transmission View.
Select the Bridge then click Configure (R) STP Bridge > Protocol Type > RSTP.

E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS 12-71
8DG42227DAAA 9.6
Issue 3 December 2012
Managing your Network Provisioning procedure (MAC-SC-NV-RSTP)
VPWS Ethernet PM management procedure
....................................................................................................................................................................................................................................
Configure UNI, IWI, or NNI switching ports
For each local or remote Interface Port belonging to the switching NE that must be
configured as a switching port (either UNI, IWI or NNI):
...................................................................................................................................................................................................

1 Check that the interface type attribute is ethernetCsmaCd. Operation is performed


through navigation to 1350 OMS EML:
Select Transmission View.
Select Local/Remote Interface then click Ethernet Port Properties > Type >
ethernetCsmaCd.
This item is not configurable in all the NE types and releases.
Note: This operation is not supported by all the NE types and releases.
Check that port promiscuous mode is enabled. Operation is performed through navigation
to 1350 OMS EML:
Select Transmission View.
Select Local/Remote Interface then click Ethernet Port Properties > Promiscuous
Mode > enabled.
Note: This item is not configurable in all the NE types and releases.
Note: Promiscuous mode management is supported by ISA ES1/4 1.2, ISA ES16 2.0.
...................................................................................................................................................................................................

2 Set the port as a bridging port, by means of conditioning port client type to ETB.
Operation is performed directly by 1350 OMS PKT.

if…. then….
For local Interface Ports: Select Search > Packet > Construction > Network Elements >
Defined NEs.
Select NE and click physical Port list.
Select Port and click Configure > Client Type > ETB.
For remote Interface SelectSearch > Packet > Services > Connection Oriented (ETS) >
Ports: ETS Transport Links.
Select Transport Link and click Configure > Client Type > ETB.

E...................................................................................................................................................................................................
N D O F S T E P S

Configure internal switching port


...................................................................................................................................................................................................

1 For each local or remote Interface Port belonging to a switching NE that must be
configured as an internal (that is NNI) switching port:
....................................................................................................................................................................................................................................
12-72 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Managing your Network Provisioning procedure (MAC-SC-NV-RSTP)
VPWS Ethernet PM management procedure
....................................................................................................................................................................................................................................
Force control plane port state to dynamic. Operation is performed through 1350 OMS
EML:
Select Transmission View.
Select Bridge Port and click RSTP Per-Port Management > Force Port State > dynamic.
Note: This operation is not supported by all the NE types and releases.
The forced state is dynamic by default. Forcing control plane port state is supported
by ISA ES1/4 1.2, ISA ES16 2.0.
...................................................................................................................................................................................................

2 Activate the port, by means of conditioning port administrative status to up. Operation is
performed through navigation to 1350 OMS EML:
Select Transmission View.
Select Local/Remote Interface and click Configure Ethernet Port > Admin. Status > up.
Result: After this step, control frames travel inside the provider network and the
spanning tree is stabilized. If the customer network has no back-door links giving rise
to loops, the provider active topology remain stable.
Note: If none of the following conditions occur: Fault on a local or remote
interface, NE isolation, Local access control granted, Topology modification.
E...................................................................................................................................................................................................
N D O F S T E P S

Configure edge switching port


...................................................................................................................................................................................................

1 For each local or remote Interface Port belonging to a switching NE that must be
configured as an edge switching port (that is UNI or IWI):
Force control plane port state to forwarding. Operation is performed through 1350 OMS
EML:
Select Transmission View.
Select Bridge Port and click RSTP Per-Port Management > Force Port State >
forwarding.
Note: This operation is not supported by all the NE types and releases.
When not supported, you have the same spanning tree instance running across the
customer networks and the provider networks. Forcing control plane port state is
supported by ISA ES1/4 1.2, ISA ES16 2.1.
...................................................................................................................................................................................................

2 Activate the port, by means of conditioning port administrative status to up. Operation is
performed through navigation to 1350 OMS EML:
Select Transmission View.
....................................................................................................................................................................................................................................
1350 OMS 12-73
8DG42227DAAA 9.6
Issue 3 December 2012
Managing your Network Provisioning procedure (MAC-SC-NV-RSTP)
VPWS Ethernet PM management procedure
....................................................................................................................................................................................................................................
Select Local/Remote Interface and click Configure Ethernet Port > Admin. Status > up.
Result: After this step, user data frames are allowed to flow inside the provider
network. No flooding occurs since the active topology is stable at this stage.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
12-74 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Managing your Network VLAN configuration
VLAN configuration scenario
....................................................................................................................................................................................................................................

VLAN configuration scenario

VLAN configuration
When to use
The procedure permits to configure VLAN.

Related information
For a description of VLAN, refer to the topic “VLAN management” (p. 11-54).

Before you begin


The system is running and configured.

Task
The VLAN configuration scenario could have the following steps:
...................................................................................................................................................................................................

1 Create the VLAN Types with all their characteristics (User label and VLAN Tag Protocol
type value).
...................................................................................................................................................................................................

2 Associate the Edge ports to the VLAN Type (if its usage state is idle).
...................................................................................................................................................................................................

3 Associate the Provider Networks to the VLAN Type. Operation induces association
between Transport Link Terminations and VLAN Type.
...................................................................................................................................................................................................

4 Create an Ethernet Service VPAS or VPHS.


...................................................................................................................................................................................................

5 Create an EVC between Edge ports.


...................................................................................................................................................................................................

6 Create an Ethernet Segment with a VLAN model (Tunneling or Mapping) and associate a
Traffic Descriptor, a Color Profile, and a Traffic Classifier. For a Tunneling VLAN
model, give a VLAN Type associated to an Ethernet Segment.
Result: This action induces associations between the Ethernet Edge ports and the
given VLAN Type.
...................................................................................................................................................................................................

7 Select the route constraints. If the Ethernet Segment has the “Tunneling” VLAN model,
for a low cost solution, force the route to use one VC-LSP.

....................................................................................................................................................................................................................................
1350 OMS 12-75
8DG42227DAAA 9.6
Issue 3 December 2012
Managing your Network VLAN configuration
VLAN configuration scenario
....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

8 Allocate the Ethernet Segment.


Result: For a mapping VLAN model, the system computes where the pop and push
operations have to be done. .
...................................................................................................................................................................................................

9 Create the corresponding VLAN constraints with default values.


...................................................................................................................................................................................................

10 Configure the VLAN Constraint classes. For push, give the VLAN Id to push, the color
policy, and the Traffic Classifier. For pop operation, give the associated Traffic Classifier.
...................................................................................................................................................................................................

11 Implement the Ethernet Segment. Configure automatically the edge ports (download the
P-VLAN protocol type). Provision the pop or push operations.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
12-76 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Managing your Network Overview
MAC Bridge Network Configuration
....................................................................................................................................................................................................................................

MAC Bridge Network Configuration

MAC Bridge Basics


Overview
The bridge network management provide support for emerging Ethernet-based
connection-less services. Connection-less services connect in a transparent way various
customer sites across a metropolitan network (Metro-Ethernet). Example of services are
the virtual private LAN services (VPLS).
An Ethernet switch learns the MAC addresses of end-hosts and associates them with
appropriate ports on which the end-host frames arrive. In case of meshed networks,
loop-free connectivity is assured by a distributed computation carried through control
frames and resulting in a spanning tree.
In the context of Metro-Ethernet, a customer network is a collection of multiple networks
(LANs). LANs are physically connected by means of a service provider network. They
operate as if all those multiple networks are connected (virtually) as a single LAN. MAC
learning and packet forwarding is standardized by IEEE 802.1D.
Each ISA board operates as a Layer-two switch inside the provider network, performing
MAC learning, and packet forwarding.
From the customer point of view, MAC learning and packet forwarding is transparent.
The global operation of the ISA switches of the provider network are emulated. Network
operates as a single distributed MAC bridge equipped with all the Ethernet local ports that
face equipment at the CE.

....................................................................................................................................................................................................................................
1350 OMS 12-77
8DG42227DAAA 9.6
Issue 3 December 2012
Managing your Network MAC Bridge Basics

....................................................................................................................................................................................................................................

....................................................................................................................................................................................................................................
12-78 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
13 13
Network Organization
Management

Overview
Purpose
This chapter describes how to define subnetworks, domains, NEs, ENEs, and Services
Nodes, ports.

Contents

Managing Subnetworks 13-5


Overview about Subnetworks 13-5
View the list of subnetworks 13-7
Create a Subnetwork 13-8
Modify a Subnetwork 13-10
Delete a Subnetwork 13-13
View the details of the subnetworks 13-14
Managing Domains 13-15
Overview about Domains 13-15
View the list of Domains 13-17
Description of the list of Domains 13-18
Create a Domain 13-20
Modify a Domain 13-22
Delete a Domain 13-24
View the details of the domain 13-25
Details of a Domain 13-26
Assign resources to a Domain 13-27
Assign a NE to a Domain 13-29
Deassign a NE from a Domain 13-30
View the inventory of NE in a Domain 13-31
View the inventory of Transport Links in a Domain 13-32
...................................................................................................................................................................................................................................
1350 OMS 13-1
8DG42227DAAA 9.6
Issue 3 December 2012
Network Organization Management Overview

....................................................................................................................................................................................................................................

View the inventory of VT Queue Profiles in a Domain 13-33


Create Topological View in a Domain 13-34
Assign an Ethernet Physical Port to a Domain 13-35
Deassign an Ethernet Physical Port from a Domain 13-36
Managing service nodes 13-37
Overview about service nodes 13-37
View the inventory of NE in a Service Node 13-38
View the list of service nodes 13-39
Managing Network Elements 13-40
Overview about Network Elements 13-40
View the list of Network Elements 13-42
Define a NE 13-43
Add a NE to a Subnetwork 13-46
Modify a NE 13-49
View the details of the NEs 13-52
View the list of available Network Elements 13-53
Upload the Ethernet physical ports 13-54
Upload the TDM terminations 13-57
Upload the Links Over TDM 13-59
Audit the TDM terminations 13-62
Synchronize the TDM terminations 13-64
View the list of TDM terminations 13-66
View the details of the TDM terminations 13-67
Acknowledge the NE LAC state 13-68
Show the equipment view 13-70
View the inventory of VT Queue Profiles in a NE 13-73
Upload the Links Over Cable 13-74
Upload the Radio Ports 13-75
Create VT Queue Profile 13-76
Create Topological View from NE or ENE 13-77
Managing External Network Elements 13-78
Overview about External Network Elements 13-78
View the list of External Network Elements 13-80
Description of the list of ENE 13-81
Create an ENE 13-82

....................................................................................................................................................................................................................................
13-2 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Network Organization Management Overview

....................................................................................................................................................................................................................................

Modify an ENE 13-85


Delete an ENE 13-87
View the details of the ENEs 13-88
Details of an ENE 13-89
View the list of ETPs 13-90
Description of the list of ETPs 13-91
Create an ETP 13-92
Delete an ETP 13-94
Managing Ethernet Physical ports 13-96
View the list of Ethernet Physical ports 13-96
Description of the list of Ethernet physical ports 13-97
Configure an Ethernet physical port 13-99
Modify an Ethernet Physical Port 13-104
Assign a Port to Network Access Domain 13-106
View the details of the Ethernet physical ports 13-108
Details of an Ethernet Physical Port 13-109
View the list of Equipment ports 13-111
Description of the list of Equipment ports 13-112
Managing Link Aggregation (LAG) ports 13-113
Description of Link Aggregation (LAG) function 13-113
View the list of LAG ports 13-116
Description of the list of LAG ports 13-117
Create a LAG port 13-118
Modify a LAG port 13-120
Assign LAG port to Network Access Domain 13-125
View the details of the LAG ports 13-126
Details of a LAG port 13-127
View the ports member of a LAG 13-128
Description of the list of LAG ports 13-129
Network Access Domain (NAD) Management 13-130
View the list of NADs 13-130
Description of the list of NADs 13-131
Create a NAD 13-132
Modify a NAD 13-133
Delete a NAD 13-134

....................................................................................................................................................................................................................................
1350 OMS 13-3
8DG42227DAAA 9.6
Issue 3 December 2012
Network Organization Management Overview

....................................................................................................................................................................................................................................

Managing Jumbo Frames (through NAV) 13-135


Overview about Jumbo Frames 13-135
Workflow to configure Interfaces for Jumbo Traffic 13-137
Particular configuration procedures 13-140
Managing ports on 1678MCC Network Elements 13-140
ISA BCE Ethernet Board 13-146

....................................................................................................................................................................................................................................
13-4 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Network Organization Management Overview about Subnetworks
Managing Subnetworks
....................................................................................................................................................................................................................................

Managing Subnetworks

Overview about Subnetworks


Subnetwork description
To be managed more easily the network is structured into subnetworks.
Each subnetwork is linked up with a subnetwork or the main network. According to its
level, a subnetwork can contain other subnetworks, NEs or ENEs.

Figure 13-1 Subnetwork levels

The subnetwork management, part of the network construction, consists in:


• Performing actions such as creating, modifying, deleting subnetworks.
• Displaying subnetwork information such as subnetwork list or properties.

....................................................................................................................................................................................................................................
1350 OMS 13-5
8DG42227DAAA 9.6
Issue 3 December 2012
Network Organization Management Overview about Subnetworks
Managing Subnetworks
....................................................................................................................................................................................................................................
Several rules must be respected:
• The main network called MEN (Metro Ethernet Network) is created by the 1350
OMS PKT.
• The main network could be composed of subnetworks, NEs, and ENEs.

....................................................................................................................................................................................................................................
13-6 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Network Organization Management View the list of subnetworks
Managing Subnetworks
....................................................................................................................................................................................................................................

View the list of subnetworks


When to use
The Subnetwork List window presents all the subnetworks and their attributes.

Related information
For information about subnetwork, see: “Overview about Subnetworks” (p. 13-5).

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.

Task
From MS-GUI main window:
...................................................................................................................................................................................................

1 Select the network or the subnetwork in the tree area.


...................................................................................................................................................................................................

2 Select Search > Inventory from Subnetwork > Expand subnetwork.


Result: The list of subnetwork is displayed.
The attributes displayed for each subnetwork are:
• User Label.
• Parent Subnetwork.

E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS 13-7
8DG42227DAAA 9.6
Issue 3 December 2012
Network Organization Management Create a Subnetwork
Managing Subnetworks
....................................................................................................................................................................................................................................

Create a Subnetwork
When to use
This function adds a subnetwork to the main network. A subnetwork can be created also
inside another one.

Related information
For information about subnetwork, see: “Overview about Subnetworks” (p. 13-5).

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Condition
To get a positive result:
• The parent subnetwork must be created previously.
• The maximum number of subnetwork levels must not be reached.
• The maximum number of subnetworks must not be reached.
• The User Label must be different as one which is already used by another subnetwork
or one which is reserved for the main network.

Task
From MS-GUI main window:
...................................................................................................................................................................................................

1 Select the network or the subnetwork in the tree.


...................................................................................................................................................................................................

2 Select Action > from (Sub) network > Create.

....................................................................................................................................................................................................................................
13-8 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Network Organization Management Create a Subnetwork
Managing Subnetworks
....................................................................................................................................................................................................................................
Result:

Figure 13-2 Subnetwork Creation window

...................................................................................................................................................................................................

3 Enter the following attributes:


• Enter the User Label.
• Choose the Parent Subnetwork by using the sensitive help. If a subnetwork has been
previously selected from the list, or from graphical view or from the tree, this field is
automatically filled.
• Enter a Comment (optional).
...................................................................................................................................................................................................

4 Click Ok.
Result: The subnetwork is created.
The tree area, the subnetwork list and the opened graphical views are updated.
The user can define NEs, ENEs, or create a subnetwork in this subnetwork.
Note: In graphical views, subnetwork list or in the tree, this command creates the
subnetwork inside the previously selected subnetwork.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS 13-9
8DG42227DAAA 9.6
Issue 3 December 2012
Network Organization Management Modify a Subnetwork
Managing Subnetworks
....................................................................................................................................................................................................................................

Modify a Subnetwork
When to use
The function modifies subnetwork characteristics.

Related information
The subnetwork modification gives the possibility to modify:
• Subnetwork User Label.
• Comment.
For information about subnetwork, see: “Overview about Subnetworks” (p. 13-5).

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Conditions
To get a positive result:
• If the User Label is modified, the new User Label must not be used by another
subnetwork or reserved by the main network.
Restrictions
The MEN subnetwork cannot be modified.

Task
From MS-GUI main window:
...................................................................................................................................................................................................

1 Select the network or the subnetwork in the tree.


...................................................................................................................................................................................................

2 Select Action > from (Sub) network > Modify or right-click the mouse and Select
Modify.

....................................................................................................................................................................................................................................
13-10 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Network Organization Management Modify a Subnetwork
Managing Subnetworks
....................................................................................................................................................................................................................................
Result:

Figure 13-3 Subnetwork Modification window

...................................................................................................................................................................................................

3 Enter the following attributes:


• Enter a New User Label (optional).
• Modify the Comment (optional).

....................................................................................................................................................................................................................................
1350 OMS 13-11
8DG42227DAAA 9.6
Issue 3 December 2012
Network Organization Management Modify a Subnetwork
Managing Subnetworks
....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

4 Click Ok.
Result: The subnetwork is modified.
The tree area, the subnetwork list and the opened graphical views are updated.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
13-12 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Network Organization Management Delete a Subnetwork
Managing Subnetworks
....................................................................................................................................................................................................................................

Delete a Subnetwork
When to use
This function deletes a subnetwork from the 1350 OMS PKT supervision.

Related information
For information about subnetwork, see: “Overview about Subnetworks” (p. 13-5).

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Conditions
To get a positive result:
• The subnetwork must be empty. It must not contain: subnetwork, NE, ENE.
Restrictions
The MEN subnetwork cannot be deleted.

Task
From MS-GUI main window:
...................................................................................................................................................................................................

1 Select the network or the subnetwork in the tree.


Note: You can select one or more items at once.
...................................................................................................................................................................................................

2 Select Action > from (Sub) network > Delete or right-click the mouse and Select
Delete.
...................................................................................................................................................................................................

3 Select one of the options in the confirmation box. Refer to the procedure “Confirm the
action” (p. 11-40).
Result: If one or more subnetworks are removed, the subnetwork list, the tree area,
and the opened graphical views are updated.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS 13-13
8DG42227DAAA 9.6
Issue 3 December 2012
Network Organization Management View the details of the subnetworks
Managing Subnetworks
....................................................................................................................................................................................................................................

View the details of the subnetworks


When to use
This function gets information about a subnetwork.

Related information
For information about subnetwork, see: “Overview about Subnetworks” (p. 13-5).

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.

Task
From MS-GUI main window:
...................................................................................................................................................................................................

1 Select the network or the subnetwork in the tree.


...................................................................................................................................................................................................

2 Select Search > (Sub) network > Properties or right-click the mouse and Select
Properties.
Result: The Property window is displayed
The following attributes are shown:
• User Label.
• Parent Subnetwork.
• Comment.

E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
13-14 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Network Organization Management Overview about Domains
Managing Domains
....................................................................................................................................................................................................................................

Managing Domains

Overview about Domains


Domain management description
The domain management, part of the network construction, consists in:
• performing actions such as creating, modifying, deleting domains.
• displaying domain information such as domain list or properties.
The following domains are created by default and cannot be deleted nor modified:
• ETS.
• T-MPLS.
• Indirect (eOMS).
Note: The domains created by default cannot be deleted nor modified.
The domain management chain gives the order in which the available actions can be
performed.

....................................................................................................................................................................................................................................
1350 OMS 13-15
8DG42227DAAA 9.6
Issue 3 December 2012
Network Organization Management Overview about Domains
Managing Domains
....................................................................................................................................................................................................................................

Figure 13-4 Domain management chain

....................................................................................................................................................................................................................................
13-16 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Network Organization Management View the list of Domains
Managing Domains
....................................................................................................................................................................................................................................

View the list of Domains


When to use
The function shows all the domains and their attributes.

Related information
For a detailed description, refer to the topic “Overview about Domains” (p. 13-15).

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.

Task
From MS-GUI main window:
...................................................................................................................................................................................................

1 Select Search > Packet > Construction.


Result: The Construction menu is displayed.
...................................................................................................................................................................................................

2 Select Domains.
Result: The list window is shown.
See the following topic in this document: “Description of the list of Domains”
(p. 13-18)
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS 13-17
8DG42227DAAA 9.6
Issue 3 December 2012
Network Organization Management Description of the list of Domains
Managing Domains
....................................................................................................................................................................................................................................

Description of the list of Domains


Domain management description
The domain management, part of the network construction, consists in:
• performing actions such as creating, modifying, deleting domains.
• displaying domain information such as domain list or properties.
The following domains are created by default and cannot be deleted nor modified:
• ETS.
• T-MPLS.
• Indirect (eOMS).
Note: The domains created by default cannot be deleted nor modified.
The domain management chain gives the order in which the available actions can be
performed.

Figure 13-5 Domain management chain

....................................................................................................................................................................................................................................
13-18 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Network Organization Management Description of the list of Domains
Managing Domains
....................................................................................................................................................................................................................................
Attributes of a Domain
Each domain has the following attributes:
• User Label.
• Domain Type (ETS, Bridge, T-MPLS, Indirect).
• Bridge Type (No Bridge, MAC-802.1D, Virtual-802.1Q, Provider-802.1AD).
• STP Type (None, STP, RSTP, PVSTP, MSTP, Disabled).
• Comment.

....................................................................................................................................................................................................................................
1350 OMS 13-19
8DG42227DAAA 9.6
Issue 3 December 2012
Network Organization Management Create a Domain
Managing Domains
....................................................................................................................................................................................................................................

Create a Domain
When to use
This function adds a domain to the network.

Related information
For a detailed description, refer to the topic “Overview about Domains” (p. 13-15).

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Condition
To get a positive result:
• The maximum number of domains must not be reached.
• The User Label must be not in use used by another domain.

Task
From MS-GUI main window:
...................................................................................................................................................................................................

1 Select Action > Packet > Construction > Create Domain.


Result: The Domain Creation window is displayed.
...................................................................................................................................................................................................

2 To create a domain:
• Enter a User Label.
• Enter a Comment (Optional).
• Choose the Domain Type (ETS, Bridge, T-MPLS).
• Choose the Bridge Type (No Bridge, MAC-802.1D, Virtual-802.1Q,
Provider-802.1AD).
• Choose the STP Type (None, STP, RSTP, PVSTP, MSTP, Disabled).
...................................................................................................................................................................................................

3 Click one of the following options:


• Ok to execute the request and close the window.
• Apply to execute the request and keep the window open.
• Cancel to quit the request.

....................................................................................................................................................................................................................................
13-20 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Network Organization Management Create a Domain
Managing Domains
....................................................................................................................................................................................................................................
Result: After the domain creation, the domain list is updated.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS 13-21
8DG42227DAAA 9.6
Issue 3 December 2012
Network Organization Management Modify a Domain
Managing Domains
....................................................................................................................................................................................................................................

Modify a Domain
When to use
The function modifies domain characteristics.

Related information
The domain modification gives the possibility to modify:
• User Label.
• Comment.
For a detailed description, refer to the topic “Overview about Domains” (p. 13-15).

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Conditions
To get a positive result:
• The domain must not be created by default.
• The new User Label must be not in use used by another domain.

Task
From MS-GUI main window:
...................................................................................................................................................................................................

1 Select Search > Packet > Construction > Domains.


Result: The list window is shown.
...................................................................................................................................................................................................

2 Select one item in the list.


User can select more items in the list at once.
...................................................................................................................................................................................................

3 Select Action > Domain > Modify or right-click the mouse and select Modify.
Result: The Domain modification window is displayed.
Modify one or more of the following attribute:
• User Label (optional).
• Comment (optional).

....................................................................................................................................................................................................................................
13-22 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Network Organization Management Modify a Domain
Managing Domains
....................................................................................................................................................................................................................................
If user selected more items in the list, the action opens a window for each selected
item.
...................................................................................................................................................................................................

4 Click Ok.
Result: The domain is modified.
The domain list is updated.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS 13-23
8DG42227DAAA 9.6
Issue 3 December 2012
Network Organization Management Delete a Domain
Managing Domains
....................................................................................................................................................................................................................................

Delete a Domain
When to use
This function deletes a domain from the 1350 OMS PKT supervision.

Related information
For a description about Domains, refer to the topic “Overview about Domains”
(p. 13-15).

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Conditions
To get a positive result:
• The domain must not be created by default.
• The domain must be empty. It must not contain: NE, ENE.

Task
From MS-GUI main window:
...................................................................................................................................................................................................

1 Select Search > Packet > Construction > Domains.


Result: The list window is shown.
...................................................................................................................................................................................................

2 Select one or more items in the list.


...................................................................................................................................................................................................

3 Select Action > Domain > Delete or right-click the mouse and select Actions > Delete.
...................................................................................................................................................................................................

4 Select one of the options in the confirmation box. Refer to the procedure “Confirm the
action” (p. 11-40).
Result: If the command is confirmed, one or more domains are removed.
The domain list is updated.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
13-24 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Network Organization Management View the details of the domain
Managing Domains
....................................................................................................................................................................................................................................

View the details of the domain


When to use
This function gets information about a domain.

Related information
For a description about Domains, refer to the topic “Overview about Domains”
(p. 13-15).

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.

Task
From MS-GUI main window:
...................................................................................................................................................................................................

1 Select Search > Packet > Construction > Domains.


Result: The list window is shown.
...................................................................................................................................................................................................

2 Select one or more items in the list.


...................................................................................................................................................................................................

3 Select Action > Properties or right-click the mouse and select Properties.
Result: The Domain window is displayed.
See the following topic in this document: “Details of a Domain” (p. 13-26)
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS 13-25
8DG42227DAAA 9.6
Issue 3 December 2012
Network Organization Management Details of a Domain
Managing Domains
....................................................................................................................................................................................................................................

Details of a Domain
Attributes of a Domain
The following attributes are shown:
• User Label.
• Domain Type.
• Bridge Type.
• STP Type.
• Comment.
• Id.

....................................................................................................................................................................................................................................
13-26 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Network Organization Management Assign resources to a Domain
Managing Domains
....................................................................................................................................................................................................................................

Assign resources to a Domain


When to use
This function assign resources to a domain.

Related information
The user can start the procedure from:
The user can start the procedure from:
• A selected domain
• A selected resource
For a description about Domains, refer to the topic “Overview about Domains”
(p. 13-15).

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.

Task
From MS-GUI main window:
...................................................................................................................................................................................................

1 Select Search > Packet > Construction > Domains.


Result: The list window is shown.
...................................................................................................................................................................................................

2 Select one or more items in the list.


...................................................................................................................................................................................................

3 Select Action > Domain > Assign Resources to Domain or right-click the mouse and
select Actions > Assign Resources to Domain.
Result: The Assign Resources to Domain window is displayed.
The Assign Resources to Domain window shows:
• the list of the Target domains.
• the list of the Resources.
• The icons to add objects in the list.
• The icons to remove objects from the list.
...................................................................................................................................................................................................

4 Add and remove items from the lists.


....................................................................................................................................................................................................................................
1350 OMS 13-27
8DG42227DAAA 9.6
Issue 3 December 2012
Network Organization Management Assign resources to a Domain
Managing Domains
....................................................................................................................................................................................................................................
Result: The window Assign Resources to Domain shows all the objects to assign.
...................................................................................................................................................................................................

5 Click one of the following options:


• Ok to execute the request and close the window.
• Apply to execute the request and keep the window open.
• Cancel to quit the request.
Result: The Resources are assigned to the Domains.
E...................................................................................................................................................................................................
N D O F S T E P S

Task from resource


From MS-GUI main window:
...................................................................................................................................................................................................

1 List a resources. Refer to list procedure of the specific resource.


Result: The list window is shown.
...................................................................................................................................................................................................

2 Select one or more items in the list.


...................................................................................................................................................................................................

3 Right-click the mouse and select Actions > Assign Resources to Domain.
Result: The Assign Resources to Domain window is displayed.
The Assign Resources to Domain window shows:
• the list of the Target domains.
• the list of the Resources.
• The icons to add objects in the list.
• The icons to remove objects from the list.
...................................................................................................................................................................................................

4 Add a domain from the lists.


Result: The window Assign Resources to Domain shows all the objects to assign.
...................................................................................................................................................................................................

5 Click one of the following options:


• Ok to execute the request and close the window.
• Apply to execute the request and keep the window open.
• Cancel to quit the request.
Result: The Resources are assigned to the Domains.

E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
13-28 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Network Organization Management Assign a NE to a Domain
Managing Domains
....................................................................................................................................................................................................................................

Assign a NE to a Domain
When to use
The function assigns a NE to a Domain.

Related information
For a description about Network Elements refer to the topic “Overview about Network
Elements” (p. 13-40).
For a description about Domains, refer to the topic “Overview about Domains”
(p. 13-15).

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.

Task
From MS-GUI main window:
...................................................................................................................................................................................................

1 Select Search > Packet > Construction > Network Elements > Defined NEs.
Result: The Network Element list is shown.
...................................................................................................................................................................................................

2 Select an item in the list.


...................................................................................................................................................................................................

3 Select Action > Network Element > Assign NE to Domain.


E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS 13-29
8DG42227DAAA 9.6
Issue 3 December 2012
Network Organization Management Deassign a NE from a Domain
Managing Domains
....................................................................................................................................................................................................................................

Deassign a NE from a Domain


When to use
The function deassigns a NE from a Domain.

Related information
For a description about Network Elements refer to the topic “Overview about Network
Elements” (p. 13-40).
For a description about Domains, refer to the topic “Overview about Domains”
(p. 13-15).

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.

Task
From MS-GUI main window:
...................................................................................................................................................................................................

1 Select Search > Packet > Construction > Network Elements > Defined NEs.
Result: The Network Element list is shown.
...................................................................................................................................................................................................

2 Select an item in the list.


...................................................................................................................................................................................................

3 Select Action > Network Element > Deassign NE from Domain.


E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
13-30 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Network Organization Management View the inventory of NE in a Domain
Managing Domains
....................................................................................................................................................................................................................................

View the inventory of NE in a Domain


When to use
The inventory presents all the NE belonging to a Domain.

Related information
For a detailed description, refer to the topic “Overview about Domains” (p. 13-15).

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.

Task
From MS-GUI main window:
...................................................................................................................................................................................................

1 Select Search > Packet > Construction > Domains.


Result: The Domain list window is shown.
...................................................................................................................................................................................................

2 Select an item in the list.


...................................................................................................................................................................................................

3 Select Search > Domain > Network Elements.


Result: The Network Element List is shown.
See the following topic in this document: “Overview about Network Elements”
(p. 13-40)
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS 13-31
8DG42227DAAA 9.6
Issue 3 December 2012
Network Organization Management View the inventory of Transport Links in a Domain
Managing Domains
....................................................................................................................................................................................................................................

View the inventory of Transport Links in a Domain


When to use
The inventory presents all the Transport Links belonging to a Domain.

Related information
For a detailed description, refer to the topic “Overview about Domains” (p. 13-15).

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.

Task
From MS-GUI main window:
...................................................................................................................................................................................................

1 Select Search > Packet > Construction > Domains.


Result: The Domain list window is shown.
...................................................................................................................................................................................................

2 Select an item in the list.


...................................................................................................................................................................................................

3 Select Search > Domain > Construction Transport Link.


Result: The Network Element List is shown.
The attributes displayed for each Transport Link are:
• User Label.
• Subnetwork.
• Technology (TDM, Cable WDM).

E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
13-32 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Network Organization Management View the inventory of VT Queue Profiles in a Domain
Managing Domains
....................................................................................................................................................................................................................................

View the inventory of VT Queue Profiles in a Domain


When to use
The inventory presents all the VT Queue Profiles belonging to a Domain.

Related information
For a detailed description, refer to the topic “Overview about Domains” (p. 13-15).

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.

Task
From MS-GUI main window:
...................................................................................................................................................................................................

1 Select Search > Packet > Construction > Domains.


Result: The Domain list window is shown.
...................................................................................................................................................................................................

2 Select an item in the list.


...................................................................................................................................................................................................

3 Select Search > Domain > VT Queue Profiles.


Result: The VT Queue Profile List is shown.
The attributes displayed for each VT Queue Profile are:
• User Label.

E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS 13-33
8DG42227DAAA 9.6
Issue 3 December 2012
Network Organization Management Create Topological View in a Domain
Managing Domains
....................................................................................................................................................................................................................................

Create Topological View in a Domain


When to use
The function creates Topological View in a Domain.

Related information
For a detailed description, refer to the topic “Overview about Domains” (p. 13-15).

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.

Task
From MS-GUI main window:
...................................................................................................................................................................................................

1 Select Search > Packet > Construction > Domains.


Result: The Domain list window is shown.
...................................................................................................................................................................................................

2 Select an item in the list.


...................................................................................................................................................................................................

3 Select Action > Domain > Create Topological View.


...................................................................................................................................................................................................

4 Select one of the following options:


• Internal NEs and Construction Transport Links
• Internal NEs and ETS Transport Links
• Internal NEs and Bridge Transport Links
• Internal NEs and T-MPLS Transport Links
• Connected Domains and Construction Transport Links
Result: The selected objects are shown in the Topological View.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
13-34 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Network Organization Management Assign an Ethernet Physical Port to a Domain
Managing Domains
....................................................................................................................................................................................................................................

Assign an Ethernet Physical Port to a Domain


When to use
The function assigns an Ethernet Physical Port to a Domain.

Related information
For a description about Domains, refer to the topic “Overview about Domains”
(p. 13-15).

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.

Task
From MS-GUI main window:
...................................................................................................................................................................................................

1 Select Search > Packet > Construction > Network Elements > Defined NEs.
Result: The Network Element list is shown.
...................................................................................................................................................................................................

2 Select an item in the list.


...................................................................................................................................................................................................

3 Select Search > Network Element > Ethernet Physical Ports.


...................................................................................................................................................................................................

4 Select an item in the list.


...................................................................................................................................................................................................

5 Select Action > Ethernet Physical Ports > Assign to Domain.


E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS 13-35
8DG42227DAAA 9.6
Issue 3 December 2012
Network Organization Management Deassign an Ethernet Physical Port from a Domain
Managing Domains
....................................................................................................................................................................................................................................

Deassign an Ethernet Physical Port from a Domain


When to use
The function de-assigns an Ethernet Physical Port from a Domain.

Related information
For a description about Domains, refer to the topic “Overview about Domains”
(p. 13-15).

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.

Task
From MS-GUI main window:
...................................................................................................................................................................................................

1 Select Search > Packet > Construction > Network Elements > Defined NEs.
Result: The Network Element list is shown.
...................................................................................................................................................................................................

2 Select an item in the list.


...................................................................................................................................................................................................

3 Select Search > Network Element > Ethernet Physical Ports.


...................................................................................................................................................................................................

4 Select an item in the list.


...................................................................................................................................................................................................

5 Select Action > Ethernet Physical Ports > Deassign from Domain.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
13-36 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Network Organization Management Overview about service nodes
Managing service nodes
....................................................................................................................................................................................................................................

Managing service nodes

Overview about service nodes


Service node management description
Service node is a geographic gathering of 1350 OMS PKT defined NEs depending on the
characteristics of the OMSN that carries each NE.
The service node manages a list of defined NEs having the same OMSN User Label and
the same Location Name.
An OMSN User Label, a Location Name, and a list of defined NEs define the Service
node.
The 1350 OMS PKT user does not manage directly the service nodes:
• Each service node is implicitly created at the NE definition (if it does not exist in the
1350 OMS PKT).
• The service node is implicitly deleted at the deletion of the last NE. The service node
is also deleted when OMSN User Label or Location Name is changed and old service
node has no more NE associated to it. at the NE configuration change notification
reception.
Therefore, if a service node exists is associated at least to one NE.

....................................................................................................................................................................................................................................
1350 OMS 13-37
8DG42227DAAA 9.6
Issue 3 December 2012
Network Organization Management View the inventory of NE in a Service Node
Managing service nodes
....................................................................................................................................................................................................................................

View the inventory of NE in a Service Node


When to use
The inventory presents all the NE belonging to a Service Node.

Related information
For a description about Service nodes, refer to the topic “Overview about service nodes”
(p. 13-37).

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.

Task
From MS-GUI main window:
...................................................................................................................................................................................................

1 Select Search > Packet > Construction > Nodes.


Result: The Nodes list window is shown.
...................................................................................................................................................................................................

2 Select an item in the list.


...................................................................................................................................................................................................

3 Select Search > Nodes > Network Elements.


Result: The Network Element List is shown.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
13-38 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Network Organization Management View the list of service nodes
Managing service nodes
....................................................................................................................................................................................................................................

View the list of service nodes


When to use
The function shows all the service nodes and their locations.

Related information
For a description about Service nodes, refer to the topic “Overview about service nodes”
(p. 13-37).

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.

Task
From MS-GUI main window:
...................................................................................................................................................................................................

1 Select Search > Packet > Construction.


Result: The Construction menu is shown.
...................................................................................................................................................................................................

2 Select the item Nodes.


Result: The list window is shown.
The attributes displayed for each node are:
• OMSN User Label.
• Location Name.

E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS 13-39
8DG42227DAAA 9.6
Issue 3 December 2012
Network Organization Management Overview about Network Elements
Managing Network Elements
....................................................................................................................................................................................................................................

Managing Network Elements

Overview about Network Elements


NE management description
The NE management, part of the network construction, consists in performing actions
such as:
• defining, modifying, deleting NEs.
• uploading the TDM terminations.
• uploading the Ethernet physical ports.
• uploading the Links Over TDM.
• audit or synchronize TDM terminations (for NEs not managed by 1350 OMS SDH).
• configuring or modifying Ethernet physical ports.
• acknowledge the NE LAC state.
The NE management consists in displaying NE information such as:
• Defined NE list.
• Available NE list.
• Properties.
• Ethernet physical port list.
• TDM termination list.
• Equipment view (if the 1350 OMS EML application or 1350 OMS EML presentation
instance are co-hosted with the 1350 OMS PKT).
• Alarms (if any).
The NE management chain gives the order in which the available actions can be
performed.

....................................................................................................................................................................................................................................
13-40 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Network Organization Management Overview about Network Elements
Managing Network Elements
....................................................................................................................................................................................................................................

....................................................................................................................................................................................................................................
1350 OMS 13-41
8DG42227DAAA 9.6
Issue 3 December 2012
Network Organization Management View the list of Network Elements
Managing Network Elements
....................................................................................................................................................................................................................................

View the list of Network Elements


When to use
The function shows all the NEs managed by the 1350 OMS PKT, and their attributes.

Related information
To manage a NE, the NE must be defined.
For a description about Network Elements refer to the topic “Overview about Network
Elements” (p. 13-40).

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.

Task
From MS-GUI main window:
...................................................................................................................................................................................................

1 Select Search > Packet > Construction.


Result: The Construction menu is shown.
...................................................................................................................................................................................................

2 Select Network Elements > Defined NEs.


Result: The Network Element List is shown.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
13-42 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Network Organization Management Define a NE
Managing Network Elements
....................................................................................................................................................................................................................................

Define a NE
When to use
This function assigns a NE to the 1350 OMS PKT management.

Related information
This function is also called “NE discovery”.NE characteristics (matrix, capacity, …) are
taken from the Ethernet management part of the 1350 OMS EML and/or the 1350 OMS
SDH.
For a description about Network Elements refer to the topic “Overview about Network
Elements” (p. 13-40).

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Conditions
To be assigned, the NE must be declared and supervised by the 1350 OMS EML.

Task
From MS-GUI main window:
...................................................................................................................................................................................................

1 Select Search > Packet > Construction > Network Elements > Available NEs.
Result: The list presents all the available NEs (that is not yet assigned to the 1350
OMS PKT) and their attributes.
The attributes displayed for each NE are:
• Operator Label.
• Location Name.
• Type.
• Version.
• IP Address (Not applicable for E/FE/GE boards).
• Operational State (Enable, Disable).
• LAC State (Granted, Denied, Post-granted).
...................................................................................................................................................................................................

2 The user has to add the NEs to be managed.


Select one or more items in the list.

....................................................................................................................................................................................................................................
1350 OMS 13-43
8DG42227DAAA 9.6
Issue 3 December 2012
Network Organization Management Define a NE
Managing Network Elements
....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

3 Select Action > from Available NE > Define Network Element or right-click the mouse
and select Define Network Element.
Result: The Define window is displayed.

Figure 13-6 Define a Network Element

...................................................................................................................................................................................................

4 To define the Network Element, select a Domain from the list displayed and confirm with
OK button.
....................................................................................................................................................................................................................................
13-44 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Network Organization Management Define a NE
Managing Network Elements
....................................................................................................................................................................................................................................
Result: The Network Element is assigned to the domain.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS 13-45
8DG42227DAAA 9.6
Issue 3 December 2012
Network Organization Management Add a NE to a Subnetwork
Managing Network Elements
....................................................................................................................................................................................................................................

Add a NE to a Subnetwork
When to use
The function adds the NE to a network or a subnetwork.

Related information
For a description about Network Elements refer to the topic “Overview about Network
Elements” (p. 13-40).
If the NE supports the bridging, and the user has specified a domain user label, the NE is
attached to the specified domain.
If the NE is managed by the 1350 OMS SDH, all resources of the NE are uploaded from
the 1350 OMS SDH: TDM terminations, Ethernet ports, and Links Over TDM.
If the NE is ISA PR EA, ES1, ES4, or ES16, and the NE is not managed by the 1350
OMS SDH, the TDM terminations are uploaded directly from the NE.
The NE is defined with the following states:
• Working status: Normal..
• NE Consistency state: Consistent.
• All other states (Operational state, LAC state, Inhibited Alarm state) are updated.
If the NE is a PR EA NE or ES1, ES4, ES16 NE, an assignment request is sent to the
1350 OMS EML.
If the NE does not support the bridging, the NE bridge type is set to Not Meaningful.
Otherwise it takes the bridge type value of the selected domain.
If the NE is removed from the Available Networks Element List, the 1350 OMS PKT
synchronizes the list of current alarms.
If the 1350 OMS SDH manages the NE, the TDM terminations and Links Over TDM are
uploaded from the 1350 OMS SDH. If not, the TDM terminations are uploaded from the
NE.

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Condition
To get a positive result:
• The NE must be defined.
• The parent subnetwork and the domain must exist.
• The maximum number of NEs must not be reached.
....................................................................................................................................................................................................................................
13-46 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Network Organization Management Add a NE to a Subnetwork
Managing Network Elements
....................................................................................................................................................................................................................................
• The maximum number of NEs in the parent subnetwork must not be reached.
• The NE User Label must be different as a NE already used.
• The Operational state of the selected NE must be Enabled. In case of ISA PR EA,
ES1, ES4, ES16, the NE must not be isolated from the 1350 OMS EML. In case of
E/FE/GE, the NE must not be isolated from the 1350 OMS SDH.
• The LAC state of the selected NE must not be Granted.

Task
From MS-GUI main window:
...................................................................................................................................................................................................

1 Select Search > Packet > Construction > Network Elements > Defined NEs.
Result: The list window is shown.
...................................................................................................................................................................................................

2 Select one or more items in the list.


...................................................................................................................................................................................................

3 Right-click the mouse and Select Action > from NE > Add .
Result:

Figure 13-7 NE Adding window

To add one NE:


• Enter a User Label (equal to 1350 OMS EML Operator Label by default).
• Choose a Parent Subnetwork where you want to define the NE by using the
sensitive help.
• If the NE supports bridging configuration, choose a Domain by using the sensitive
help (optional).
• Enter a Comment (optional).
....................................................................................................................................................................................................................................
1350 OMS 13-47
8DG42227DAAA 9.6
Issue 3 December 2012
Network Organization Management Add a NE to a Subnetwork
Managing Network Elements
....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

4 Click Ok.
Result: The NE is attached to the Service Node corresponding to the same OMSN
User Label and the same Location Name as the added NE. If the Service Node does
not exists, the application automatically creates a Service Node.
The tree area, the graphical views, and the Network Element List are updated.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
13-48 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Network Organization Management Modify a NE
Managing Network Elements
....................................................................................................................................................................................................................................

Modify a NE
When to use
The function modifies NE characteristics.

Related information
The Network Element modification gives the possibility to modify:
• Network Element User Label.
• Comment.
For a description about Network Elements refer to the topic “Overview about Network
Elements” (p. 13-40).

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Condition
To get a positive result:
• The new User Label must be different as one which is already used by another
Network Element.
• The NE must not be locked (that is audit, alignment, reserve are not in progress).

Task
From MS-GUI main window:
...................................................................................................................................................................................................

1 Select Search > Packet > Construction > Network Elements > Defined NEs.
Result: The list window is shown.
...................................................................................................................................................................................................

2 Select an item in the list.


...................................................................................................................................................................................................

3 Select Action > Modify.

....................................................................................................................................................................................................................................
1350 OMS 13-49
8DG42227DAAA 9.6
Issue 3 December 2012
Network Organization Management Modify a NE
Managing Network Elements
....................................................................................................................................................................................................................................
Result: The NE Modification window is displayed.

Figure 13-8 Network Element Modification window

To modify a NE:
• Enter a New User Label (optional).
• Modify the Comment (optional).

....................................................................................................................................................................................................................................
13-50 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Network Organization Management Modify a NE
Managing Network Elements
....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

4 Click Ok.
Result: Then, the Network Element list, the tree area, and the opened graphical views
are updated.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS 13-51
8DG42227DAAA 9.6
Issue 3 December 2012
Network Organization Management View the details of the NEs
Managing Network Elements
....................................................................................................................................................................................................................................

View the details of the NEs


When to use
This function gets information about a Network Element.

Related information
For a description about Network Elements refer to the topic “Overview about Network
Elements” (p. 13-40).

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.

Task
From MS-GUI main window:
...................................................................................................................................................................................................

1 Select Search > Packet > Construction > Network Elements > Defined NEs.
Result: The list window is shown.
...................................................................................................................................................................................................

2 Select an item in the list.


...................................................................................................................................................................................................

3 Select Properties.from the popup menu.


Result: The property window is displayed.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
13-52 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Network Organization Management View the list of available Network Elements
Managing Network Elements
....................................................................................................................................................................................................................................

View the list of available Network Elements


When to use
This function lists all the NE not assigned to 1350 OMS PKT management.

Related information
For a description about Network Elements refer to the topic “Overview about Network
Elements” (p. 13-40).

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Conditions
To be listed, the NE must be declared and supervised by the 1350 OMS EML.

Task
From MS-GUI main window:
...................................................................................................................................................................................................

1 Select Search > Packet > Construction.


Result: The Construction menu is shown.
...................................................................................................................................................................................................

2 Select Network Elements > Available NEs.


Result: The Available Network Element List is shown.
See the following topic in this document: “Overview about Network Elements”
(p. 13-40)
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS 13-53
8DG42227DAAA 9.6
Issue 3 December 2012
Network Organization Management Upload the Ethernet physical ports
Managing Network Elements
....................................................................................................................................................................................................................................

Upload the Ethernet physical ports


When to use
This function gets the Ethernet physical ports of a NE.

Related information
This function consists in uploading the Ethernet physical ports of a previously selected
NE and it is used:
• Manually, by the user to solve a misalignment between 1350 OMS PKT and the NE.
In this case, the Client Type value is not aligned and must be configured. See
“Configure an Ethernet physical port” (p. 13-99).
• Automatically, at the NE definition.
For a description about Network Elements, refer to the topic “Overview about Network
Elements” (p. 13-40).
For a description about physical ports, refer to the topic “NE management” (p. 11-47).
Retrieved Information
The following attributes are retrieved for each port during the upload:
• Port Identifier.
• Auto Negotiation State (Enabled, Disabled).
• Flow Control (Enabled, Disabled).
• Duplex Mode (Half duplex, Full duplex).
• Interface Type (10/100BaseT, 1000BaseSX, 1000BaseLX, 100BaseFX).
• Interface Rate (10 Mb/s, 100 Mb/s, 1 Gb/s).
• Supported Layer (Ethernet, MPLS).
• Port Type (Optical, Electrical) (derived from the uploaded Interface Type
characteristics).
Note: When the Interface Type is 10/100BaseT, Interface Rate can be 10 Mb/s or
100 Mb/s.
When the Interface Type is 1000BaseSX, Interface Rate must be 10 Gb/s.
Checks performed on Ethernet ports
Then, for each Ethernet port returned the following checks are performed:
• The Ethernet port Client Type is set to ETS by default.
• If Ethernet port does not exist in 1350 OMS PKT, the Ethernet port created with
default characteristics. The Manager control is set to Enabled. The port is available
to be an extremity of one or more Ethernet Segments.
• If Ethernet port exists in 1350 OMS PKT, the user must consider the following cases:
– No change of interface rate and/or supported Layer, its characteristics are updated.
– If interface rate has changed:

....................................................................................................................................................................................................................................
13-54 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Network Organization Management Upload the Ethernet physical ports
Managing Network Elements
....................................................................................................................................................................................................................................

Usage State.
Manager Idle / Reserved. Busy. Not Meaningful.
Control.
enabled. Not applicable. Not applicable. If no Ethernet
Segments uses it, the
Port is updated.
Otherwise,
Consistency State is
set to Not Consistent.
disabled. No Link Over Port not updated because Not applicable.
Cable uses it, then used by a Link Over
the Port is Cable. Its Consistency
updated. State is set to Not
Consistent.

– If supported layer has changed:

Usage State.
Manager Idle / Reserved. Busy. Not Meaningful.
Control.
ETH > Not applicable. Not applicable. If no Ethernet
MPLS. Segments uses it,
enabled. Manager control is set
to disabled.
Otherwise,
Consistency State is
set to Not Consistent.
MPLS > No Link Over Port not updated because Not applicable.
ETH. Cable uses it, then used by a Link Over
Disabled. the Port Manager Cable. Its Consistency
Control is set to State is set to Not
enabled. Consistent.

• If an Ethernet port is not found in the list of retrieved Ports, the Usage State is
checked. In case the Usage State is idle or reserved, the Ethernet port is removed from
the NE in the 1350 OMS PKT.
• If Ethernet port is busy then its Consistency State is set to Not Consistent.
• If the Manager control is disabled, the port usage state is meaningful in the
construction domain. Otherwise, the usage of the port is checked in the Ethernet
traffic management domain.

Before you begin


The system is running.
The system is properly configured.
....................................................................................................................................................................................................................................
1350 OMS 13-55
8DG42227DAAA 9.6
Issue 3 December 2012
Network Organization Management Upload the Ethernet physical ports
Managing Network Elements
....................................................................................................................................................................................................................................
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Conditions
To get a positive result:
• The Operational State of the selected NE must be enable.
• The NE LAC State must not be granted.
• The NE must not be locked (that is audit, alignment, reserve are not in progress).

Task
From MS-GUI main window:
...................................................................................................................................................................................................

1 Select Search > Packet > Construction > Network Elements > Defined NEs.
Result: The list window is shown.
...................................................................................................................................................................................................

2 Select one or more items in the list.


...................................................................................................................................................................................................

3 Select Action > Network Element > Upload Ethernet Physical Ports.
...................................................................................................................................................................................................

4 Select one of the options in the confirmation box. Refer to the procedure “Confirm the
action” (p. 11-40).
Result: After confirmation, the NE working state is set to Uploading.
The 1350 OMS PKT sends a request to the NE to retrieve the list of its Ethernet ports.
The list of Ethernet ports of the NE in 1350 OMS PKT is aligned with the ISA board.
The new ports are created in 1350 OMS PKT. If the supported layer is Ethernet, the
port Manager Control set to Enabled. In the other cases, the port Manager Controlis
set to Disabled.
The NE Working State is set to Normal.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
13-56 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Network Organization Management Upload the TDM terminations
Managing Network Elements
....................................................................................................................................................................................................................................

Upload the TDM terminations


When to use
This function gets the TDM terminations of a NE.

Related information
This function consists in uploading the TDM terminations of a previously selected NE.
This function is used:
• manually, by the user to solve a misalignment between 1350 OMS PKT and the 1350
OMS SDH, concerning a given NE.
• automatically, at the NE definition.
For a description about TDM terminations refer to the topic “NE management”
(p. 11-47).
Retrieved information
For each TDM termination, the following attributes are retrieved during the upload:
• TDM termination Identifier.
• Bit rate:
for ETH technology (E/FE/GE NE)
– Eth 1 Gb/s, Eth 100 Mb/s, Eth 100 Mb/s.
– None in the other cases.
• Usage State (Idle, Busy, Reserved).
• Concatenation level (from 0 to 63).
• Transport Rate (VC12, VC3, VC4, VC4-4C).
• Supported Layer (None, ETH or MPLS).
Checks performed on TDM terminations
If the TDM termination has the Usage State set to idle, TDM termination characteristics
are updated.
If a TDM termination has the Usage State set to idle or reserved, the list of retrieved
Terminations is checked. If the list of Terminations is not found, the TDM termination is
removed.
Note: For a TDM termination uploaded in the busy Usage State: if no Link Over
TDM is connected to it inside 1350 OMS PKT, the Usage State is set to Reserved.

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.

....................................................................................................................................................................................................................................
1350 OMS 13-57
8DG42227DAAA 9.6
Issue 3 December 2012
Network Organization Management Upload the TDM terminations
Managing Network Elements
....................................................................................................................................................................................................................................
Conditions
To get a positive result:
• The NE must be managed by the 1350 OMS SDH.
• The 1350 OMS SDH must not be isolated from 1350 OMS PKT point of view.
• The Working State of the selected NE must be normal.

Task
From MS-GUI main window:
...................................................................................................................................................................................................

1 Select Search > Packet > Construction > Network Elements > Defined NEs.
Result: The list window is shown.
...................................................................................................................................................................................................

2 Select one or more items in the list.


...................................................................................................................................................................................................

3 Select Action > Network Element > Upload TDM Terminations.


...................................................................................................................................................................................................

4 Select one of the options in the confirmation box. Refer to the procedure “Confirm the
action” (p. 11-40).
Result: After confirmation, the NE working state is set to Uploading. The 1350 OMS
PKT sends a request to the 1350 OMS SDH to retrieve the list of TDM terminations
of the specified NE.
The list of TDM terminations of the NE in 1350 OMS PKT is aligned with the 1350
OMS SDH.
Then, the NE Working State is set to Normal.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
13-58 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Network Organization Management Upload the Links Over TDM
Managing Network Elements
....................................................................................................................................................................................................................................

Upload the Links Over TDM


When to use
This function gets the Links Over TDM of a NE.

Related information
This function consists in uploading the Links Over TDM (SDH paths from the 1350 OMS
SDH) terminated on a given NE.
This function is used:
• Manually, by the user to solve a misalignment between 1350 OMS PKT and the 1350
OMS SDH.
• Automatically, at the NE definition.
For a description about Transport Links refer to the topic “Transport link management”
(p. 11-50) or the topic “Transport link definition” (p. 14-4).
Retrieved information
For each uploaded Link Over TDM, the following attributes are retrieved during the
upload:
• Link Over TDM User Label.
• Provisioning state (Defined, Allocated, Implemented, Commissioned).
• Reliability Level.
• Direction.
• Supported Layer (Ethernet, MPLS).
• Bit rate (vc12, vc3, vc4, vc4-4c, Eth 10 Mb/s, Eth 100 Mb/s, Eth 1 Gb/s).
• Concatenation level (from 0 to 63).
• Transport Concatenation Rate (vc4, vc3, vc12).
• Extremities.
For both:
– NE identifier is retrieved from NE TDM user label and Location name).
– TDM termination Identifier.

....................................................................................................................................................................................................................................
1350 OMS 13-59
8DG42227DAAA 9.6
Issue 3 December 2012
Network Organization Management Upload the Links Over TDM
Managing Network Elements
....................................................................................................................................................................................................................................
Checks performed on Links Over TDM
For each uploaded Link Over TDM the following checks are performed during the
upload:
• If at least one of the specified extremities is in the busy Usage State for another link
or does not exist, the Link Over TDM is rejected, and an error is logged. Also if the
extremity does not exist, the Link Over TDM is rejected, and an error is logged.
• If both extremities exist in 1350 OMS PKT:
– If Usage State is not busy, the Link Over TDM is created in the 1350 OMS PKT,
and the TDM terminations Usage State is set to busy.
– If the SDH path provisioning state is defined, allocated, or implemented, the
Manager Control is set to Disabled and provisioning state to Not
Commissioned.
– If the provisioning state is commissioned, the corresponding transport or
transmission path is created according to the supported layer, the Manager
Control is set to Enabled and the provisioning state is set to Commissioned.
• The Client Type of the uploaded Link Over TDM is set to ETS by default.
• The Protocol Type of the uploaded Link Over TDM protocol is chosen according to
the following rule:
– If the supported layer is MPLS, the Protocol Type is equal to HDLC.
– If the two boards at the extremities of the link are ES1 or ES4, the Protocol Type
is the value set in the 1350 OMS PKT configuration file. The value can be GFP or
LAPS.
– If one of the board is not an ES board, the Protocol Type is GFP.

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Conditions
To get a positive result:
• The NE must be managed by the 1350 OMS SDH.
• The 1350 OMS SDH must not be isolated from 1350 OMS PKT point of view.
• The Working State of the selected NE must be normal.
• The NE must not be locked (that is audit, alignment, reserve are not in progress).

Task
From MS-GUI main window:
...................................................................................................................................................................................................

1 Select Search > Packet > Construction > Network Elements > Defined NEs.
....................................................................................................................................................................................................................................
13-60 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Network Organization Management Upload the Links Over TDM
Managing Network Elements
....................................................................................................................................................................................................................................
Result: The list window is shown.
...................................................................................................................................................................................................

2 Select one or more items in the list.


...................................................................................................................................................................................................

3 Select Action > Network Element > Upload Links Over TDM.
...................................................................................................................................................................................................

4 Select one of the options in the confirmation box. Refer to the procedure “Confirm the
action” (p. 11-40).
Result: After confirmation, the NE working state is set to Uploading. The 1350 OMS
PKT sends a request to the 1350 OMS SDH to retrieve the list of TDM paths
terminated on the specified NE.
The list of Links Over TDM of the NE in 1350 OMS PKT is aligned with the 1350
OMS SDH.
Then, the NE Working State is set to Normal.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS 13-61
8DG42227DAAA 9.6
Issue 3 December 2012
Network Organization Management Audit the TDM terminations
Managing Network Elements
....................................................................................................................................................................................................................................

Audit the TDM terminations


When to use
This function audits the TDM terminations of a NE.

Related information
This function consists in auditing the TDM terminations of a NE not managed by the
1350 OMS SDH.
The function is used to compare the TDM terminations information contained in the 1350
OMS PKT database with the ones contained in the NE.
For more information about Audit, refer toChapter 23, “Network Utilities”.
For a description about TDM terminations, refer to the topic “NE management”
(p. 11-47).
Retrieved information
For each termination found in the 1350 OMS PKT and/or in the NE, the data displayed
are:
• The NE User Label.
• The Audit Date and Time of the audit operation.
• The 1350 OMS PKT TDM termination User Label.
• The PKT Supported Layer.
• The NE Supported Layer.
• The PKT Concatenation Rate.
• The NE Concatenation Rate.
• The PKT Concatenation Level.
• The NE Concatenation Level.
Checks performed on Links Over TDM
The audit allows detecting de-synchronization between the NE and the 1350 OMS PKT
data. The user can launch the Synchronize TDM termination command, to update the
1350 OMS PKT database with the NE data.

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.

....................................................................................................................................................................................................................................
13-62 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Network Organization Management Audit the TDM terminations
Managing Network Elements
....................................................................................................................................................................................................................................
Conditions
To get a positive result:
• The NE must be managed by the 1350 OMS SDH.
• The 1350 OMS SDH must not be isolated from 1350 OMS PKT point of view.
• The Working State of the selected NE must be normal.
• The NEmust not be locked (that is audit, alignment, reserve are not in progress).
• The NE LAC State must not be granted.

Task
From MS-GUI main window:
...................................................................................................................................................................................................

1 Select Search > Packet > Construction > Network Elements > Defined NEs.
Result: The list window is shown.
...................................................................................................................................................................................................

2 Select one or more items in the list.


...................................................................................................................................................................................................

3 Select Action > Network Element > Audit TDM Terminations.


...................................................................................................................................................................................................

4 Select one of the options in the confirmation box. Refer to the procedure “Confirm the
action” (p. 11-40).
Result: After confirmation, the NE working state is set to Uploading.
The 1350 OMS PKT sends a request to the NE to retrieve the list of TDM
terminations of the specified NE.
The information read from the NE and the information read from the 1350 OMS PKT
database, are displayed to the user.
At the end of the audit, the NE working state is set to Normal and the Audit TDM
termination list window is displayed.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS 13-63
8DG42227DAAA 9.6
Issue 3 December 2012
Network Organization Management Synchronize the TDM terminations
Managing Network Elements
....................................................................................................................................................................................................................................

Synchronize the TDM terminations


When to use
This function consists in synchronizing the TDM terminations of a NE not managed by
the 1350 OMS SDH.

Related information
This function is used to check misalignments between NE and 1350 OMS PKT (that is
after an audit TDM termination command).
For a description about Synchronization refer to the topic “1350 OMS PKT
resynchronization” (p. 12-60).

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Conditions
To get a positive result:
• The 1350 OMS SDH must not manage the NE.
• Working State of the selected NE must be normal.
• The NE LAC State must not be granted.

Task
From MS-GUI main window:
...................................................................................................................................................................................................

1 Select Search > Packet > Construction > Network Elements > Defined NEs.
Result: The list window is shown.
...................................................................................................................................................................................................

2 Select one or more items in the list.


...................................................................................................................................................................................................

3 Select Action > Network Element > Synchronize TDM Terminations.


...................................................................................................................................................................................................

4 Select one of the options in the confirmation box. Refer to the procedure “Confirm the
action” (p. 11-40).

....................................................................................................................................................................................................................................
13-64 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Network Organization Management Synchronize the TDM terminations
Managing Network Elements
....................................................................................................................................................................................................................................
Result: After confirmation, the NE working state is set to Uploading.
The 1350 OMS PKT sends a request to the NE to retrieve the list of TDM
terminations of the specified NE.
For a TDM termination found in the NE and not present in the 1350 OMS PKT, the
TDM termination is created in the 1350 OMS PKT database.
For a TDM termination found in the 1350 OMS PKT and not present in the NE, the
TDM termination is deleted from the 1350 OMS PKT database. If the deletion is not
possible, the TDM termination consistency state becomes Not Consistent. The
deletion is possible when the TDM termination is not used by a Link Over TDM.
At the end of the synchronization, the NE working state is set to Normal.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS 13-65
8DG42227DAAA 9.6
Issue 3 December 2012
Network Organization Management View the list of TDM terminations
Managing Network Elements
....................................................................................................................................................................................................................................

View the list of TDM terminations


When to use
The function lists all the TDM terminations of a selected NE.

Related information
For a description about TDM terminations refer to the topic “NE management”
(p. 11-47)o.

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.

Task
From MS-GUI main window:
...................................................................................................................................................................................................

1 Select Search > Packet > Construction > Network Elements > Defined NEs.
Result: The list window is shown.
...................................................................................................................................................................................................

2 Select one or more items in the list.


...................................................................................................................................................................................................

3 Select Search > Inventory from Network Element > TDM Termination List.
Result: The TDM Termination list is displayed.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
13-66 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Network Organization Management View the details of the TDM terminations
Managing Network Elements
....................................................................................................................................................................................................................................

View the details of the TDM terminations


When to use
This function gets information about a TDM termination of a selected NE.

Related information
For a description about TDM terminations refer to the topic “NE management”
(p. 11-47).

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.

Task
From MS-GUI main window:
...................................................................................................................................................................................................

1 Select Search > Packet > Construction > Network Elements > Defined NEs.
Result: The list window is shown.
...................................................................................................................................................................................................

2 Select one or more items in the list.


...................................................................................................................................................................................................

3 Select Search > Inventory from Network Element > TDM Termination List.
...................................................................................................................................................................................................

4 Select one or more items in the list.


...................................................................................................................................................................................................

5 Right-click the mouse and Select Properties.


Result: The TDM termination property window is displayed.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS 13-67
8DG42227DAAA 9.6
Issue 3 December 2012
Network Organization Management Acknowledge the NE LAC state
Managing Network Elements
....................................................................................................................................................................................................................................

Acknowledge the NE LAC state


When to use
This function allows the user to acknowledge the Local Access Control state.

Related information
When the LAC state of the NE is equal to Post-granted, this function allows the user to
acknowledge the possible misalignment between the 1350 OMS PKT and the NE due to a
possible modification from the 1320CT.
As the 1350 OMS EML could authorize the local access to a NE from the 1320CT, the
data stored in 1350 OMS PKT could be different.
To check and resolve misalignments, the user perform a NE audit and a NE alignment. At
alignment, the data is downloaded from 1350 OMS PKT to the NE or the data is uploaded
from NE to 1350 OMS PKT. Upload from NE is also called Plug & Play.
For more details about Audit and Alignment, refer to the topic Chapter 23, “Network
Utilities”.

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Conditions
To get a positive result:
• The NE LAC state must be Post-granted.

Task
From MS-GUI main window:
...................................................................................................................................................................................................

1 Select Search > Packet > Construction > Network Elements > Defined NEs.
Result: The list window is shown.
...................................................................................................................................................................................................

2 Select one or more items in the list.


...................................................................................................................................................................................................

3 Select Action > Network Element > Acknowledge.

....................................................................................................................................................................................................................................
13-68 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Network Organization Management Acknowledge the NE LAC state
Managing Network Elements
....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

4 Select one of the options in the confirmation box. Refer to the procedure “Confirm the
action” (p. 11-40).
Result: After confirmation, the LAC state of the concerned NEs is set to Denied and
the Network Element List is updated.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS 13-69
8DG42227DAAA 9.6
Issue 3 December 2012
Network Organization Management Show the equipment view
Managing Network Elements
....................................................................................................................................................................................................................................

Show the equipment view


When to use
The function opens the GUI of an equipment.

Related information
The user opens the NE equipment view from:
• The Network Element list.
• The TDM termination list.
• The Ethernet Physical Port list.

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Conditions
To get a positive result:
• The 1350 OMS EML application or a 1350 OMS EML presentation instance must be
installed on the same workstation or server as the 1350 OMS PKT.
• The user login must be declared on both 1350 OMS EML and 1350 OMS PKT.
• This command is available only for the ES1, ES4, ES16 or PR EA Network Elements.

Task (from NE)


From MS-GUI main window:
...................................................................................................................................................................................................

1 Select: Search > Packet > Construction > Network Elements > Defined NEs.
Result: The list window is shown.
...................................................................................................................................................................................................

2 Select one or more items in the list.


...................................................................................................................................................................................................

3 Right-click the mouse and Select Inventory from TDM Termination > External
Navigation to > USM.

....................................................................................................................................................................................................................................
13-70 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Network Organization Management Show the equipment view
Managing Network Elements
....................................................................................................................................................................................................................................
Result: The equipment view of the selected NE is opened and the selected port
highlighted.

Figure 13-9 Show Equipment View

E...................................................................................................................................................................................................
N D O F S T E P S

Task (from TDM Termination)


From MS-GUI main window:
...................................................................................................................................................................................................

1 Select Search > Packet > Construction > Network Elements > Defined NEs.
Result: The list window is shown.
...................................................................................................................................................................................................

2 Select one or more items in the list.

....................................................................................................................................................................................................................................
1350 OMS 13-71
8DG42227DAAA 9.6
Issue 3 December 2012
Network Organization Management Show the equipment view
Managing Network Elements
....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

3 Select Search > Inventory from Network Element > TDM Termination List.
.
...................................................................................................................................................................................................

4 Select one or more items in the list.


...................................................................................................................................................................................................

5 Right-click the mouse and Select Inventory from TDM Termination > External
Navigation to > USM .
Result: The equipment view of the selected NE is opened and the selected port
highlighted.
E...................................................................................................................................................................................................
N D O F S T E P S

Task (from physical Port)


From MS-GUI main window:
...................................................................................................................................................................................................

1 Select: Search > Packet > Construction > Network Elements > Defined NEs.
Result: The list window is shown.
...................................................................................................................................................................................................

2 Select one or more items in the list.


...................................................................................................................................................................................................

3 Select Search > Inventory from Network Element > Ethernet Physical Port List.
...................................................................................................................................................................................................

4 Select one or more items in the list and Right-click the mouse.
...................................................................................................................................................................................................

5 Select Inventory from physical Port > External Navigation to > USM.
Result: The equipment view of the selected NE is opened and the selected port
highlighted.

E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
13-72 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Network Organization Management View the inventory of VT Queue Profiles in a NE
Managing Network Elements
....................................................................................................................................................................................................................................

View the inventory of VT Queue Profiles in a NE


When to use
The inventory presents all the VT Queue Profiles belonging to a NE.

Related information
For a detailed description, refer to the topic “Overview about Domains” (p. 13-15).

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.

Task
From MS-GUI main window:
...................................................................................................................................................................................................

1 Select Search > Packet > Construction > Network Elements > Defined NEs.
Result: The list window is shown.
...................................................................................................................................................................................................

2 Select an item in the list.


...................................................................................................................................................................................................

3 Select Search > Network Element> VT Queue Profiles.


Result: The VT Queue Profile List is shown.
See the following topic in this document: “View the inventory of VT Queue Profiles
in a Domain” (p. 13-33)
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS 13-73
8DG42227DAAA 9.6
Issue 3 December 2012
Network Organization Management Upload the Links Over Cable
Managing Network Elements
....................................................................................................................................................................................................................................

Upload the Links Over Cable


When to use
This function uploads the Links Over Cable.

Related information
For a description about Transport Links refer to the topic “Transport link management”
(p. 11-50) or the topic “Transport link definition” (p. 14-4).

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Conditions
To get a positive result:
• The Working State of the selected NE must be normal.
• The NE must not be locked (that is audit, alignment, reserve are not in progress).

Task
From MS-GUI main window:
...................................................................................................................................................................................................

1 Select Search > Packet > Construction > Network Elements > Defined NEs.
Result: The list window is shown.
...................................................................................................................................................................................................

2 Select one or more items in the list.


...................................................................................................................................................................................................

3 Select Action > Network Element > Upload Links Over Cable.
...................................................................................................................................................................................................

4 Select one of the options in the confirmation box. Refer to the procedure “Confirm the
action” (p. 11-40).
Result: After confirmation, the NE working state is set to Uploading.
Then, the NE Working State is set to Normal.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
13-74 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Network Organization Management Upload the Radio Ports
Managing Network Elements
....................................................................................................................................................................................................................................

Upload the Radio Ports


When to use
This function uploads the Radio Ports.

Related information
No related information.

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.

Task
From MS-GUI main window:
...................................................................................................................................................................................................

1 Select Search > Packet > Construction > Network Elements > Defined NEs.
Result: The list window is shown.
...................................................................................................................................................................................................

2 Select one or more items in the list.


...................................................................................................................................................................................................

3 Select Action > Network Element > Upload Radio Ports.


...................................................................................................................................................................................................

4 Select one of the options in the confirmation box. Refer to the procedure “Confirm the
action” (p. 11-40).
Result: After confirmation, the NE working state is set to Uploading.
Then, the NE Working State is set to Normal.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS 13-75
8DG42227DAAA 9.6
Issue 3 December 2012
Network Organization Management Create VT Queue Profile
Managing Network Elements
....................................................................................................................................................................................................................................

Create VT Queue Profile


When to use
This function creates a VT Queue Profile.

Related information
No related information.

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.

Task
From MS-GUI main window:
...................................................................................................................................................................................................

1 Select Search > Packet > Construction > Network Elements > Defined NEs.
Result: The list window is shown.
...................................................................................................................................................................................................

2 Select one or more items in the list.


...................................................................................................................................................................................................

3 Select Action > Network Element > Create VT Queue Profile.


...................................................................................................................................................................................................

4 Fill the creation form.


Result: After confirmation, the object is created.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
13-76 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Network Organization Management Create Topological View from NE or ENE
Managing Network Elements
....................................................................................................................................................................................................................................

Create Topological View from NE or ENE


When to use
The function creates Topological View from a NE or ENE.

Related information
No related information.

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.

Task
From MS-GUI main window:
...................................................................................................................................................................................................

1 Select Search > Packet > Construction > Network Elements.


...................................................................................................................................................................................................

2 Select Defined NEs or External NEs.


Result: The list window is shown.
...................................................................................................................................................................................................

3 Select an item in the list.


...................................................................................................................................................................................................

4 Select Action > Network Element> Create Topological View or


Action > Network Element> Create Topological View.
...................................................................................................................................................................................................

5 Select one of the following options:


• Link Over WDM
• Link Over Cable
• Link Over TDM
• Link Over MPLS
• Link Over T-MPLS

E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS 13-77
8DG42227DAAA 9.6
Issue 3 December 2012
Network Organization Management Overview about External Network Elements

....................................................................................................................................................................................................................................

Managing External Network Elements

Overview about External Network Elements


ENE management description
For more information about ENE, refer to “ENE management” (p. 11-48).
The ENE management, part of the network construction, consists in performing actions
such as:
• creating, modifying, deleting ENEs.
• creating, deleting ETPs.
The ENE management consists in displaying ENE information such as:
• ENE list.
• ETP list.
• properties.
The ENE management chain gives the order in which the available actions are performed.

....................................................................................................................................................................................................................................
13-78 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Network Organization Management Overview about External Network Elements
Managing External Network Elements
....................................................................................................................................................................................................................................

Figure 13-10 ENE management chain

....................................................................................................................................................................................................................................
1350 OMS 13-79
8DG42227DAAA 9.6
Issue 3 December 2012
Network Organization Management View the list of External Network Elements
Managing External Network Elements
....................................................................................................................................................................................................................................

View the list of External Network Elements


When to use
The function shows all the managed ENEs.

Related information
The ENE Role indicates whether ENE represents a customer edge equipment (outer) or
equipment not managed inside the network (inner).
Refer to the topic “ENE management” (p. 11-48).

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.

Task
From MS-GUI main window:
...................................................................................................................................................................................................

1 Select Search > Packet > Construction.


Result: The construction menu is displayed.
...................................................................................................................................................................................................

2 Select Network Elements > External Network Elements.


Result: The list window is shown.
See the following topic in this document: “Description of the list of ENE” (p. 13-81)
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
13-80 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Network Organization Management Description of the list of ENE
Managing External Network Elements
....................................................................................................................................................................................................................................

Description of the list of ENE


Attributes of an ENE
The attributes displayed for each ENE are:
• User Label.
• Parent Subnetwork.
• ENE Role (Inner Equipment, Customer Edge, P-VLAN Network).

....................................................................................................................................................................................................................................
1350 OMS 13-81
8DG42227DAAA 9.6
Issue 3 December 2012
Network Organization Management Create an ENE
Managing External Network Elements
....................................................................................................................................................................................................................................

Create an ENE
When to use
The function creates an External Network Element.

Related information
The ENE makes visible to the 1350 OMS PKT, a NE or a set of NEs not managed by the
1350 OMS PKT, for example a NE contained in an adjacent subnetwork not accessible to
the 1350 OMS PKT.
Refer to the topic “ENE management” (p. 11-48).
An Inner ENE is a subset of NEs not managed by the 1350 OMS PKT. The connection
between the managed network and the inner ENE is an internal Link Over Cable to a NE.
An Outer ENE is any equipment outside the scope of the network management. An Outer
ENE is located at customer premises. The equipment is connected through an external
Link Over Cable to a NE.
During the creation of an ENE with an Inner Equipment role, the Manager Control of
the five first ETP is set to Enabled. The other five ETPs are created with a Manager
Control set to Disabled. If the Edge Port List (available from the Ethernet Management
GUI) is opened, this list is updated the five first ETPs of the new created ENE.
For an ENE with a Customer Edge ENE role, all ETPs are created with a Manager
Control set to Disabled.

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Conditions
Note: It is authorized to create an ENE in the main parent subnetwork (called MEN
by default).
To get a positive result:
• Before the action, create the parent subnetwork.
• In the selected subnetwork, the amount of NE must not exceed the maximum. See
Table B-1, “Limits for Subnetworks” (p. B-1).
• In the selected subnetwork, the amount of ENE must not exceed the maximum. See
Table B-1, “Limits for Subnetworks” (p. B-1).
• The User Label must be different as one which is already used by another ENE.

....................................................................................................................................................................................................................................
13-82 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Network Organization Management Create an ENE
Managing External Network Elements
....................................................................................................................................................................................................................................
Task
From MS-GUI main window:
...................................................................................................................................................................................................

1 Select Action > Packet > Construction > Create External Network Element.
Result: The ENE Creation window is displayed.

Figure 13-11 External Network Element Creation window

...................................................................................................................................................................................................

2 To create an ENE:
• Enter a ENE User Label.
• Choose the Parent Subnetwork by using the sensitive help.
• Enter a Domain.

....................................................................................................................................................................................................................................
1350 OMS 13-83
8DG42227DAAA 9.6
Issue 3 December 2012
Network Organization Management Create an ENE
Managing External Network Elements
....................................................................................................................................................................................................................................
• Choose the ENE Role: Inner Equipment ( That is Inner ENE), Customer Edge (That
is Outer ENE) or P-VLAN Network.
• Enter a Comment (optional).
...................................................................................................................................................................................................

3 Click Ok.
Result: The ENE is created.
A group of ETPs are automatically created at the ENE creation.
The tree area, the External Network Element list, and the opened graphical views are
updated.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
13-84 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Network Organization Management Modify an ENE
Managing External Network Elements
....................................................................................................................................................................................................................................

Modify an ENE
When to use
The function modifies ENE characteristics.

Related information
The ENE modification gives the possibility to modify:
• User Label.
• Comment.
Refer to the topic “ENE management” (p. 11-48).

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Conditions
To get a positive result:
• If the User Label is modified, the new User Label must be different as one which is
already used by another ENE.

Task
From MS-GUI main window:
...................................................................................................................................................................................................

1 Select Search > Packet > Construction > Network Elements > External Network
Elements.
Result: The list window is shown.
...................................................................................................................................................................................................

2 Select an item in the list.


Result: The modification window is displayed.
...................................................................................................................................................................................................

3 To modify an ENE:
• Enter a New User Label (optional).
• Modify the Comment (optional).
...................................................................................................................................................................................................

4 Click Ok.

....................................................................................................................................................................................................................................
1350 OMS 13-85
8DG42227DAAA 9.6
Issue 3 December 2012
Network Organization Management Modify an ENE
Managing External Network Elements
....................................................................................................................................................................................................................................
Result: Then, the External Network Element list, the tree area, and the opened
graphical views are updated.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
13-86 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Network Organization Management Delete an ENE
Managing External Network Elements
....................................................................................................................................................................................................................................

Delete an ENE
When to use
This function deletes an ENE and its ETPs from supervision.

Related information
Refer to the topic “ENE management” (p. 11-48).

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Conditions
To get a positive result:
• The usage state of the ETPs belonging to the ENE must be idle.

Task
From MS-GUI main window:
...................................................................................................................................................................................................

1 Select Search > Packet > Construction > Network Elements > External Network
Elements.
Result: The list window is shown.
...................................................................................................................................................................................................

2 Select one or more items in the list.


...................................................................................................................................................................................................

3 Select Action > from External Network Element > Delete or right-click the mouse and
Select Delete.
...................................................................................................................................................................................................

4 Select one of the options in the confirmation box. Refer to the procedure “Confirm the
action” (p. 11-40).
Result: After confirmation, the ENEs and their ETPs are removed.
The External Network Element list, the tree area, and the opened graphical views are
updated.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS 13-87
8DG42227DAAA 9.6
Issue 3 December 2012
Network Organization Management View the details of the ENEs
Managing External Network Elements
....................................................................................................................................................................................................................................

View the details of the ENEs


When to use
This function gets information about an ENE.

Related information
Refer to the topic “ENE management” (p. 11-48).

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.

Task
From MS-GUI main window:
...................................................................................................................................................................................................

1 Select Search > Packet > Construction > Network Elements > External Network
Elements.
Result: The list window is shown.
...................................................................................................................................................................................................

2 Select the NE in the list.


...................................................................................................................................................................................................

3 Select Search > Properties.


Result: The property window is displayed.
See the following topic in this document: “Details of an ENE” (p. 13-89)
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
13-88 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Network Organization Management Details of an ENE
Managing External Network Elements
....................................................................................................................................................................................................................................

Details of an ENE
Attributes of an ENE
The attributes displayed for each ENE are:
• User Label.
• Parent Subnetwork.
• Domain.
• ENE Role (Inner Equipment, Customer Edge, P-VLAN Network).
• Comment.

....................................................................................................................................................................................................................................
1350 OMS 13-89
8DG42227DAAA 9.6
Issue 3 December 2012
Network Organization Management View the list of ETPs
Managing External Network Elements
....................................................................................................................................................................................................................................

View the list of ETPs


When to use
This function consists in displaying the External Termination Ports of a previously
selected ENE and their attributes.

Related information
Refer to the topic “Overview about External Network Elements” (p. 13-78).

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.

Task
From MS-GUI main window:
...................................................................................................................................................................................................

1 Select Search > Packet > Construction > Network Elements > External Network
Elements.
Result: The list window is shown.
...................................................................................................................................................................................................

2 Select an item in the list.


...................................................................................................................................................................................................

3 Select Search > Inventory from External Network Element > ETP List.
Result: The list window is displayed.
See the following topic in this document: “Description of the list of ETPs” (p. 13-91)
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
13-90 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Network Organization Management Description of the list of ETPs
Managing External Network Elements
....................................................................................................................................................................................................................................

Description of the list of ETPs


Attributes of an ETP
The attributes displayed for each ETP are:
• Identifier.
• Transport Link.
• Supported Layer (None, Ethernet, MPLS).
• Interface Rate.
• Usage State (Not meaningful, Idle, Busy).
• Manager Control.

....................................................................................................................................................................................................................................
1350 OMS 13-91
8DG42227DAAA 9.6
Issue 3 December 2012
Network Organization Management Create an ETP
Managing External Network Elements
....................................................................................................................................................................................................................................

Create an ETP
When to use
This function creates ETPs in the selected ENE.

Related information
The ETPs represent Ethernet ports located in the selected ENE.
Refer to the topic: “Overview about External Network Elements” (p. 13-78).
If the ETPs belong to Inner Equipment, the Manager Control is meaningful. In the case of
a Customer Edge ENE, the ETPs Manager Control is set automatically to Disabled.

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Conditions
To get a positive result:
• In the ENE, the amount of ETPs must not exceed the maximum. See Table B-6,
“Limits for ETPs in an ENE” (p. B-2)
Note: When the ENE is created, the ETP is created by default.

Task
From MS-GUI main window:
...................................................................................................................................................................................................

1 Select Search > Packet > Construction > Network Elements > External Network
Elements.
Result: The list window is shown.
...................................................................................................................................................................................................

2 Select an item in the list.


...................................................................................................................................................................................................

3 Select Search > Inventory from External Network Element > ETP List.
...................................................................................................................................................................................................

4 Select an item in the list.


...................................................................................................................................................................................................

5 Select Action > External TP > Create ETP.

....................................................................................................................................................................................................................................
13-92 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Network Organization Management Create an ETP
Managing External Network Elements
....................................................................................................................................................................................................................................
Result: The ETP Creation window is displayed.

Figure 13-12 ETP Creation window

To create ETPs:
• Enter the first ETP to create (The numerical value corresponding to the first ETP
number to be used).
• Enter the Number of ETP to create. Valid numerical value is between 1 and the
maximum number of ETPs which can be created on a ENE. See Table B-6,
“Limits for ETPs in an ENE” (p. B-2)
...................................................................................................................................................................................................

6 Click Ok button.
Result: The ETP (added after the first ones automatically created at the ENE creation)
are always created with Manager Control set to Disabled.
The ETP is automatically generated by the 1350 OMS PKT and the ETP List is
updated.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS 13-93
8DG42227DAAA 9.6
Issue 3 December 2012
Network Organization Management Delete an ETP
Managing External Network Elements
....................................................................................................................................................................................................................................

Delete an ETP
When to use
This function deletes ETPs from ENE.

Related information
The ETPs represent Ethernet ports located in the selected ENE.
Refer to the topic: “Overview about External Network Elements” (p. 13-78).

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Conditions
To get a positive result:
• The usage state of the ETPs belonging to the ENE must be idle.

Task
From MS-GUI main window:
...................................................................................................................................................................................................

1 Select Search > Packet > Construction > Network Elements > External Network
Elements.
Result: The ENE list window is shown.
...................................................................................................................................................................................................

2 Select an item in the list.


...................................................................................................................................................................................................

3 Select Search > Inventory from External Network Element > ETP List.
Result: The ETP list window is shown.
...................................................................................................................................................................................................

4 Select an item in the list.


...................................................................................................................................................................................................

5 Select Action > External TP > Delete or right-click the mouse and Select Delete.
...................................................................................................................................................................................................

6 Select one of the options in the confirmation box. Refer to the procedure “Confirm the
action” (p. 11-40).
....................................................................................................................................................................................................................................
13-94 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Network Organization Management Delete an ETP
Managing External Network Elements
....................................................................................................................................................................................................................................
Result: After confirmation, the ETPs are removed.
The ETP Inventory list is updated.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS 13-95
8DG42227DAAA 9.6
Issue 3 December 2012
Network Organization Management View the list of Ethernet Physical ports
Managing Ethernet Physical ports
....................................................................................................................................................................................................................................

Managing Ethernet Physical ports

View the list of Ethernet Physical ports


When to use
The Ethernet Physical Port List presents all the ports of the NE and their attributes.

Related information
The number of ports listed depends on the type of the board.
For a description about physical ports refer to the topic “NE management” (p. 11-47).

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.

Task
From MS-GUI main window:
...................................................................................................................................................................................................

1 Select Search > Packet > Construction > Network Elements > Defined NEs.
Result: The NE list window is shown.
...................................................................................................................................................................................................

2 Select an item in the list.


...................................................................................................................................................................................................

3 Select Search > Inventory from Network Element > Ethernet Physical Port List.
Result: The Ethernet Physical Port list window is shown.
See the following topic in this document: “Description of the list of Ethernet physical
ports” (p. 13-97)
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
13-96 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Network Organization Management Description of the list of Ethernet physical ports
Managing Ethernet Physical ports
....................................................................................................................................................................................................................................

Description of the list of Ethernet physical ports


Attributes of an Ethernet physical port
The attributes displayed for each port are:
• Label.
• Usage State.(Busy, Idle)
• Domain List
• Port Type. (Optical, Electrical)
• Manager Control (Enabled, Disabled).
• Transport Link.
• Actual Interface Rate (10 MBPS, 100 MBPS, 1 GBPS, …).
• Egress Shaping Rate (Kbit/s)
• Lag Size
• Lag User Label
• Stand-by Port in Lag
• Used Bandwidth
• Auto Negotiation State (Enabled, Disabled).
• Working State (Normal, Configuring, Modifying).
• Alarm Status.
• Consistency State (Consistent, Not Consistent).
• Client Type (ETS, ETB, PNP).
• Traffic Type
• MAU Type.(1000 Base X, 10 G Base R
• Duplex Mode.(None, Full, Half)
• Flow Control.
• Port Number.
• NAD.
• Channel Type
• Channel Lambda
• Channel Spacing
• Demarcation Role
• LACP
• Hash Key
• Port Priority
• Pause Frame. (Disabled, Symmetric, Asymmetric).
• Pause Frame Working Mode
• Mirror Type
• OAM Enabled

....................................................................................................................................................................................................................................
1350 OMS 13-97
8DG42227DAAA 9.6
Issue 3 December 2012
Network Organization Management Description of the list of Ethernet physical ports
Managing Ethernet Physical ports
....................................................................................................................................................................................................................................
• Interface Type
• Media Converter Connected

....................................................................................................................................................................................................................................
13-98 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Network Organization Management Configure an Ethernet physical port
Managing Ethernet Physical ports
....................................................................................................................................................................................................................................

Configure an Ethernet physical port


When to use
This function consists in configuring an Ethernet physical port of a PR EA or ES1, ES4,
ES16 NE.

Related information
For a description about physical ports refer to the topic “NE management” (p. 11-47).
The following table summarizes the different modifiable parameters and their possible
values. The table is arranged according to the type and release of the NE, and the type of
the port:

PR EA. ES1. ES4. ES16.


S. 4. 1. 8. 8. 3. 8FE 71GE ž1. 0. 14FE. 4GE.
1. E. G. F. F. F. port.
P. T. E. E. X. E.
H.
Supported n.a. Yes. No. No. n.a. Yes.
Layer.
Client Type. No Yes (ETS, Yes (ETS, 2.0: No (ETS only).
(ETS ETS-P, ETB). ETS-P, or 2.1: Yes (ETS, ETS-P, or
only). ETB). ETB).
Auto Neg Yes. No.
State.
Interface Yes. No.
Rate.
Duplex No. No. No. No.
Mode.

Notes:
1. “ž” means optical port; “7” means electrical port.
2. Only if the NE is assigned to a Provider bridge domain, the ETS-P is allowed. ETS-P is a
1350 OMS PKT specific value. ETS-P allows user to assign an ETS port to the Provider
bridge domain.

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
....................................................................................................................................................................................................................................
1350 OMS 13-99
8DG42227DAAA 9.6
Issue 3 December 2012
Network Organization Management Configure an Ethernet physical port
Managing Ethernet Physical ports
....................................................................................................................................................................................................................................
Conditions
To get a positive result:
• The NE must be a PR EA or an ES1, ES4, ES16 board.
• The selected port is not extremity of a Link Over Cable or an Ethernet Segment.
• The NE Operational State must be enabled (That is not isolated).
• The NE LAC State is not granted.
• The NE must not be locked (that is audit, alignment, reserve not in progress).
• The configured Interface Rate must be compatible with the port interface type.

Task
From MS-GUI main window:
...................................................................................................................................................................................................

1 Select Search > Packet > Construction > Network Elements > Defined NEs.
Result: The NE list window is shown.
...................................................................................................................................................................................................

2 Select an item in the list.


...................................................................................................................................................................................................

3 Select Search > Inventory from Network Element > Ethernet Physical Port List.
Result: The Ethernet Physical Port list window is shown.
...................................................................................................................................................................................................

4 Select an item in the list.


...................................................................................................................................................................................................

5 Select Action > Physical Port > Configure or right-click the mouse and Select
Configure..
Result: Depending on the NE type, a configuration window is displayed. For details,
refer to: “Related information” (p. 13-99).
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
13-100 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Network Organization Management Configure an Ethernet physical port
Managing Ethernet Physical ports
....................................................................................................................................................................................................................................
Task (for PR EA or ES16)
To configure an Ethernet physical port of a PR EA or ES16 electrical NE:
...................................................................................................................................................................................................

Figure 13-13 Ethernet Physical Port Config. window (for PR EA or ES16 electrical
board)

Execute the following steps:


• Choose the Supported Layer. (Ethernet or MPLS).
• Choose the Interface Rate. (10 MBPS, 100 MBPS).
• Choose the Auto Negotiation State. (Enabled, Disabled).
...................................................................................................................................................................................................

2 Click Ok.
Result: If the supported layer is MPLS, the Manager Control is set to Disabled, the
usage state is set to Idle, and Client Type is set to ETS.
If the NE is a PR EA 1 GB or ES16 4GE, only the Supported Layer can be
configured.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS 13-101
8DG42227DAAA 9.6
Issue 3 December 2012
Network Organization Management Configure an Ethernet physical port
Managing Ethernet Physical ports
....................................................................................................................................................................................................................................
Task (for ES1 or ES4 electrical)
To configure an Ethernet physical port of an ES1 or ES4 electrical NE:
...................................................................................................................................................................................................

Figure 13-14 Ethernet Physical Port Config. window (for ES1 or ES4 electrical
board)

Execute the following steps:


• Choose the Interface Rate (10 MBPS, 100 MBPS).
• Choose the Auto Negotiation State (Enabled, Disabled).
• Choose the Client Type (ETS, ETB, ETSP).
...................................................................................................................................................................................................

2 Click Ok.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
13-102 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Network Organization Management Configure an Ethernet physical port
Managing Ethernet Physical ports
....................................................................................................................................................................................................................................
Task (for ES1 or ES4 optical)
To configure an Ethernet physical port of an ES1 or ES4 optical NE:
...................................................................................................................................................................................................

Figure 13-15 Ethernet Physical Port Config. window (for ES1 or ES4 optical board)

Execute the following steps:


• Choose the Auto Negotiation State (Enabled, Disabled).
• Choose the Client Type (ETS, ETB, ETSP).
Note: If the NE is an ES4 optical, Auto Negotiation State cannot be configured.
...................................................................................................................................................................................................

2 Click Ok.
Result: The working state is set to Configuring.
A Port configuration request is sent to the NE.
After a positive response, the Ethernet physical port is configured and the working
state is set to Normal.
If the port is configured in ETB mode (Bridge mode), 1350 OMS PKT perform the
following actions:
• To upload the ports.
• To upload the related SDH connection by 1350 OMS SDH.
• To show both ports and SDH connections.
• To allow a navigation to 1350 OMS EML. Navigation action permits to configure the
port characteristics linked to the bridge management (like STP parameters, and so on).

E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS 13-103
8DG42227DAAA 9.6
Issue 3 December 2012
Network Organization Management Modify an Ethernet Physical Port
Managing Ethernet Physical ports
....................................................................................................................................................................................................................................

Modify an Ethernet Physical Port


When to use
The function modifies the Ethernet Physical Port characteristics.

Related information
The Ethernet physical port modification gives the possibility to modify the Manager
Control value of a port.
For a description about physical ports refer to the topic “NE management” (p. 11-47).

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Conditions
To get a positive result:
• The supported layer of the port must be Ethernet.
• The selected port is not extremity of a Link Over Cable or an Ethernet Segment.
• The Working State of the port must be normal.
• The port Client Type must be ETS.
• The NE must not be locked (that is audit, alignment, reserve not in progress).
• The NE must not be locked (that is audit, alignment, reserve are not in progress).

Task
From MS-GUI main window:
...................................................................................................................................................................................................

1 Select Search > Packet > Construction > Network Elements > Defined NEs.
Result: The NE list window is shown.
...................................................................................................................................................................................................

2 Select an item in the list.


...................................................................................................................................................................................................

3 Select Search > Inventory from Network Element > Ethernet Physical Port List.
Result: The list window is shown.
...................................................................................................................................................................................................

4 Select an item in the list.

....................................................................................................................................................................................................................................
13-104 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Network Organization Management Modify an Ethernet Physical Port
Managing Ethernet Physical ports
....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

5 Select Action > Modify or right-click the mouse and Select Modify.
Result: The modification window is displayed.
...................................................................................................................................................................................................

6 To modify an Ethernet physical port:


• Modify the Manager Control (optional).
...................................................................................................................................................................................................

7 Click Ok.
Result: The working state of the port is set to Modifying.
If Manager Control is set to Disabled, the usage state is set to Idle. If not, the usage
state is set to Not meaningful.
Then, the Ethernet Physical Port list is updated and the working state of the port is
set to Normal.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS 13-105
8DG42227DAAA 9.6
Issue 3 December 2012
Network Organization Management Assign a Port to Network Access Domain
Managing Ethernet Physical ports
....................................................................................................................................................................................................................................

Assign a Port to Network Access Domain


When to use
The function assigns NAD value to a Port.

Related information
For a description about physical ports refer to the topic “NE management” (p. 11-47).
For details about Network Access Domain“User Profile Management” (p. 11-71).

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.

Task
From MS-GUI main window:
...................................................................................................................................................................................................

1 Select Search > Packet > Construction > Network Elements > Defined NEs.
Result: The NE list window is shown.
...................................................................................................................................................................................................

2 Select an item in the list.


...................................................................................................................................................................................................

3 Select Search > Inventory from Network Element > Ethernet Physical Port List.
Result: The Ethernet Physical Port list window is shown.
...................................................................................................................................................................................................

4 Select an item in the list.


...................................................................................................................................................................................................

5 Select Action > Physical Port > Assign NAD or right-click the mouse and Select Assign
NAD.

....................................................................................................................................................................................................................................
13-106 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Network Organization Management Assign a Port to Network Access Domain
Managing Ethernet Physical ports
....................................................................................................................................................................................................................................
Result: The following window is displayed:

Figure 13-16 Ethernet Physical Port Assign NAD window

...................................................................................................................................................................................................

6 To assign a NAD value:


• Select the desired value in the list on the left of the window.
• Type the Nad Value in the NAD column separated by comma.
...................................................................................................................................................................................................

7 Click Ok.
Result: The NAD value is assigned to the Ethernet Physical port.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS 13-107
8DG42227DAAA 9.6
Issue 3 December 2012
Network Organization Management View the details of the Ethernet physical ports
Managing Ethernet Physical ports
....................................................................................................................................................................................................................................

View the details of the Ethernet physical ports


When to use
This function gets information about an Ethernet physical port of a NE.

Related information
For a description about physical ports refer to the topic “NE management” (p. 11-47).

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.

Task
From MS-GUI main window:
...................................................................................................................................................................................................

1 Select Search > Packet > Construction > Network Elements > Defined NEs.
Result: The NE list window is shown.
...................................................................................................................................................................................................

2 Select an item in the list.


...................................................................................................................................................................................................

3 Select Search > Inventory from Network Element > Ethernet Physical Port List.
Result: The Ethernet Physical Port list window is shown.
...................................................................................................................................................................................................

4 Select an item in the list.


...................................................................................................................................................................................................

5 Select Search > Properties or right-click the mouse and Select Properties.
Result: The Ethernet Physical Port List window is displayed.
See the following topic in this document: “Details of an Ethernet Physical Port”
(p. 13-109)
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
13-108 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Network Organization Management Details of an Ethernet Physical Port
Managing Ethernet Physical ports
....................................................................................................................................................................................................................................

Details of an Ethernet Physical Port


Attributes of a Ethernet Physical Port
The attributes displayed for each port are:
• User Label.
• Transport Link.
• Traffic Type
• Actual Interface Rate (10 MBPS, 100 MBPS, 1 GBPS, …).
• Manager Control (Enabled, Disabled).
• Client Type (ETS, ETB).
• MAU Type.(1000 Base X, 10 G Base R
• Duplex Mode.(None, Full, Half)
• Flow Control.
• Port Type. (Optical, Electrical)
• Port Number.
• NAD.
• Used Bandwidth
• Demarcation Role
• PTM Name
• Domain List
• Pause Frame. (Disabled, Symmetric, Asymmetric).
• Pause Frame Working Mode
• Label
• Egress Shaping Rate
• Mirror Type
• OAM Enabled
• Interface Type
• Media Converter Connected
• Usage State.
• Auto Negotiation State (Enabled, Disabled).
• Working State (Normal, Configuring, Modifying).
• Alarm Status.
• Consistency State (Consistent, Not Consistent).
• Lag User Label
• Lag Size
• Stand-by Port in Lag
• LACP
• Hash Key

....................................................................................................................................................................................................................................
1350 OMS 13-109
8DG42227DAAA 9.6
Issue 3 December 2012
Network Organization Management Details of an Ethernet Physical Port
Managing Ethernet Physical ports
....................................................................................................................................................................................................................................
• Port Priority
• Identifier
• NE Identifier
• NE User Label
• Mirrored Port ID
• Network Element Type
• Version
• Access Module

....................................................................................................................................................................................................................................
13-110 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Network Organization Management View the list of Equipment ports
Managing Ethernet Physical ports
....................................................................................................................................................................................................................................

View the list of Equipment ports


When to use
This function consists in navigating to the Ethernet physical port view on the NE
Equipment.

Related information
For a description about physical ports refer to the topic “NE management” (p. 11-47).

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.

Task
From MS-GUI main window:
...................................................................................................................................................................................................

1 Select Search > Packet > Construction > Network Elements > Defined NEs.
Result: The list window is shown.
...................................................................................................................................................................................................

2 Select one or more items in the list.


...................................................................................................................................................................................................

3 Select Search > Inventory from Network Element > Ethernet Physical Port List.
Result: The list window is shown.
...................................................................................................................................................................................................

4 Select one or items in the list.


...................................................................................................................................................................................................

5 Right-click the mouse and Select Search > Inventory from Physical Port > External
Navigation to > USM.
Result: The equipment view of the selected NE is opened and the selected port
highlighted.
See the following topic in this document: “Description of the list of Equipment ports”
(p. 13-112)
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS 13-111
8DG42227DAAA 9.6
Issue 3 December 2012
Network Organization Management Description of the list of Equipment ports
Managing Ethernet Physical ports
....................................................................................................................................................................................................................................

Description of the list of Equipment ports


Attributes of an Equipment port
The attributes depend on the equipment type.

....................................................................................................................................................................................................................................
13-112 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Network Organization Management Description of Link Aggregation (LAG) function
Managing Link Aggregation (LAG) ports
....................................................................................................................................................................................................................................

Managing Link Aggregation (LAG) ports

Description of Link Aggregation (LAG) function


LAG definition
The Link Aggregation (LAG) function allows to aggregate a number of parallel instances
into one single logical link. Physical links must be Full Duplex, Point to Point, and
operating at the same rate (Fast or Gigabit Ethernet).
The main targets of LAG are:
• Bandwidth Increase respect to available Ethernet Standard Bandwidth (10, 100, 1000
Mbit/s).
• Availability (in the sense of Protection) of Ethernet Links: the failure of one
aggregated link is protected with a fast switch time (less than 1 s).
The Link Aggregation can be managed either on UNI/IWI Terminations and on NNI
Terminations (intended as Transport Link "over Cable" Terminations).
The combination of main targets of LAG and its possible deployment, supplies a set of
four functional combinations that can be tested independently:
• LAG on UNI (for Bandwidth).
• LAG on UNI (for Protection).
• LAG on NNI (for Bandwidth).
• LAG on NNI (for Protection).
For feature description point of view, all those four possibilities are described in this
chapter, while for feature traceability they are independently reported as single features.

LAG scheme
The following figure reports the generic scheme of a Link Aggregation.

....................................................................................................................................................................................................................................
1350 OMS 13-113
8DG42227DAAA 9.6
Issue 3 December 2012
Network Organization Management Description of Link Aggregation (LAG) function
Managing Link Aggregation (LAG) ports
....................................................................................................................................................................................................................................

Figure 13-17 Scheme of a Link Aggregation

As shown in figure, more Physical Interfaces having the same rate are aggregated in a
Logical Interface called Link Aggregation Group (LAG).
The Link Aggregation Group is a Logical concept and can be realized also by non
contiguous Physical Interfaces.
The Client Type of Link Aggregation Group can be ETS or ETB.
In a Link Aggregation Group, the nominal Bandwidth is the Bandwidth of one Physical
Interfaces multiplied by the LAG size. The size of the LAG corresponds to the number of
active aggregated links.

NE supporting LAG
The following table reports the list of Network Elements supporting the Link Aggregation
function.

Table 13-1 Network Elements supporting the Link Aggregation

NE Type / Main Characteristic. Notes.


Ne
Release.
1850 TSS Applicable to GE and 10GE interfaces. Client Type=ETS means
320 R1.4. Max number of LAG=124. ETS and/or ETS_P.
Max Ports per LAG=16. Client Type
modification is allowed
Client Type: ETS and ETB.
only when LAG is
StandBy Aggregated Links supported. de-activated.
PortToPort services: NotSupported.
LOS and DEG alarms Supported.

....................................................................................................................................................................................................................................
13-114 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Network Organization Management Description of Link Aggregation (LAG) function
Managing Link Aggregation (LAG) ports
....................................................................................................................................................................................................................................
Table 13-1 Network Elements supporting the Link Aggregation (continued)

NE Type / Main Characteristic. Notes.


Ne
Release.
ISA ES1 Applicable to FE interfaces. The feature is generic
R1.5. Max number of LAG=1 (ES1-3FE) or 4 (ES1-8FX or and is applicable also to
ISA ES4 ES4-8FE). ISA ES1 and ISA ES4.
R1.5. Max Ports per LAG=2, 4 or 8 depending on HW Client Type=ETS means
availability. ETS and/or ETS_P.
Client Type: ETS and ETB. Client Type
modification is allowed
StandBy Aggregated Links supported.
only when LAG is
PortToPort services: NotSupported. de-activated.
LOS and DEG alarms Supported.
ISA ES16 Applicable to FE and GE interfaces. The feature is generic
R2.4. Max number of LAG=7 (14xFE) or 3 (7xFX) or 2 and is applicable also to
(4xGE). ISA ES16.
Max Ports per LAG limited by HW availability. Client Type=ETS means
ETS and/or ETS_P.
Client Type: ETS, MPLS and ETB.
Client Type
StandBy Aggregated Links supported.
modification is allowed
PortToPort services and ETS Virtual Switch: only when LAG is
NotSupported. de-activated.
LOS and DEG alarms Supported.

....................................................................................................................................................................................................................................
1350 OMS 13-115
8DG42227DAAA 9.6
Issue 3 December 2012
Network Organization Management View the list of LAG ports
Managing Link Aggregation (LAG) ports
....................................................................................................................................................................................................................................

View the list of LAG ports


When to use
The list shows all the LAG ports created into a NE.

Related information
For a description about LAG ports refer to the topic “Description of Link Aggregation
(LAG) function” (p. 13-113).

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.

Task
From MS-GUI main window:
...................................................................................................................................................................................................

1 Select Search > Packet > Construction > Network Elements > Defined NEs.
Result: The NE list window is shown.
...................................................................................................................................................................................................

2 Select an item in the list.


...................................................................................................................................................................................................

3 Select Search > Inventory from Network Element > Ethernet Physical Port List.
Set filter to: LAG size different from -1.
Result: The LAG Port list window is shown.
See the following topic in this document: “Description of the list of LAG ports”
(p. 13-117)
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
13-116 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Network Organization Management Description of the list of LAG ports
Managing Link Aggregation (LAG) ports
....................................................................................................................................................................................................................................

Description of the list of LAG ports


About LAG
The Link Aggregation (LAG) function allows to aggregate into one single logical link a
number of parallel instances. The instances member of a LAG must be links of Full
Duplex Point to Point Physical. The links must operate at the same rate (Fast or Gigabit
Ethernet).
The main targets of LAG are:
• Bandwidth Increase respect to available Ethernet Standard Bandwidth (10, 100, 1000
Mbit/s).
• Availability (in the sense of Protection) of Ethernet Links: the failure of one
aggregated link is protected with a fast switch time (less than one second).

Attributes of a LAG port


The attributes displayed for each port are:
• Node User Label.
• User Label.
• Port Type (None, Electrical, Optical).
• Transport Link.
• Interface Rate (10 MBPS, 100 MBPS, 1 GBPS, …).
• LAG size.
• LAG User Label.
• Port Protection in LAG.
• Auto Negotiation State (Enabled, Disabled).
• Usage State.
• Working State (Normal, Configuring, Modifying).
• Alarm Status (None, Warning, Minor, Major).
• Consistency State (Consistent, Not Consistent).
• Client Type (LAG).
• Supported Layer (Ethernet, MPLS).
• Interface Base (None, 1000 Base SX).
• Duplex Mode (None, Half, Full).
• Flow Control (Enabled, Disabled).
• Port Number.
• Manager Control (Enabled, Disabled).
• NAD.

....................................................................................................................................................................................................................................
1350 OMS 13-117
8DG42227DAAA 9.6
Issue 3 December 2012
Network Organization Management Create a LAG port
Managing Link Aggregation (LAG) ports
....................................................................................................................................................................................................................................

Create a LAG port


When to use
This function creates a LAG port.

Related information
For a description about LAG ports refer to the topic “Description of Link Aggregation
(LAG) function” (p. 13-113).
LAG size and number of ports
It is possible to add a number of ports different from the LAG size:
• If number of ports is less than the lag size: the LAG is in a degraded state.
• If number of ports is greater than the lag size: the exceeding ports are in a stand-by
status. They provide protection to the working ports according to port priority.
The ports must be in the same NE (the same card) and are subjected to consistency checks
and NE specific restrictions.
The Ports member of a LAG are assigned to domain using normal resource assignment
procedure. In the same context of LAG creation, the user can: assign LAG port to
domain, set port attributes, set domain-specific port attributes.

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.

Task
From MS-GUI main window:
...................................................................................................................................................................................................

1 Select Action > Packet > Construction > Create LAG Port.
Result: The LAG creation window is displayed.
...................................................................................................................................................................................................

2 To create a LAG port, provide the following LAG attributes:


• Enter the LAG size. The LAG size is the number of physical Ports that belong to the
LAG Port. When LAG size is empty the Port is a physical Port. The value zero is
admitted. LAG size value can be modified even when LAG is active.
• Set the LACP (Not Meaningful, True, False). LACP can be set at creation only.
• Enter the Hash key (Not Meaningful, MAC, MPLS, VLAN, IP, L4). Frame distribution
can be modified even when LAG is active.

....................................................................................................................................................................................................................................
13-118 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Network Organization Management Create a LAG port
Managing Link Aggregation (LAG) ports
....................................................................................................................................................................................................................................
• LAG Id
• Select the Network Element the LAG port belong to.
• Select the Resorces to assign physical port to the LAG port.
• Set the Port Priority. Priority is used to select active/stand-by physical ports.
Physical Ports can be added to or removed from the LAG Port selecting the icon
under Resorces menu.
...................................................................................................................................................................................................

3 Click Ok.
Result: The LAG Port is created after a consistency check.
PKT provides the following LAG attributes:
• Identifier.
• LAG Administrative Key.
• Administrative status.
The LAG port list and the opened graphical views are updated.
The Ports member of a LAG are removed from manager.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS 13-119
8DG42227DAAA 9.6
Issue 3 December 2012
Network Organization Management Modify a LAG port
Managing Link Aggregation (LAG) ports
....................................................................................................................................................................................................................................

Modify a LAG port


When to use
This function configures a LAG port characteristics.

Related information
User can modify:
• The LAG size.
• The Client Type.
• The LACP.
• The LAG frame distribution profile (Hash Key).
• The number of physical ports members of the LAG port.
• The priority of the physical ports members of the LAG port.
For a description about LAG ports refer to the topic “Description of Link Aggregation
(LAG) function” (p. 13-113).

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Conditions
To get a positive result, consider that each NE type is subject to specific constraints.

Task
From MS-GUI main window:
...................................................................................................................................................................................................

1 Show the LAG port list. See: “View the list of LAG ports” (p. 13-116).
Result: The list window is shown.
...................................................................................................................................................................................................

2 Select an item in the list.


...................................................................................................................................................................................................

3 Select Action > LAG Port > Modify or right-click the mouse and Select Modify.

....................................................................................................................................................................................................................................
13-120 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Network Organization Management Modify a LAG port
Managing Link Aggregation (LAG) ports
....................................................................................................................................................................................................................................
Result: Depending on the NE type, a configuration window is displayed.
...................................................................................................................................................................................................

4 User can modify one or more of the following fields in the Modify LAG Port window:
• The LAG size. See: “Task to change LAG size” (p. 13-121).
• The Client Type. See: “Task to change Client Type” (p. 13-122).
• The LACP. See: “Task to change LACP” (p. 13-122).
• The LAG frame distribution profile (Hash Key). See: “Task to change frame
distribution profile” (p. 13-122).
• The number of physical ports members of the LAG port. See: “Task to add ports”
(p. 13-123) or “Task to remove ports” (p. 13-123).
• The priority of the physical ports members of the LAG port. See: “Task to change port
priority” (p. 13-124).
...................................................................................................................................................................................................

5 Click Ok.
Result: A check is performed. If the check succeeded, the modification is accepted.
E...................................................................................................................................................................................................
N D O F S T E P S

Task to change LAG size


In the Modify LAG Port window, to configure the size of LAG port:
...................................................................................................................................................................................................

1 Enter a new LAG sizeor increase/decrease the current value.


...................................................................................................................................................................................................

2 Click Ok.
Result: A check is performed. If the check succeeded, the new value is accepted.
When decreasing, the LAG speed must satisfy CAC: (new size) * (BW of member
port) > Allocated BW . If check fails the modification is rejected.
For details about the relation between LAG size and number of Physical Port, refer to:
“LAG size and number of ports” (p. 13-118).
The LAG size can be changed also when port is active.

E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS 13-121
8DG42227DAAA 9.6
Issue 3 December 2012
Network Organization Management Modify a LAG port
Managing Link Aggregation (LAG) ports
....................................................................................................................................................................................................................................
Task to change Client Type
In the Modify LAG Port window, to change the Client Type of LAG port:
...................................................................................................................................................................................................

1 Choose a new Client Type.


...................................................................................................................................................................................................

2 Click Ok.
Result: A check is performed. If the check succeeded, the new value is accepted.
E...................................................................................................................................................................................................
N D O F S T E P S

Task to change LACP


In the Modify LAG Port window, to change the LACP of LAG port:
...................................................................................................................................................................................................

1 Choose a new LACP value.


...................................................................................................................................................................................................

2 Click Ok.
Result: A check is performed. If the check succeeded, the new value is accepted.

E...................................................................................................................................................................................................
N D O F S T E P S

Task to change frame distribution profile


In the Modify LAG Port window, to configure the distribution profile of LAG port:
...................................................................................................................................................................................................

1 Choose a new Hash Key.


...................................................................................................................................................................................................

2 Click Ok.
Result: A check is performed. If the check succeeded, the new value is accepted.
Can be changed also when port is active.

E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
13-122 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Network Organization Management Modify a LAG port
Managing Link Aggregation (LAG) ports
....................................................................................................................................................................................................................................
Task to add ports
In the Modify LAG Port window, to increase the number of physical ports members of a
LAG port:
...................................................................................................................................................................................................

1 Click the icon under Resources menu.


Result: The list of available physical ports is displayed.
...................................................................................................................................................................................................

2 Select one or more physical ports and click the icon to accept the selection.
Result: The list of available physical ports is closed.
The list of member physical ports is updated.
For details about the relation between LAG size and number of Physical Port, refer to:
“LAG size and number of ports” (p. 13-118).
The list of available physical ports can be refreshed or quit clicking on the related
icon.
...................................................................................................................................................................................................

3 Click Ok.
Result: A check is performed. If the check succeeded, the new value is accepted.
E...................................................................................................................................................................................................
N D O F S T E P S

Task to remove ports


In the Modify LAG Port window, to decrease the number of physical ports member of a
LAG port:
...................................................................................................................................................................................................

1 Select one or more physical ports.


...................................................................................................................................................................................................

2 Click the clear icon.


...................................................................................................................................................................................................

3 Click Ok.
Result: A check is performed. If the check succeeded, the new value is accepted.
For details about the relation between LAG size and number of Physical Port, refer to:
“LAG size and number of ports” (p. 13-118).
The list of available physical ports can be refreshed or quit clicking on the related
icon.

E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS 13-123
8DG42227DAAA 9.6
Issue 3 December 2012
Network Organization Management Modify a LAG port
Managing Link Aggregation (LAG) ports
....................................................................................................................................................................................................................................
Task to change port priority
In the Modify LAG Port window, to the priority of a port member of LAG port:
...................................................................................................................................................................................................

1 Chose a new priority.


...................................................................................................................................................................................................

2 Click Ok.
Result: A check is performed. If the check succeeded, the new value is accepted.
For details about the priority of Physical Port, refer to: “LAG size and number of
ports” (p. 13-118).
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
13-124 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Network Organization Management Assign LAG port to Network Access Domain
Managing Link Aggregation (LAG) ports
....................................................................................................................................................................................................................................

Assign LAG port to Network Access Domain


When to use
To assign a LAG port to Network Access Domain (NAD).

Related information
For a description about LAG ports refer to the topic “Description of Link Aggregation
(LAG) function” (p. 13-113).

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.

Task
The procedure used for LAG port is the same procedure used for Physical Port.
...................................................................................................................................................................................................

1 To assign a LAG port to Network Access Domain, See: “Assign a Port to Network Access
Domain” (p. 13-106).
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS 13-125
8DG42227DAAA 9.6
Issue 3 December 2012
Network Organization Management View the details of the LAG ports
Managing Link Aggregation (LAG) ports
....................................................................................................................................................................................................................................

View the details of the LAG ports


When to use
This function gets information about a LAG port of a NE.

Related information
For a description about LAG ports refer to the topic “Description of Link Aggregation
(LAG) function” (p. 13-113).

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.

Task
The procedure used for LAG port is the same procedure used for Physical Port.
...................................................................................................................................................................................................

1 To view the properties of a LAG port, See: “View the details of the Ethernet physical
ports” (p. 13-108).
See the following topic in this document: “Details of a LAG port” (p. 13-127)
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
13-126 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Network Organization Management Details of a LAG port
Managing Link Aggregation (LAG) ports
....................................................................................................................................................................................................................................

Details of a LAG port


Attributes of a LAG port
The attributes displayed for each port are:
• Node User Label.
• User Label.
• Port Type (None, Electrical, Optical).
• Transport Link.
• Interface Rate (10 MBPS, 100 MBPS, 1 GBPS, …).
• LAG size.
• LAG User Label.
• Port Protection in LAG.
• Auto Negotiation State (Enabled, Disabled).
• Usage State.
• Working State (Normal, Configuring, Modifying).
• Alarm Status (None, Warning, Minor, Major).
• Consistency State (Consistent, Not Consistent).
• Client Type (LAG).
• Supported Layer (Ethernet, MPLS).
• Interface Base (None, 1000 Base SX).
• Duplex Mode (None, Half, Full).
• Flow Control (Enabled, Disabled).
• Port Number.
• Manager Control (Enabled, Disabled).
• NAD.

....................................................................................................................................................................................................................................
1350 OMS 13-127
8DG42227DAAA 9.6
Issue 3 December 2012
Network Organization Management View the ports member of a LAG
Managing Link Aggregation (LAG) ports
....................................................................................................................................................................................................................................

View the ports member of a LAG


When to use
This function consists in navigating the LAG port to view physical port members.

Related information
For a description about LAG ports, refer to the topic “Description of Link Aggregation
(LAG) function” (p. 13-113).

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.

Task
From MS-GUI main window:
...................................................................................................................................................................................................

1 Show the LAG port list. See: “View the list of LAG ports” (p. 13-116).
Result: The list window is shown.
...................................................................................................................................................................................................

2 Select one item in the list.


...................................................................................................................................................................................................

3 Right-click the mouse and Select Search > Inventory from Physical Port .
Result: The Physical Port view is opened.
See the following topic in this document: “Description of the list of LAG ports”
(p. 13-129)
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
13-128 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Network Organization Management Description of the list of LAG ports
Managing Link Aggregation (LAG) ports
....................................................................................................................................................................................................................................

Description of the list of LAG ports


Attributes of a LAG port
To view attributes of a LAG port, See: “View the details of the Ethernet physical ports”
(p. 13-108).

....................................................................................................................................................................................................................................
1350 OMS 13-129
8DG42227DAAA 9.6
Issue 3 December 2012
Network Organization Management View the list of NADs
Network Access Domain (NAD) Management
....................................................................................................................................................................................................................................

Network Access Domain (NAD) Management

View the list of NADs


When to use
The NAD List window presents all the NADs and their attributes.

Related information
For details about Network Access Domain“User Profile Management” (p. 11-71).

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.

Task
From MS-GUI main window:
...................................................................................................................................................................................................

1 Select Search > Packet > Construction.


Result: The Construction is displayed.
...................................................................................................................................................................................................

2 Select Network Access Domain.


Result: The List window is displayed.
See the following topic in this document: “Description of the list of NADs”
(p. 13-131)
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
13-130 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Network Organization Management Description of the list of NADs
Network Access Domain (NAD) Management
....................................................................................................................................................................................................................................

Description of the list of NADs


Attributes of a NAD
The attributes displayed for each object are:
• Value.
• Description.

....................................................................................................................................................................................................................................
1350 OMS 13-131
8DG42227DAAA 9.6
Issue 3 December 2012
Network Organization Management Create a NAD
Network Access Domain (NAD) Management
....................................................................................................................................................................................................................................

Create a NAD
When to use
This function creates a NAD values.

Related information
The NAD values allow the partitioning of the network resources in set of consistent
resources that can be used by Service Management Layer products (that is 1355VPN).
For details about Network Access Domain“User Profile Management” (p. 11-71).

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Conditions
To get a positive result:
• The User Label must be different from any already used by other NADs.

Task
From MS-GUI main window:
...................................................................................................................................................................................................

1 Select Action > Packet > Construction > Create NAD.


Result: The NAD creation window is displayed.
...................................................................................................................................................................................................

2 To create a NAD:
• Enter the NAD Description.
• Enter the NAD Value.
Note: The inserted NAD Value must be different from the existing ones.
...................................................................................................................................................................................................

3 Click Ok button.
Result: The NAD is automatically generated and the NAD List is updated.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
13-132 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Network Organization Management Modify a NAD
Network Access Domain (NAD) Management
....................................................................................................................................................................................................................................

Modify a NAD
When to use
The function modifies NAD characteristics.

Related information
The NAD modification gives the possibility to modify:
• Description.
For details about Network Access Domain“User Profile Management” (p. 11-71).

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.

Task
From MS-GUI main window:
...................................................................................................................................................................................................

1 Select Search > Packet > Construction > NAD.


Result: The list window is shown.
...................................................................................................................................................................................................

2 Select one or more items in the list.


...................................................................................................................................................................................................

3 Select Action > Network Access Domain > Modify.


Result: The NAD modification window is displayed.
...................................................................................................................................................................................................

4 To modify a NAD:
• Enter a New Desciption (optional).
...................................................................................................................................................................................................

5 Select OK.
Result: Then, the NAD list is updated.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS 13-133
8DG42227DAAA 9.6
Issue 3 December 2012
Network Organization Management Delete a NAD
Network Access Domain (NAD) Management
....................................................................................................................................................................................................................................

Delete a NAD
When to use
This function deletes NAD from the list.

Related information
For details about Network Access Domain“User Profile Management” (p. 11-71).

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Conditions
To get a positive result:
• The usage state of the ETPs belonging to the ENE must be idle.

Task
From MS-GUI main window:
...................................................................................................................................................................................................

1 Select Search > Packet > Construction > NAD.


Result: The list window is shown.
...................................................................................................................................................................................................

2 Select one or more items in the list.


...................................................................................................................................................................................................

3 Select Action > Network Access Domain > Delete or right-click the mouse and Select
Delete.
...................................................................................................................................................................................................

4 Select one of the options in the confirmation box. Refer to the procedure “Confirm the
action” (p. 11-40).
Result: After confirmation, the NAD is removed.
The NAD Inventory list is updated.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
13-134 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Network Organization Management Overview about Jumbo Frames

....................................................................................................................................................................................................................................

Managing Jumbo Frames (through NAV)

Overview about Jumbo Frames


Frame size management
The size of the frame managed by the Legacy ISA equipment is limited to a maximum
value to optimize the internal resources (for example: internal queues). When traffics
consist in large frames (called Ethernet Jumbo frames) a specific configuration on the
equipment is required. The manager is able to configure the support of Jumbo Frames for
each interface involved in such traffic.
The management of Jumbo Frame through Navigation involves the 1850 TSS 320
releases in the following way:
• 1850 TSS 320 1.0: Ethernet Port.
• 1850 TSS 320 1.1: Ethernet Port over GFP.
• 1850 TSS 320 1.2: Ethernet Port over LAPS.

Jumbo Frames management description


The management of Jumbo frames inside a network, brings to the configuration of all (or
of a subset) infrastructures dedicated to the traffic supporting Jumbo Frames.
The management of Jumbo Frames have to be explicitly configured in End-to-End way
enabling both on Edge Ports and on Crossed Transport Links. The following figure
provides an example.

Figure 13-18 Jumbo frame configuration pattern

....................................................................................................................................................................................................................................
1350 OMS 13-135
8DG42227DAAA 9.6
Issue 3 December 2012
Network Organization Management Overview about Jumbo Frames
Managing Jumbo Frames (through NAV)
....................................................................................................................................................................................................................................
For Jumbo Frame capability, the amount of resources to be configured can cover a whole
network, a domain, or it can be done in heterogeneous way acting on a subset of
resources. The condition to fulfill is that the end-to-end configuration is guaranteed
(otherwise the Jumbo frame can be discarded by NE not properly configured).
The management of Jumbo frames has to be explicitly enabled on Ethernet Interfaces
(either UNI, NNI and IWI).
The default behavior is “disabled”.
In particular, both Local and Remote Ethernet Interfaces can be configured to support
Jumbo frames and allow the Jumbo traffic flowing.
The management of Jumbo frames capability is only possible when the Ethernet Interface
is not Active (that is the Ethernet Interface is not already “in use” by Ethernet traffic).

....................................................................................................................................................................................................................................
13-136 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Network Organization Management Workflow to configure Interfaces for Jumbo Traffic
Managing Jumbo Frames (through NAV)
....................................................................................................................................................................................................................................

Workflow to configure Interfaces for Jumbo Traffic


When to use
This chapter summarize a workflow allowing the configuration of Jumbo frames on
Ethernet Interfaces of 1850 TSS 320 equipments.

Related information
For details about Jumbo Frames, refer to the topic “Overview about Jumbo Frames ”
(p. 13-135).

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.

Task for Configuration on Ethernet Edge Ports


From MS-GUI main window:
...................................................................................................................................................................................................

1 Start a navigation toward 1350 OMS EML to open on the 1350 OMS EML GUI the
interface view of the 1850 TSS 320.
Select Search > Packet > Services > Connection Oriented (ETS) > Edge Port.
Result: The list window is shown.
...................................................................................................................................................................................................

2 Select one item in the list.


...................................................................................................................................................................................................

3 Select Search > Inventory from Edge Port > Zoom-in.

....................................................................................................................................................................................................................................
1350 OMS 13-137
8DG42227DAAA 9.6
Issue 3 December 2012
Network Organization Management Workflow to configure Interfaces for Jumbo Traffic
Managing Jumbo Frames (through NAV)
....................................................................................................................................................................................................................................
Result:

Figure 13-19 Jumbo frame configuration pattern

...................................................................................................................................................................................................

4 Configure the Jumbo frame capability acting on the if Mtu attribute of the 1850 TSS
Ethernet Interface. Configuration is accomplished by inserting the value of the largest
frame to be managed on the interface.
E...................................................................................................................................................................................................
N D O F S T E P S

Task for Configuration on Transport Links


From MS-GUI main window:
...................................................................................................................................................................................................

1 Select one Transport Link ending on at least one 1850 TSS 320.
Select Search > Packet > Services > Connection Oriented (ETS) > ETS Transport
Links.
Result: The list window is shown.
...................................................................................................................................................................................................

2 Select one item in the list.


...................................................................................................................................................................................................

3 Select Action > Transport Link > Configure.

....................................................................................................................................................................................................................................
13-138 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Network Organization Management Workflow to configure Interfaces for Jumbo Traffic
Managing Jumbo Frames (through NAV)
....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

4 Starts a navigation to open on the 1350 OMS EML GUI the right Interface view. If the
Transport Link is joining one 1850 TSS 320 NE and one ENE, open one navigation. If the
transport Link is connecting two 1850 TSS 320 equipments (one navigation for each 1850
TSS 320 equipment), open two navigations.
...................................................................................................................................................................................................

5 Configure the Jumbo frame capability inserting the value of the largest frame to be
managed on such interface.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS 13-139
8DG42227DAAA 9.6
Issue 3 December 2012
Network Organization Management Overview
Particular configuration procedures
....................................................................................................................................................................................................................................

Particular configuration procedures

Managing ports on 1678MCC Network Elements


When to use
This paragraph describes the procedure when a new port is created or deleted on a
1678MCC Network Element.

Related information
The procedure is started on 1350 OMS EML application with the equipment of the port
on the NE.
If the user has configured the automatic upload on the NE, 1350 OMS SDH system
learns the new configured NAPs automatically. Otherwise the new ports are learned
manually.
1350 OMS PKT receives the new NAP notification and asks automatically 1350 OMS
SDH system for the corresponding physical port.
The deleting of a port operation is manually accomplished on 1350 OMS SDH, 1350
OMS EML, and 1350 OMS PKT systems.
The first step is the deleting the NAP on 1350 OMS SDH application. The second step is
the deleting the port on 1350 OMS EML application. Eventually the deleting of the port
on 1350 OMS PKT application.
Refer to the document: [3] 1350 OMS EML Guide.
Refer to the document: [4] 1350 OMS SDH Guide.
For details about equipment view, refer to the topic “Navigation to equipment”
(p. 18-180).

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
The node 1678MCC NE is assigned to a subnetwork.

....................................................................................................................................................................................................................................
13-140 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Network Organization Management Managing ports on 1678MCC Network Elements
Particular configuration procedures
....................................................................................................................................................................................................................................
Task to Add a port on 1678MCC NE
From MS-GUI main window:
...................................................................................................................................................................................................

1 On the tree area, select the subnetwork that contains the equipment. Click the third button
of the mouse then select Search > Map.
...................................................................................................................................................................................................

2 Select the node on the map and Click third button of the mouse then select Search >
Show > Equipment View.
Result: The navigation process starts and, when completed, the Show Equipment
window is shown.
...................................................................................................................................................................................................

3 Select the 1678MCC equipment slot in the window and double click the mouse.
Result: The board window is shown.
...................................................................................................................................................................................................

4 In the board window, select Equipment > Modify.


Note: Depending on the version or the state of the selected slot, the menu can be
Modify, Set.

....................................................................................................................................................................................................................................
1350 OMS 13-141
8DG42227DAAA 9.6
Issue 3 December 2012
Network Organization Management Managing ports on 1678MCC Network Elements
Particular configuration procedures
....................................................................................................................................................................................................................................
Result: The modification window is shown.

Figure 13-20 Create a port on 1678MCC NE

...................................................................................................................................................................................................

5 Select the one of the Allowed Equipment Types and click OK.
Result: The port is added to the NE.
1350 OMS SDH learns automatically the new port and the new NAP.
1350 OMS PKT learns automatically the new port and the new TDM termination and
the new physical port.
To verify the existence of the new TDM terminations, refer to “View the list of TDM
terminations” (p. 13-66). To verify the existence of the new physical ports, refer to
“View the list of Ethernet Physical ports” (p. 13-96).
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
13-142 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Network Organization Management Managing ports on 1678MCC Network Elements
Particular configuration procedures
....................................................................................................................................................................................................................................
Task to Remove a port on 1678MCC NE
From MS-GUI main window:
...................................................................................................................................................................................................

1 On 1350 OMS SDH system, remove the NAP port.


The operation of remove NAP port is performed manually as explained in the following:
• List the NAPs on 1350 OMS SDH system.
• Select the NAP to remove and confirm the operation.
...................................................................................................................................................................................................

2 On 1350 OMS EML system, remove the NE port.


...................................................................................................................................................................................................

3 On the tree area, select the subnetwork that contains the equipment. Click third button of
the mouse then select Search > Map.
...................................................................................................................................................................................................

4 Select the node on the map and Click third button of the mouse then select Search >
Show > Equipment View.
Result: The navigation process starts and, when completed, the Show Equipment
window is shown.
...................................................................................................................................................................................................

5 Select the 1678MCC equipment slot in the window and double click the mouse.
Result: The board window is shown.
...................................................................................................................................................................................................

6 In the board window, select Equipment > Modify.


Note: Depending on the version or the state of the selected slot, the menu can be
Modify, Set.

....................................................................................................................................................................................................................................
1350 OMS 13-143
8DG42227DAAA 9.6
Issue 3 December 2012
Network Organization Management Managing ports on 1678MCC Network Elements
Particular configuration procedures
....................................................................................................................................................................................................................................
Result:

Figure 13-21 Remove port on 1678MCC NE

...................................................................................................................................................................................................

7 Select the Empty slot of the Allowed Equipment Types and click OK.
...................................................................................................................................................................................................

8 On 1350 OMS SDH system, synchronize the node.


...................................................................................................................................................................................................

9 On 1350 OMS PKT upload the NE physical ports.


Refer to “Upload the Ethernet physical ports” (p. 13-54).

....................................................................................................................................................................................................................................
13-144 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Network Organization Management Managing ports on 1678MCC Network Elements
Particular configuration procedures
....................................................................................................................................................................................................................................
Result: The objects in the system are updated.
To verify the new conditions referring to “View the list of TDM terminations”
(p. 13-66) and refer to “View the list of Ethernet Physical ports” (p. 13-96).
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS 13-145
8DG42227DAAA 9.6
Issue 3 December 2012
Network Organization Management ISA BCE Ethernet Board
Particular configuration procedures
....................................................................................................................................................................................................................................

ISA BCE Ethernet Board


When to use
This procedure modifies crossover parameters.

Related information
This procedure is used to modify crossover parameters by navigation.
This procedure set the 1350 OMS EML to ignore the assignment flag.
This procedure is used in case 1350 OMS PKT manages ISA BCE-ETH boards. If the
user has to modify the crossover parameters and the crossover parameters are not
managed by 1350 OMS PKT, the modification is accomplished by navigation. On the
related 1350 OMS EML Master instances, the security configuration is modified so that
the NML assignment flag is ignored.
For details about Security Administration, refer to the document [2] 1350 OMS
Administration Guide, Vol 2: Common GUI Functions.

Before you begin


The system is running.
The system is properly configured.
The system is connected by Web Portal.
The view areas in the Web Portal are all active.

Task
From the Web Portal window, in Application List Area, execute the following steps:
...................................................................................................................................................................................................

1 Select Administration > Security Administration.


Result: The Security Administration icons related to each application are shown.
...................................................................................................................................................................................................

2 Select the icon for the management of the User profiles related to the EML application
that manages the board.
...................................................................................................................................................................................................

3 Double click the icon or right click the mouse and select Rise up.

....................................................................................................................................................................................................................................
13-146 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Network Organization Management ISA BCE Ethernet Board
Particular configuration procedures
....................................................................................................................................................................................................................................
Result: The ACI management / FAD/Function management window opens.
If necessary, set the View of the Tree Area and set the Tools to Show >
functions/FADs.
...................................................................................................................................................................................................

4 In the Tree Area, according to User Profile for which you want to apply the security
modification, select:
• FAD > DATAPLUG_EMLUSMETHBCE_admin.
• FAD > DATAPLUG_EMLUSMETHBCE_constructor.
• FAD > DATAPLUG_EMLUSMETHBCE_operator.
• FAD > DATAPLUG_EMLUSMETHBCE_viewer.
...................................................................................................................................................................................................

5 In the Main Area, select the Tab Edit Fad and Menu View.
...................................................................................................................................................................................................

6 Select Root > Applications > EMLUSMETHBCE > IgnoreNMLAssignment.


...................................................................................................................................................................................................

7 Click Select and Apply.


Result: The parameter is modified.
...................................................................................................................................................................................................

8 In the Main Area, select the Tab Edit Fad and List View.
Result: The area Included FADs/Functions lists the parameter IgnoreNMLAssign-
ment.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS 13-147
8DG42227DAAA 9.6
Issue 3 December 2012
Network Organization Management ISA BCE Ethernet Board

....................................................................................................................................................................................................................................

....................................................................................................................................................................................................................................
13-148 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
14 14
Transport Link
Management

Overview
Purpose
This chapter describes how to manage the transport infrastructure for Ethernet
connections.

Contents

Overview about Transport links 14-4


Transport link definition 14-4
Transport link classification 14-5
Concatenated VC management 14-11
Setting parameters of Transport Links 14-12
Implicit configuration 14-14
Managing Links Over TDM 14-17
Introduction 14-18
View the list of Links Over TDM 14-19
Create Link Over TDM 14-21
Delete a Link Over TDM 14-24
Configure a Link Over TDM 14-25
Get the Link Over TDM Extremities 14-27
Remove inconsistent TDM paths 14-29
Assign a Link Over TDM to a Domain 14-30
Deassign a Link Over TDM from a Domain 14-31
Assign NAccess Domain 14-32
View the details of the Links Over TDM 14-34
Get the Fault Localization 14-36
Managing Links Over Cable 14-38
Overview about Link Over Cables 14-38
...................................................................................................................................................................................................................................
1350 OMS 14-1
8DG42227DAAA 9.6
Issue 3 December 2012
Transport Link Management Overview

....................................................................................................................................................................................................................................

View the list of Links Over Cables 14-41


Create a Link Over Cable 14-42
Modify a Link Over Cable 14-44
Delete a Link Over Cable 14-46
Get the Link Over Cable extremities 14-48
View the details of the Link Over Cables 14-50
Link Over Cable Split/Join 14-52
Configure Split/Join 14-54
Configure a Link Over Cable 14-57
Assign NAD 14-58
Get the Fault Localization 14-59
Assign a Link Over Cable to a Domain 14-60
Deassign a Link Over Cable from a Domain 14-61
Managing LAG Links Over Cable 14-62
View the list of LAG Links Over Cables 14-62
Create a LAG Link Over Cable from extremities 14-63
Create a LAG Link Over Cable from Links 14-66
Create a LAG Link VCG from extremities 14-69
Create a LAG Link VCG from Links 14-72
Modify a LAG Link Over Cable 14-75
Delete a LAG Link Over Cable 14-77
Get the LAG Link Over Cable extremities 14-79
View the details of the LAG Link Over Cables 14-80
Details of the list of LAG Link Over Cables 14-81
Managing links over WDM 14-82
Overview about links over WDM 14-82
View the list of links over WDM 14-83
Get the Link Over WDM extremities 14-84
Description of a Link Over WDM Extremities 14-85
View the details of the links over WDM 14-86
Managing links over MPLS 14-88
Overview about links over MPLS 14-88
View the list of links over MPLS 14-89
Get the Link Over MPLS extremities 14-90
View the details of the links over MPLS 14-91

....................................................................................................................................................................................................................................
14-2 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Transport Link Management Overview

....................................................................................................................................................................................................................................

Managing Link over Radio 14-93


View the list of links over Radio 14-93
Managing links over T-MPLS 14-94
Overview about links over T-MPLS 14-94
View the list of links over T-MPLS 14-95
Get the Link Over T-MPLS extremities 14-96
View the details of the links over T-MPLS 14-97
Managing MPLS/T-MPLS infrastructure 14-99
Overview about MPLS/T-MPLS infrastructure 14-99
View the list of T-MPLS sections 14-100
Get the T-MPLS section extremities 14-101
View the details of the links over T-MPLS 14-102
Managing Transport Links by Domain 14-104
View the list of Transport Links 14-104

....................................................................................................................................................................................................................................
1350 OMS 14-3
8DG42227DAAA 9.6
Issue 3 December 2012
Transport Link Management Transport link definition
Overview about Transport links
....................................................................................................................................................................................................................................

Overview about Transport links

Transport link definition


Description of the infrastructure
This part provides a description of the infrastructure in term of: Link Over TDM, Link
Over Cable, Link Over MPLS. The infrastructure is used for different supported layer
MPLS or Ethernet. The infrastructure is named Transport Link.
The Transport Link can be supported by:
• An SDH path. The link is called Link Over TDM. It carries directly Ethernet
Segments or VC-LSPs: The supported layer is Ethernet or MPLS.
• A VC-LSP. The link is called Link Over MPLS. A Link Over TDM or a Link Over
Cable (Martini) carries it.
• An Ethernet cable or a Martini cable. The link is called Link Over Cable. It connects a
NE with an ENE. If the ENE has a role inner equipment then it carries directly
Ethernet Segments or VC-LSP. The supported layer is Ethernet or MPLS. If the ENE
has a role customer Edge, the ENE is only used for the graphical view.
When the provisioning state of the Link Over TDM becomes commissioned, the
corresponding Transport link is created in the MPLS or Ethernet management domain.
Creation is done according to the supported layer Ethernet or MPLS.

....................................................................................................................................................................................................................................
14-4 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Transport Link Management Transport link classification
Overview about Transport links
....................................................................................................................................................................................................................................

Transport link classification


Overview
In the following, different cases of Transport links are listed.
• “Link Over TDM between Q3 NEs” (p. 14-6).
• “Link Over TDM between Q3 NE and SNMP NE” (p. 14-6).
• “Link Over TDM between 2 SNMP NEs” (p. 14-7).
• “Link Over Cable between SNMP NE and ENE” (p. 14-8).
• “Link Over MPLS between 2 SNMP NEs” (p. 14-9).
• “Link Over MPLS between SNMP NE and ENE based on VC-LSP” (p. 14-10).
The Link Over TDM user label defined in 1350 OMS PKT is the same as the SDH path
user label defined in 1350 OMS SDH.
Legend: in the following figures, the following symbols are used:

....................................................................................................................................................................................................................................
1350 OMS 14-5
8DG42227DAAA 9.6
Issue 3 December 2012
Transport Link Management Transport link classification
Overview about Transport links
....................................................................................................................................................................................................................................
Link Over TDM between Q3 NEs

Figure 14-1 Link Over TDM between Q3 NEs

In this case, the effective bandwidth of the Link Over TDM is equal to:
• Ethernet port bit rate: 10 Mbit/s, 100 Mbit/s, or 1 Gbit/s.

Link Over TDM between Q3 NE and SNMP NE

Figure 14-2 Link Over TDM between Q3 NE and SNMP NE

The effective bandwidth of the Link Over TDM is equal to the minimum value between:
• Ethernet port bit rate: 10 Mbit/s, 100 Mbit/s, or 1 Gbit/s (of the E/FE/GE NE),.
• Transport bit rate by concatenation level of SDH path: (vc4, vc3, vc12) × (0…63).

....................................................................................................................................................................................................................................
14-6 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Transport Link Management Transport link classification
Overview about Transport links
....................................................................................................................................................................................................................................
Link Over TDM between 2 SNMP NEs

Figure 14-3 Link Over TDM between 2 SNMP NEs

The effective bandwidth of the Link Over TDM is equal to:


• Transport bit rate by concatenation level of SDH path: (vc4, vc3, vc12) × (0…63).

....................................................................................................................................................................................................................................
1350 OMS 14-7
8DG42227DAAA 9.6
Issue 3 December 2012
Transport Link Management Transport link classification
Overview about Transport links
....................................................................................................................................................................................................................................
Link Over Cable between SNMP NE and ENE

Figure 14-4 Link Over Cable between SNMP NE and ENE

The effective bandwidth of the Link Over Cable is equal to:


• Ethernet port bit rate: 10 Mbit/s, 100 Mbit/s, or 1 Gbit/s.

....................................................................................................................................................................................................................................
14-8 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Transport Link Management Transport link classification
Overview about Transport links
....................................................................................................................................................................................................................................
Link Over MPLS between 2 SNMP NEs

Figure 14-5 Link Over MPLS between 2 SNMP NEs

The effective bandwidth of the Link Over MPLS is defined by the Traffic Descriptor
parameters of the VC-LSP. The effective bandwidth is not explicitly calculated.

....................................................................................................................................................................................................................................
1350 OMS 14-9
8DG42227DAAA 9.6
Issue 3 December 2012
Transport Link Management Transport link classification
Overview about Transport links
....................................................................................................................................................................................................................................
Link Over MPLS between SNMP NE and ENE based on VC-LSP

Figure 14-6 Link Over MPLS between SNMP NE and ENE based on VC-LSP

The effective bandwidth of the Link Over MPLS is defined by the Traffic Descriptor
parameters of the VC-LSP. The effective bandwidth is not explicitly calculated.

....................................................................................................................................................................................................................................
14-10 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Transport Link Management Concatenated VC management
Overview about Transport links
....................................................................................................................................................................................................................................

Concatenated VC management
The increment of the effective bandwidth
The following figure depicts the concatenated VC management, with a concatenation
level equal to 4, for an Ethernet bit rate equal to 1 Gbit/s.

Figure 14-7 Network Element Supervision: Concatenated VC management

In this example, the effective bandwidth of the Link Over TDM is: 4 x 155 Mbit/s (vc4) =
620 Mbit/s, less than 1 Gbit/s, the bit rate of the connected port.
The TDM terminations are managed in the 1350 OMS PKT with the following
characteristics:
• TDM termination Identifier (That is Ethernet port Identifier).
• Technology: ETH.
• Bit Rate: Eth 1 Gbit/s.
• Supported Layer: Ethernet.
• Concatenation level: 4.
• Concatenation Rate: vc4.
The management of concatenated SDH path is the same both for virtual and for packet
concatenation, both for transparent and for compressed rates.
For a concatenated path, the concatenation level can increment or reduce the SDH path
bandwidth.
1350 OMS SDH notifies to 1350 OMS PKT1350 OMS PKT every modification on the
concatenation level of an SDH path.
After the notification has been received, it has to calculate the effective bandwidth of the
Link Over TDM. The corresponding SNMP interfaces on ISA PR EA is updated.

....................................................................................................................................................................................................................................
1350 OMS 14-11
8DG42227DAAA 9.6
Issue 3 December 2012
Transport Link Management Setting parameters of Transport Links
Overview about Transport links
....................................................................................................................................................................................................................................

Setting parameters of Transport Links


Relation between Transport Link and its extremities
Transport Links and extremities combinations are described in the following table:

NE. E/FE/GE (Q3 PR EA, ES1, ES4, ES16 ENE.


NE). (SNMP NE).
E/FE/GE Link Over TDM Link Over TDM (see Figure Link Over Cable (see
(Q3 NE). (see Figure 14-1, 14-2, “Link Over TDM Figure 1 4).
“Link Over between Q3 NE and SNMP
TDM between NE” (p. 14-6)).
Q3 NEs”
(p. 14-6)).
PR EA, ES1, Link Over TDM Link Over MPLS 1. Link Over Cable (see
ES4, ES16 (see Figure 14-2, (see Figure 14-5, “Link Over Figure 14-4, “Link Over
(SNMP NE). “Link Over MPLS between 2 SNMP NEs” Cable between SNMP NE
TDM between (p. 14-9)). and ENE” (p. 14-8)).
Q3 NE and Link Over MPLS 2.
Link Over TDM (see Figure
SNMP NE”
14-3, “Link Over TDM (see Figure 14-6, “Link
(p. 14-6)).
between 2 SNMP NEs” Over MPLS between
(p. 14-7)). SNMP NE and ENE
based on VC-LSP”
(p. 14-10)).
ENE. Link Over Cable Link Over Cable (see Figure Not Applicable.
(see Figure 1 4). 14-4, “Link Over Cable
between SNMP NE and ENE”
(p. 14-8)).
Link Over MPLS 3.
(see Figure 14-6, “Link Over
MPLS between SNMP NE and
ENE based on VC-LSP”
(p. 14-10)).

Notes:
1. Is possible only between two NEs able to support MPLS (PR EA or ES16).
2. Is possible only between a NE able to support MPLS (PR EA or ES16) and an ENE.
3. Is possible only between a NE able to support MPLS (PR EA or ES16) and an ENE.

....................................................................................................................................................................................................................................
14-12 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Transport Link Management Setting parameters of Transport Links
Overview about Transport links
....................................................................................................................................................................................................................................
Relation among Transport Links attributes and board releases
The next table summarizes the combinations between Supported Layer, Client
Type,Protocol Type, and Manager Control :

Client Type. none. ETS. ETB.


Protocol Type. HDLC. LAPS or GFP. LAPS or GFP.
Supported Layer2. MPLS. Ethernet. Ethernet.
Manager Control 3. Enabled or Disabled 1 Enabled or Disabled 1 Disabled.
. .

Notes:
1. If the Link Over TDM is Not Consistent, the disabled value occurs.
2. The supported layer of the Link Over TDM is deduced from the Protocol Type. The
modification of the Protocol Type involves an implicit modification of the Supported Layer.
3. The modification of the Client Type can involve a modification of the Manager Control.

The possible modifications depend also on the involved type and release of NEs:

E/FE/GE.PR ES1 / ES4. ES16 R2.0. ES16 2.1.


EA.
Protocol LAPS, GFP,
LAPS, GFP. LAPS, GFP, HDLC.
Type. HDLC.
Client ETS, ETB,
ETS, ETB. ETS, none.
Type. none.

....................................................................................................................................................................................................................................
1350 OMS 14-13
8DG42227DAAA 9.6
Issue 3 December 2012
Transport Link Management Implicit configuration
Overview about Transport links
....................................................................................................................................................................................................................................

Implicit configuration
Uploaded parameters
At creation time, for a local (or not) Link Over TDM, an implicit configuration is
performed.
For each SNMP extremity of the Link Over TDM, the following TDM termination
characteristics are uploaded from the NE:
• Protocol Type.
• Client Type.
• Effective Bandwidth.
• Activation Status.
According to the uploaded values, the implicit configuration is done.

Non-SNMP NE or not active extremities.


If both extremities are not active or if at least one extremity is not SNMP, the Link Over
TDM is updated as follow:
• Client Type is set to ETS.
• Manager Control is set to enabled.
• Protocol Type.
is set to:
– HDLC if Link Over TDM Supported Layer is MPLS.
– GFP or LAPS according to 1350 OMS PKT configuration file if both extremities
are ES cards.
– GFP in any other case.
• Consistency State is set to consistent.

Active extremities and bandwidth compliant.


If extremities are activated with the same characteristics and effective bandwidth matches
the computed one, the Link is updated as follow:
• Client Type is the same as TDM terminations Client Type.
• Manager Control is set to enabled. If Client Type is ETS. Otherwise, Manager
Control is disabled.
• Protocol Type is the same as TDM termination Protocol Type.
• Consistency State is set to consistent.

....................................................................................................................................................................................................................................
14-14 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Transport Link Management Implicit configuration
Overview about Transport links
....................................................................................................................................................................................................................................
Any other cases.
In any other cases, the Link Over TDM is updated as follow:
• Client Type is set to:
– if the problem is linked to the Client Type, Client Type is set to undefined value.
– in any other case, Client Type is set as TDM terminations Client Type.
• Manager Control is set to disabled.
• Protocol Type is set to:
– if the problem is linked to the Protocol Type, Protocol Type is set to undefined
value.
– in any other case, Protocol Type is set as TDM terminations Protocol Type.
• Consistency State is set to not consistent.

SNMP NE and Manager enabled.


If the Link Over TDM has at least one extremity on an SNMP NE and Manager Control
is enabled, the following operations are performed in the management domain:
• A configuration, and then an activation request, is sent on each TDM termination, at
extremities.
The configuration request specifies:
– Bandwidth (in bit/s).
– Technology (SDH, P-CONC, V-CONC).
– Supported Layer (Ethernet, MPLS).
– Protocol Type (HDLC, GFP or LAPS).

ETB and Manager disabled.


If the Link Over TDM Client Type is ETB and Manager Control is disabled, a
configuration request is sent on each TDM termination, at extremities. No activation is
done in this case.
The configuration request specifies:
• Bandwidth (in bit/s).
• Technology (SDH, P-CONC, V-CONC).
• Supported Layer (Ethernet, MPLS).
• Protocol Type (HDLC, GFP or LAPS).

....................................................................................................................................................................................................................................
1350 OMS 14-15
8DG42227DAAA 9.6
Issue 3 December 2012
Transport Link Management Implicit configuration
Overview about Transport links
....................................................................................................................................................................................................................................
Configuration phase results.
The implicit configuration ends with the following results:
• If the Manager control is enabled and the Link Over TDM is used to carry traffic in
the management domain, the configuration is refused.
• If the Manager control is enabled and the Link Over TDM is not used in the
management domain: the related Transport Link in Ethernet or MPLS management
domain is deactivated, a request is sent to NE at extremities to deactivate the related
SNMP interfaces. Then the manager control becomes disabled and the required
modifications are applied.
• If the Manager control is disabled the required modifications are applied directly.
When the required modifications have been applied:
• If the Client Type is ETB:
the Manager control remains disabled, and a configuration request is sent on each
TDM termination, at extremities. No activation is done.
• In the other cases:
the Manager control becomes enabled, and the related Transport link in the Ethernet
or MPLS management domain is configured and activated (a request is sent to NE at
extremities to configure and activate the related SNMP interfaces).

....................................................................................................................................................................................................................................
14-16 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Transport Link Management Overview
Managing Links Over TDM
....................................................................................................................................................................................................................................

Managing Links Over TDM

Overview
Purpose
This section describes the management of the link over TDM in PKT envirnment.

Contents

Introduction 14-18
View the list of Links Over TDM 14-19
Create Link Over TDM 14-21
Delete a Link Over TDM 14-24
Configure a Link Over TDM 14-25
Get the Link Over TDM Extremities 14-27
Remove inconsistent TDM paths 14-29
Assign a Link Over TDM to a Domain 14-30
Deassign a Link Over TDM from a Domain 14-31
Assign NAccess Domain 14-32
View the details of the Links Over TDM 14-34
Get the Fault Localization 14-36

....................................................................................................................................................................................................................................
1350 OMS 14-17
8DG42227DAAA 9.6
Issue 3 December 2012
Transport Link Management Introduction
Managing Links Over TDM
....................................................................................................................................................................................................................................

Introduction
Description
The Link Over TDM is supported by an SDH path.. It carries directly Ethernet Segments
or VC-LSPs: The supported layer is Ethernet or MPLS.

....................................................................................................................................................................................................................................
14-18 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Transport Link Management View the list of Links Over TDM
Managing Links Over TDM
....................................................................................................................................................................................................................................

View the list of Links Over TDM


When to use
The Link Over TDM List presents all Links Over TDM and their attributes.

Related information
For information about Transport Link, see: “Overview about Transport links ” (p. 14-4).

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.

Task
From MS-GUI main window:
...................................................................................................................................................................................................

1 Select Search > Packet > Construction.


Result: The Construction menu is shown.
...................................................................................................................................................................................................

2 Select Link Over TDM.


Result: The list window is shown.
The attributes displayed for each Link Over TDM are:
• User Label.
• Parent Subnetwork.
• Bandwidth (in Kbit/s) (value 0 means that the 1350 OMS SDH Transmission path
is not Commissioned).
• Supported Layer (Ethernet, MPLS).
• Working State (Normal,Modifying).
• Availability Status (Normal, In Failure).
• Consistency State (Consistent, Not Consistent).
• Manager Control (Enabled, Disabled).
• Client Type (ETS, ETB).
• Protocol Type (GFP, LAPS, HDLC).

....................................................................................................................................................................................................................................
1350 OMS 14-19
8DG42227DAAA 9.6
Issue 3 December 2012
Transport Link Management View the list of Links Over TDM
Managing Links Over TDM
....................................................................................................................................................................................................................................
• Interface Type.
• NAD (UNI, NNI).

E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
14-20 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Transport Link Management Create Link Over TDM
Managing Links Over TDM
....................................................................................................................................................................................................................................

Create Link Over TDM


When to use
This function defines a Link Over TDM

Related information
This function can be fulfilled in two different ways:
• if the NEs are managed by the 1350 OMS SDH.
• if the NEs are not managed by the 1350 OMS SDH.
For information about Transport Link, see: “Overview about Transport links ” (p. 14-4).
For information about how to set parameters, see: “Relation among Transport Links
attributes and board releases” (p. 14-13).
For information about how parameters are set after creation, see: “Uploaded parameters”
(p. 14-14).

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Conditions
To get a positive result:
• The NEs concerned by the Link Over TDM must be managed by the 1350 OMS SDH.
• The NEs concerned by the Link Over TDM must be not locked (that is audit,
alignment, reserve are not in progress).
• The LAC state of NEs concerned by the Link Over TDM must not be granted.
• The TDM termination of each NE must not be busy.
• The Extremity A or Z must not be locked. The audit, alignment, reserve are not in
progress on the NE.
• In the creation window, the TDM terminations must be compliant with the Link Over
TDM. Check the following parameters: Supported layer, bit rate, concatenation
rate, and concatenation level.

Task (NE managed by 1350 OMS SDH)


From MS-GUI main window:
...................................................................................................................................................................................................

1 Select Action > Packet > Construction > Create Link Over TDM.

....................................................................................................................................................................................................................................
1350 OMS 14-21
8DG42227DAAA 9.6
Issue 3 December 2012
Transport Link Management Create Link Over TDM
Managing Links Over TDM
....................................................................................................................................................................................................................................
Result: The Link Over TDM window is displayed.

Figure 14-8 SDH Path Creation window

....................................................................................................................................................................................................................................
14-22 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Transport Link Management Create Link Over TDM
Managing Links Over TDM
....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

2 To create a Link Over TDM (between two NEs managed by the 1350 OMS SDH):
• Select the Extremity A by using the sensitive help.
• Select the Extremity A Termination by using the sensitive help. Only the
terminations with usage state equal to Idle are proposed.
• Select the Extremity Z by using the sensitive help.
• Select the Extremity Z Termination by using the sensitive help. Only the
terminations with usage state equal to Idle are proposed.
• Choose the Supported Layer (Ethernet or MPLS).
• Choose the Transport Concatenation Rate (VC_12, VC_3, VC_4).
• Enter the Concatenation level (priority which allows to increase the flexibility of
SDH bandwidth management from 0 to 63).
• Choose the Bit Rate (1G_Rate_adaptive, 1G_Transparent, 10 MB, 100 MB,
2_MB_LO, 34_MB_LO, 140_MB_HO).
...................................................................................................................................................................................................

3 Click Ok.
Result: Then, the SDH path creation window is displayed using the required NEs.
The user can execute the required SDH path creation operation.
...................................................................................................................................................................................................

4 Click Ok.
Result: Then, the 1350 OMS PKT computes the effective bandwidth and creates the
Link Over TDM inside its database.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS 14-23
8DG42227DAAA 9.6
Issue 3 December 2012
Transport Link Management Delete a Link Over TDM
Managing Links Over TDM
....................................................................................................................................................................................................................................

Delete a Link Over TDM


When to use
This function removes a Link Over TDM from the 1350 OMS PKT supervision.

Related information
For information about Transport Link, see: “Overview about Transport links ” (p. 14-4).
If the Manager Control is Disabled, the deletion is authorized.
If the Manager Control is Enabled, the usage state must be idle.

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.

Task
From MS-GUI main window:
...................................................................................................................................................................................................

1 Select Search > Packet > Construction > Transport Links > Links Over TDM.
Result: The list window is shown.
...................................................................................................................................................................................................

2 Select one or more items in the list.


...................................................................................................................................................................................................

3 Select Action > Links Over TDM > Delete or right-click the mouse and Select Delete.
...................................................................................................................................................................................................

4 Select one of the options in the confirmation box. Refer to the procedure “Confirm the
action” (p. 11-40).
Result: After confirmation, the working state of the concerned Links Over Cable is
set to removing.
The Links Over TDM are removed.
The ports usage state are set to Idle.
The Links Over TDM List and the opened graphical views are updated.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
14-24 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Transport Link Management Configure a Link Over TDM
Managing Links Over TDM
....................................................................................................................................................................................................................................

Configure a Link Over TDM


When to use
This function consists in configuring a Link Over TDM.

Related information
If both extremities are ES16, supported Layer is configured instead of Client Type.
Configuration is accomplished by setting the Client Type and Protocol Type.
This function is used when the user needs to modify the Client Type (or Supported
Layer), and Protocol Type.
This function is used also when a Link Over TDM has its manager control disabled, to
make it operational.
For information about Transport Link, see: “Overview about Transport links ” (p. 14-4).
For information about how to set parameters, see: “Relation among Transport Links
attributes and board releases” (p. 14-13).
For information about configuration process, see: “Configuration phase results.”
(p. 14-16).

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Conditions
To get a positive result:
• The Link Over TDM must be between two ES boards.

Task
From MS-GUI main window:
...................................................................................................................................................................................................

1 Select Search > Packet > Construction > Link Over TDM.
Result: The list window is shown.
...................................................................................................................................................................................................

2 Select one item in the list.


...................................................................................................................................................................................................

3 Select Action > Link Over TDM > Configure.

....................................................................................................................................................................................................................................
1350 OMS 14-25
8DG42227DAAA 9.6
Issue 3 December 2012
Transport Link Management Configure a Link Over TDM
Managing Links Over TDM
....................................................................................................................................................................................................................................
Result:

Figure 14-9 Link Over TDM Configuration window

...................................................................................................................................................................................................

4 To configure a Link Over TDM:


• I f both extremities are ES16 boards: choose the Client Type (None, ETS or ETB) or
the Supported Layer (Ethernet, MPLS).
• Choose the Protocol Type (GFP (Ethernet), LAPS (Ethernet), HDLC (MPLS)).
...................................................................................................................................................................................................

5 Click Ok.
Result: The working state is set to configuring.
Then, the Links Over TDM list view is updated with the new Client Type and
Protocol Type values. The working state is set to Normal.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
14-26 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Transport Link Management Get the Link Over TDM Extremities
Managing Links Over TDM
....................................................................................................................................................................................................................................

Get the Link Over TDM Extremities


When to use
This function gets information about extremities of a Link Over TDM.

Related information
For information about Transport Link, see: “Overview about Transport links ” (p. 14-4).

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.

Task
From MS-GUI main window:
...................................................................................................................................................................................................

1 Select Search > Packet > Construction > Link Over TDM.
Result: The list window is shown.
...................................................................................................................................................................................................

2 Select one item in the list.


...................................................................................................................................................................................................

3 Select Search > Inventory from Link Over TDM > Extremities.
Result: The list window is displayed.
The attributes displayed for each object are:
• Link Over TDM User Label.
• Supported Layer.
• Effective Bandwidth.
• Extremity Z Type.
• Extremity A.
• Extremity A Termination User Label.
• Extremity A Termination ID.
• Extremity A Termination ID description.
• Extremity Z.
• Extremity Z Termination User Label.

....................................................................................................................................................................................................................................
1350 OMS 14-27
8DG42227DAAA 9.6
Issue 3 December 2012
Transport Link Management Get the Link Over TDM Extremities
Managing Links Over TDM
....................................................................................................................................................................................................................................
• Extremity Z Termination ID.
• Extremity Z Termination ID description.

E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
14-28 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Transport Link Management Remove inconsistent TDM paths
Managing Links Over TDM
....................................................................................................................................................................................................................................

Remove inconsistent TDM paths


When to use
This function removes inconsistent TDM Path.

Related information
For information about Transport Link, see: “Overview about Transport links ” (p. 14-4).

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.

Task
From MS-GUI main window:
...................................................................................................................................................................................................

1 Select Search > Packet > Construction > Transport Links > Links Over TDM.
Result: The list window is shown.
...................................................................................................................................................................................................

2 Select one or more items in the list.


...................................................................................................................................................................................................

3 Select Action > Links Over TDM > Remove Inconsistent TDM Path or right-click the
mouse and Select Remove Inconsistent TDM Path.
...................................................................................................................................................................................................

4 Select one of the options in the confirmation box. Refer to the procedure “Confirm the
action” (p. 11-40).
Result: The Inconsistent TDM Paths are removed.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS 14-29
8DG42227DAAA 9.6
Issue 3 December 2012
Transport Link Management Assign a Link Over TDM to a Domain
Managing Links Over TDM
....................................................................................................................................................................................................................................

Assign a Link Over TDM to a Domain


When to use
The function assigns a Links Over TDM to a Domain.

Related information
For information about Transport Link, see: “Overview about Transport links ” (p. 14-4).
For a description about Domains, refer to the topic “Overview about Domains”
(p. 13-15).

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.

Task
From MS-GUI main window:
...................................................................................................................................................................................................

1 Select Search > Packet > Construction > Transport Links > Links Over TDM.
Result: The list window is shown.
...................................................................................................................................................................................................

2 Select an item in the list.


...................................................................................................................................................................................................

3 Select Action > Links Over TDM > Assign Resources to Domain.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
14-30 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Transport Link Management Deassign a Link Over TDM from a Domain
Managing Links Over TDM
....................................................................................................................................................................................................................................

Deassign a Link Over TDM from a Domain


When to use
The function deassigns a Links Over TDM from a Domain.

Related information
For information about Transport Link, see: “Overview about Transport links ” (p. 14-4).
For a description about Domains, refer to the topic “Overview about Domains”
(p. 13-15).

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.

Task
From MS-GUI main window:
...................................................................................................................................................................................................

1 Select Search > Packet > Construction > Transport Links > Links Over TDM.
Result: The list window is shown.
...................................................................................................................................................................................................

2 Select an item in the list.


...................................................................................................................................................................................................

3 Select Action > Links Over TDM > Deassign Resources from Domain.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS 14-31
8DG42227DAAA 9.6
Issue 3 December 2012
Transport Link Management Assign NAccess Domain
Managing Links Over TDM
....................................................................................................................................................................................................................................

Assign NAccess Domain


When to use
This function allows to assign a specific Network Access Domain (NAD) value to a Link
Over TDM.

Related information
For information about Transport Link, see: “Overview about Transport links ” (p. 14-4).
For details about Network Access Domain“User Profile Management” (p. 11-71).

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.

Task
From MS-GUI main window:
...................................................................................................................................................................................................

1 Select Search > Packet > Construction > Link Over TDM.
Result: The list window is shown.
...................................................................................................................................................................................................

2 Select one item in the list.


...................................................................................................................................................................................................

3 Select Action > Link Over TDM > Assign NAD.

....................................................................................................................................................................................................................................
14-32 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Transport Link Management Assign NAccess Domain
Managing Links Over TDM
....................................................................................................................................................................................................................................
Result:

Figure 14-10 Assign NAD window

...................................................................................................................................................................................................

4 To assign a NAD value to the selected Link Over TDM:


• Choose the NAD Value from the list on the left side of the window.
• Type the Nad Value in the NAD column separated by comma.
...................................................................................................................................................................................................

5 Click Ok.
Result: The NAD value is assigned to the Link Over TDM, more than one value can
be assigned to a link.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS 14-33
8DG42227DAAA 9.6
Issue 3 December 2012
Transport Link Management View the details of the Links Over TDM
Managing Links Over TDM
....................................................................................................................................................................................................................................

View the details of the Links Over TDM


When to use
This function gets information about a Link Over TDM..

Related information
For information about Transport Link, see: “Overview about Transport links ” (p. 14-4).

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.

Task
From MS-GUI main window:
...................................................................................................................................................................................................

1 Select Search > Packet > Construction > Link Over TDM.
Result: The list window is shown.
...................................................................................................................................................................................................

2 Select one item in the list.


...................................................................................................................................................................................................

3 Select Search > Link Over TDM > Properties or Click the third key of the mouse and
select Properties.
Result: The Link Over TDM properties window is displayed.
The attributes displayed for each Link Over TDM are:
• User Label.
• Parent Subnetwork.
• Parent Domain.
• Bandwidth (in Kbit/s) (value 0 means that the 1350 OMS SDH Transmission path
is not Commissioned).
• Supported Layer (Ethernet, MPLS).
• Directionality.
• Concatenation Level.
• Transport Concatenation Rate.
• Reliability Level.
• Working State (Normal, Modifying, …).

....................................................................................................................................................................................................................................
14-34 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Transport Link Management View the details of the Links Over TDM
Managing Links Over TDM
....................................................................................................................................................................................................................................
• Availability Status (Normal, In Failure).
• Consistency State (Consistent, Not Consistent).
• Manager Control (Enabled, Disabled).
• Provisioning State.
• Comment.
• Last Action Date.
• Last Action Type.
• Client Type (ETS, ETB).
• Protocol Type (GFP, LAPS, HDLC).
• Interface Type.
• NADs (UNI, NNI).

E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS 14-35
8DG42227DAAA 9.6
Issue 3 December 2012
Transport Link Management Get the Fault Localization
Managing Links Over TDM
....................................................................................................................................................................................................................................

Get the Fault Localization


When to use
This function gets information about the Fault Localization of a Link Over TDM.

Related information
For information about Transport Link, see: “Overview about Transport links ” (p. 14-4).
For details about Fault Localization, see: “Fault Localization” (p. 11-69).

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.

Task
From MS-GUI main window:
...................................................................................................................................................................................................

1 Select Search > Packet > Construction > Link Over TDM.
Result: The list window is shown.
...................................................................................................................................................................................................

2 Select one item in the list.


...................................................................................................................................................................................................

3 Select Search > Fault Localization.


Result: The list window of Fault Localization is displayed.
The attributes displayed for each object are:
• User Label.
• Entity Type.
• Alarm Status.
• Entity Event Date.
• Probable Cause.
• Operator
• Link User.
• Last Refresh.

....................................................................................................................................................................................................................................
14-36 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Transport Link Management Get the Fault Localization
Managing Links Over TDM
....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

4 Selecting an entity from the list, the user can navigate to the alarmed equipment port or
the FM list.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS 14-37
8DG42227DAAA 9.6
Issue 3 December 2012
Transport Link Management Overview about Link Over Cables
Managing Links Over Cable
....................................................................................................................................................................................................................................

Managing Links Over Cable

Overview about Link Over Cables


Link Over Cable definition
Is called Link over Cable, the way to connect two Ethernet ports without using the SDH
layer.

Classification of Links Over Cable


The following different cases can be considered:
1. A Link Over Cable between a PR EA NE or ES16 and an ENE with a role set to inner
equipment.
In this case:
• The Supported Layer of the Link Over Cable could be MPLS or Ethernet.
• The type of the Link Over Cable is called internal.
2. A Link Over Cable between an E/FE/GE NE and an ENE with a role set to inner
equipment.
In this case:
• The Supported Layer of the Link Over Cable is always Ethernet.
• The type of the Link Over Cable is called internal.
3. A Link Over Cable between any type of NE and an ENE with a role set to customer
edge. The ENE represents a Customer Edge, which is outside the managed domain.
In this case:
• The Supported Layer of the Link Over Cable is always Ethernet.
• The type of the Link Over Cable is called external.
• The creation of an external Link Over Cable is optional because this type of Link
Over Cable is only used by the graphic view.
If the supported layer of the created Link Over Cable is MPLS, it appears also in
Transport Link List of MPLS GUI.
If the supported layer of the created Link Over Cable is Ethernet, it appears also in
Transport Link List of Ethernet Management GUI.
If the ENE has a role Inner Equipment, then the Link Over Cable type is internal, else the
Link Over Cable type is external.
For a not terminated Link Over Cable, if the ENE role is Customer Edge, the Link Over
Cable interface type is UNI (external cable). An external Link Over Cable is always
managed locally by the construction domain. The aim is to present the Customer edge
equipment connected to the managed domain.

....................................................................................................................................................................................................................................
14-38 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Transport Link Management Overview about Link Over Cables
Managing Links Over Cable
....................................................................................................................................................................................................................................
For both, terminated or not terminated Link Over Cable, the Link Over Cable type is NNI
or IWI. Terminated Link Over Cables are also called internal cable. Not terminated Link
Over Cable has Inner ENE or P-VLAN network.
For a not terminated Link Over Cable, the ETP Interface rate is deduced from the port
characteristics at the other extremity. The ETP Interface rate can be: 10 Mbit/s, 100
Mbit/s, 1 Gbit/s.

Links Over Cable creation details


.
Calculated information
The Link Over Cable is created with its given characteristics and the following
information is calculated:
• Type according to the role of ENE at the extremity (external if ENE role is customer
edge or internal if ENE role is inner equipment).
• The working state is set to Normal.
Status for Internal Link Over Cable
If Link Over Cable type is internal:
• Depending on alarm presence on the port, Availability status is set to Normal, In
Failure, or Degraded.
• If Client Type is ETS, Manager Control is set to Enabled.
• If Client Type is ETB, Manager Control is set to Disabled.
• Ethernet portusage state and ETP usage state are set to Busy.
Status for external Link Over Cable
If Link Over Cable type is external:
• Availability status is set to Not Meaningful.
• Manager Control is set to Disabled.
• ETP Usage States is set to Busy.
When the process fails
The process fails in the following cases:
• The Manager Control of port at the extremity of an external Link Over Cable is
disabled.
• The Manager Control of port at the extremity of an internal Link Over Cable is
enabled.
• The Bit rate of port is not equal to the Bit rate entered for the Link Over Cable.
• The Supported Layer of port is not equal to the Supported Layer of the Link Over
Cable.

....................................................................................................................................................................................................................................
1350 OMS 14-39
8DG42227DAAA 9.6
Issue 3 December 2012
Transport Link Management Overview about Link Over Cables
Managing Links Over Cable
....................................................................................................................................................................................................................................
• An external Link Over Cable could not have an MPLS Supported Layer (ENE role
not compliant).
• A Link Over Cable terminated on E/FE/GE NE could not have an MPLS Supported
Layer.

....................................................................................................................................................................................................................................
14-40 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Transport Link Management View the list of Links Over Cables
Managing Links Over Cable
....................................................................................................................................................................................................................................

View the list of Links Over Cables


When to use
The Link Over Cable List window presents all Links Over Cable and their attributes.

Related information
For information about Transport Link, see: “Overview about Transport links ” (p. 14-4).

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.

Task
From MS-GUI main window:
...................................................................................................................................................................................................

1 Select Search > Packet > Construction.


Result: The Construction menu is displayed.
...................................................................................................................................................................................................

2 Select Link Over Cable.


Result: The Link Over Cable list window is displayed.
The attributes displayed for each Link Over Cable are:
• User Label.
• Parent Subnetwork.
• Bit Rate.
• Supported Layer (Ethernet, MPLS).
• Working State.
• Availability Status (Normal, In Failure).
• Manager Control (Enabled, Disabled).
• Client Type (ETS, ETB).

E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS 14-41
8DG42227DAAA 9.6
Issue 3 December 2012
Transport Link Management Create a Link Over Cable
Managing Links Over Cable
....................................................................................................................................................................................................................................

Create a Link Over Cable


When to use
This function defines a Link Over Cable.

Related information
For information about Transport Link, see: “Overview about Transport links ” (p. 14-4).
For more information about creation, see: “Links Over Cable creation details” (p. 14-39).
Important! If the user plans to expand a physical connection by a LAG, not to lose
traffic, the user must create the connection as a LAG with at least one link. Refer to
“Create a LAG Link Over Cable from Links” (p. 14-66) or refer to “Create a LAG
Link Over Cable from extremities” (p. 14-63).

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Conditions
To get a positive result:
• The NE must not be isolated, not locked and LAC state must not be granted.
• The usage state of the Ethernet physical port of the NE must be idle.
• If the supported layer of the port is Ethernet, the Manager Control of the Ethernet
physical port of the NE must be enabled.
• If the supported layer of the port is MPLS, the Manager Control of the Ethernet
physical port of the NE must be disabled.
• The Usage State of the ETP of the ENE must be idle.
• The Manager Control of the selected ETP must be disabled.
• The Supported Layer of the Link Over Cable must be compatible with the one of the
chosen physical port and with the role of the chosen ENE.
• The User Label must be different as one which is already used by another Link Over
Cable.

Task
From MS-GUI main window:
...................................................................................................................................................................................................

1 Select Action > Packet > Construction > Create Link Over Cable.

....................................................................................................................................................................................................................................
14-42 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Transport Link Management Create a Link Over Cable
Managing Links Over Cable
....................................................................................................................................................................................................................................
Result: The Link Over Cable creation window is displayed.
...................................................................................................................................................................................................

2 To create a Link Over Cable:


• Enter a Link User Label.
• Enter a Comment (optional).
• Select the NE User Label (A) from the available NE list.
• Then, select the Port User Label (A) of the NE from the available port list.
• Select the Extremity User Label (Z) from the available NE list.
If the selected NE is an External NE then:
– Only the ENEs that are compatible with the NE port are displayed: if the NE
extremity has its Manager Control Disabled, only Inner Equipment ENEs are
displayed. If the NE extremity has its Manager Control Enabled, only Customer
Edge ENEs are displayed.
– The ETP (Z) (External Termination Point) field is enabled, select the ETP of the
ENE from the available ETP list.
If the selected NE is a defined Network Element
– Select the Port User Label (Z) (External Termination Point) of the NE from the
available port list.
...................................................................................................................................................................................................

3 Click Ok.
Result: At the beginning of the operation, the working state is set to Creating.
The Link Over Cable List and the opened graphical views are updated.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS 14-43
8DG42227DAAA 9.6
Issue 3 December 2012
Transport Link Management Modify a Link Over Cable
Managing Links Over Cable
....................................................................................................................................................................................................................................

Modify a Link Over Cable


When to use
The function modifies Link Over Cable characteristics.

Related information
The Link Over Cable modification gives the possibility to modify:
• Link Over Cable User Label.
• Comment.
For information about Transport Link, see: “Overview about Transport links ” (p. 14-4).

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Conditions
To get a positive result:
• If the User Label is modified, the new User Label must be different from any other in
use by Link Over Cable.

Task
From MS-GUI main window:
...................................................................................................................................................................................................

1 Select Search > Packet > Construction > Links Over Cable.
Result: The list window is shown.
...................................................................................................................................................................................................

2 Select one or more items in the list.


...................................................................................................................................................................................................

3 Select Action > Links Over Cable > Modify.

....................................................................................................................................................................................................................................
14-44 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Transport Link Management Modify a Link Over Cable
Managing Links Over Cable
....................................................................................................................................................................................................................................
Result: The Link Over Cable modification window is displayed.

Figure 14-11 Link Over Cable Modification window

...................................................................................................................................................................................................

4 To modify a Link Over Cable:


• Enter a New User Label (optional).
• Modify the Comment (optional).
...................................................................................................................................................................................................

5 Select OK.
Result: At the beginning of the operation, the working state of the concerned Link
Over Cable is set to Modifying.
If the User Label is modified, the corresponding Transport Link in (Ethernet domain
or in MPLS domain) is modified too.
At the end of the operation, the working state is set to Normal.
The Link Over Cable List and the opened graphical views are updated.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS 14-45
8DG42227DAAA 9.6
Issue 3 December 2012
Transport Link Management Delete a Link Over Cable
Managing Links Over Cable
....................................................................................................................................................................................................................................

Delete a Link Over Cable


When to use
This function consists in deleting a Link Over Cable from the 1350 OMS PKT
supervision.

Related information
For information about Transport Link, see: “Overview about Transport links ” (p. 14-4).

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Conditions
To get a positive result:
• The corresponding Ethernet Transport Link or MPLS Transport Link usage state
must be idle.

Task
From MS-GUI main window:
...................................................................................................................................................................................................

1 Select Search > Packet > Construction > Links Over Cable.
Result: The list window is shown.
...................................................................................................................................................................................................

2 Select one or more items in the list.


...................................................................................................................................................................................................

3 Select Action > Links Over Cable > Delete or right-click the mouse and Select Delete.
...................................................................................................................................................................................................

4 Select one of the options in the confirmation box. Refer to the procedure “Confirm the
action” (p. 11-40).
Result: After confirmation, the working state of the concerned Links Over Cable is
set to removing.
If the Manager Control is Disabled, the deletion is authorized.

....................................................................................................................................................................................................................................
14-46 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Transport Link Management Delete a Link Over Cable
Managing Links Over Cable
....................................................................................................................................................................................................................................
If the Manager Control is Enabled, the usage of the corresponding Transport Link (in
Ethernet Management domain or in MPLS domain) is checked. If Ethernet Segments
or VC-LSP are carried by Transport Link, the deletion is refused. In other case, the
corresponding Ethernet Transport Link or MPLS Transport Link must be deleted
before the Link Over Cable.
Then, the Links Over Cable are removed. If the Link Over Cable is internal then the
port usage state is set to Idle.
The Links Over Cable List and the opened graphical views are updated.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS 14-47
8DG42227DAAA 9.6
Issue 3 December 2012
Transport Link Management Get the Link Over Cable extremities
Managing Links Over Cable
....................................................................................................................................................................................................................................

Get the Link Over Cable extremities


When to use
This function gets information about the extremities of a Link Over Cable.

Related information
For information about Transport Link, see: “Overview about Transport links ” (p. 14-4).

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.

Task
From MS-GUI main window:
...................................................................................................................................................................................................

1 Select Search > Packet > Construction > Links Over Cable.
Result: The list window is shown.
...................................................................................................................................................................................................

2 Select one or more items in the list.


...................................................................................................................................................................................................

3 Select Search > Inventory from Link Over Cable > Extremities.
Result: The list window is displayed.
The attributes displayed for each object are:
• User Label .
• Supported Layer.
• NE User Label (A).
• Port User Label (A).

....................................................................................................................................................................................................................................
14-48 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Transport Link Management Get the Link Over Cable extremities
Managing Links Over Cable
....................................................................................................................................................................................................................................
• ENE User Label (Z).
• ETP(Z).

Figure 14-12 Link Over Cable Extremities window

E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS 14-49
8DG42227DAAA 9.6
Issue 3 December 2012
Transport Link Management View the details of the Link Over Cables
Managing Links Over Cable
....................................................................................................................................................................................................................................

View the details of the Link Over Cables


When to use
This function gets information about the Link Over Cable.

Related information
For information about Transport Link, see: “Overview about Transport links ” (p. 14-4).

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.

Task
From MS-GUI main window:
...................................................................................................................................................................................................

1 Select Search > Packet > Construction > Links Over Cable.
Result: The list window is shown.
...................................................................................................................................................................................................

2 Select one or more items in the list.


...................................................................................................................................................................................................

3 Select Search > Inventory from Link Over Cable > Properties or click the third key of
the mouse then select Properties.
Result: The Link Over Cable properties window is displayed.
The attributes displayed for each Link Over Cable are:
• User Label.
• Parent Subnetwork.
• Comment.
• Bit Rate.
• Client Type (ETS, ETB).
• Supported Layer (Ethernet, MPLS).
• Working State.
• Availability Status (Normal, In Failure).
• Manager Control (Enabled, Disabled).

....................................................................................................................................................................................................................................
14-50 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Transport Link Management View the details of the Link Over Cables
Managing Links Over Cable
....................................................................................................................................................................................................................................
• Last Action Date.
• Last Action Type.

E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS 14-51
8DG42227DAAA 9.6
Issue 3 December 2012
Transport Link Management Link Over Cable Split/Join
Managing Links Over Cable
....................................................................................................................................................................................................................................

Link Over Cable Split/Join


When to use
This function Joins or Splits Link Over Cable.

Related information
Join operation removes the two specified Links Over Cable and create a new link.
Split operation removes the specified Link Over Cable and creates two new links.
For information about configuration, see: “Configure Split/Join” (p. 14-54).
For information about Transport Link, see: “Overview about Transport links ” (p. 14-4).

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.

Task
From MS-GUI main window:
...................................................................................................................................................................................................

1 Select Search > Packet > Construction > Links Over Cable.
Result: The list window is shown.
...................................................................................................................................................................................................

2 Select one item in the list and select Action > Split/Join > Start Join.

....................................................................................................................................................................................................................................
14-52 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Transport Link Management Link Over Cable Split/Join
Managing Links Over Cable
....................................................................................................................................................................................................................................
Result: The Start Join window is displayed.

Figure 14-13 Start Join window

...................................................................................................................................................................................................

3 To join Link Over Cables:


• Select a Network Element to Remove (Optional) from list.
• Select the First Link Over Cable from list.
• Select the Second Link Over Cable from list.
...................................................................................................................................................................................................

4 Click Ok.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS 14-53
8DG42227DAAA 9.6
Issue 3 December 2012
Transport Link Management Configure Split/Join
Managing Links Over Cable
....................................................................................................................................................................................................................................

Configure Split/Join
When to use
This function configures Split/Join operation for Links Over Cable.

Related information
The configuration supplies information needed to create the new links.
For information about configuration, see: “Configure Split/Join” (p. 14-54).
For information about Transport Link, see: “Overview about Transport links ” (p. 14-4).

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.

Task
From MS-GUI main window:
...................................................................................................................................................................................................

1 Select Search > Packet > Construction > Links Over Cable.
Result: The list window is shown.
...................................................................................................................................................................................................

2 Select one item in the list and select Action > Split/Join > Configure Split.

....................................................................................................................................................................................................................................
14-54 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Transport Link Management Configure Split/Join
Managing Links Over Cable
....................................................................................................................................................................................................................................
Result: The Configure Split window is displayed.

Figure 14-14 Configure Split window

...................................................................................................................................................................................................

3 To Configure Split:
• Select the Link Over Cable to Remove from list.
• Select the Network Element to Insert from list.

....................................................................................................................................................................................................................................
1350 OMS 14-55
8DG42227DAAA 9.6
Issue 3 December 2012
Transport Link Management Configure Split/Join
Managing Links Over Cable
....................................................................................................................................................................................................................................
• For the First Link Over Cable:
– Insert the User Label.
– Insert the Comment (Optional).
– Insert the First Port.
– Insert the First Port Role (A Port, Z Port.
– Insert the Second Port.
• For the Second Link Over Cable:
– Insert the User Label.
– Insert the Comment (Optional).
– Insert the First Port.
– Insert the First Port Role (A Port, Z Port.
– Insert the Second Port.
...................................................................................................................................................................................................

4 Click Ok.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
14-56 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Transport Link Management Configure a Link Over Cable
Managing Links Over Cable
....................................................................................................................................................................................................................................

Configure a Link Over Cable


When to use
This function consists in configuring a Link Over Cable.

Related information
For information about Transport Link, see: “Overview about Transport links ” (p. 14-4).
For information about how to set parameters, see: “Relation among Transport Links
attributes and board releases” (p. 14-13).
For information about configuration process, see: “Configuration phase results.”
(p. 14-16).

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.

Task
From MS-GUI main window:
...................................................................................................................................................................................................

1 Select Search > Packet > Construction > Link Over Cable.
Result: The list window is shown.
...................................................................................................................................................................................................

2 Select one item in the list.


...................................................................................................................................................................................................

3 Select Action > Link Over Cable > Configure.


Result: The configuration wizard starts.
...................................................................................................................................................................................................

4 Click Ok.
Result: The working state is set to configuring.
Then, the Links Over Cable list view is updated with the new Client Type and
Protocol Type values. The working state is set to Normal.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS 14-57
8DG42227DAAA 9.6
Issue 3 December 2012
Transport Link Management Assign NAD
Managing Links Over Cable
....................................................................................................................................................................................................................................

Assign NAD
When to use
This function allows to assign a specific Network Access Domain (NAD) value to a Link
Over Cable.

Related information
For information about Transport Link, see: “Overview about Transport links ” (p. 14-4).
For details about Network Access Domain“User Profile Management” (p. 11-71).

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.

Task
From MS-GUI main window:
...................................................................................................................................................................................................

1 Select Search > Packet > Construction > Link Over Cable.
Result: The list window is shown.
...................................................................................................................................................................................................

2 Select one item in the list.


...................................................................................................................................................................................................

3 Select Action > Link Over Cable > Assign NAD.


Result: The wizard starts.
...................................................................................................................................................................................................

4 To assign a NAD value to the selected Link Over TDM:


• Choose the NAD Value from the list on the left side of the window.
• Type the Nad Value in the NAD column separated by comma.
...................................................................................................................................................................................................

5 Click Ok.
Result: The NAD value is assigned to the Link Over Cable, more than one value can
be assigned to a link.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
14-58 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Transport Link Management Get the Fault Localization
Managing Links Over Cable
....................................................................................................................................................................................................................................

Get the Fault Localization


When to use
This function gets information about the Fault Localization of a Link Over Cable.

Related information
For information about Transport Link, see: “Overview about Transport links ” (p. 14-4).
For details about Fault Localization, see: “Fault Localization” (p. 11-69).

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.

Task
From MS-GUI main window:
...................................................................................................................................................................................................

1 Select Search > Packet > Construction > Transport Link >Link Over Cable.
Result: The list window is shown.
...................................................................................................................................................................................................

2 Select one item in the list.


...................................................................................................................................................................................................

3 Select Search > Fault Localization.


Result: The list window of Fault Localization is displayed.
...................................................................................................................................................................................................

4 Selecting an entity from the list, the user can navigate to the alarmed equipment port or
the FM list.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS 14-59
8DG42227DAAA 9.6
Issue 3 December 2012
Transport Link Management Assign a Link Over Cable to a Domain
Managing Links Over Cable
....................................................................................................................................................................................................................................

Assign a Link Over Cable to a Domain


When to use
The function assigns a Links Over Cable to a Domain.

Related information
For information about Transport Link, see: “Overview about Transport links ” (p. 14-4).
For a description about Domains, refer to the topic “Overview about Domains”
(p. 13-15).

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.

Task
From MS-GUI main window:
...................................................................................................................................................................................................

1 Select Search > Packet > Construction > Transport Links > Links Over Cable.
Result: The list window is shown.
...................................................................................................................................................................................................

2 Select an item in the list.


...................................................................................................................................................................................................

3 Select Action > Links Over Cable > Assign Resources to Domain.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
14-60 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Transport Link Management Deassign a Link Over Cable from a Domain
Managing Links Over Cable
....................................................................................................................................................................................................................................

Deassign a Link Over Cable from a Domain


When to use
The function deassigns a Links Over Cable from a Domain.

Related information
For information about Transport Link, see: “Overview about Transport links ” (p. 14-4).
For a description about Domains, refer to the topic “Overview about Domains”
(p. 13-15).

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.

Task
From MS-GUI main window:
...................................................................................................................................................................................................

1 Select Search > Packet > Construction > Transport Links > Links Over Cable.
Result: The list window is shown.
...................................................................................................................................................................................................

2 Select an item in the list.


...................................................................................................................................................................................................

3 Select Action > Links Over Cable > Deassign Resources from Domain.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS 14-61
8DG42227DAAA 9.6
Issue 3 December 2012
Transport Link Management View the list of LAG Links Over Cables
Managing LAG Links Over Cable
....................................................................................................................................................................................................................................

Managing LAG Links Over Cable

View the list of LAG Links Over Cables


When to use
The function presents all LAG Links Over Cable and their attributes.

Related information
LAG Link over Cable is the way to connect two LAG ports.
For information about Transport Link, see: “Overview about Transport links ” (p. 14-4).

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.

Task
From MS-GUI main window:
...................................................................................................................................................................................................

1 Select Search > Packet > Construction.


Result: The Construction menu is displayed.
...................................................................................................................................................................................................

2 Select LAG Link Over Cable.


Result: The Link Over Cable list window is displayed.
The attributes displayed for each Link Over Cable are:
• User Label.
• Parent Subnetwork.
• Bit Rate.
• Supported Layer (Ethernet, MPLS).
• Working State.
• Availability Status (Normal, In Failure).
• Manager Control (Enabled, Disabled).
• Client Type (ETS, ETB).

E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
14-62 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Transport Link Management Create a LAG Link Over Cable from extremities
Managing LAG Links Over Cable
....................................................................................................................................................................................................................................

Create a LAG Link Over Cable from extremities


When to use
This function create a LAG Link Over Cable from extremities.

Related information
To create LAG Link , see also: “Create a LAG Link Over Cable from Links” (p. 14-66).
For information, see: “Overview about Link Over Cables” (p. 14-38).

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Conditions
To get a positive result:
• The NE must not be isolated, not locked and LAC state must not be granted.
• The usage state of the Ethernet physical port of the NE must be idle.
• If the supported layer of the port is Ethernet, the Manager Control of the Ethernet
physical port of the NE must be enabled.
• If the supported layer of the port is MPLS, the Manager Control of the Ethernet
physical port of the NE must be disabled.
• The Usage State of the ETP of the ENE must be idle.
• The Manager Control of the selected ETP must be disabled.
• The Supported Layer of the Link Over Cable must be compatible with the one of the
chosen physical port and with the role of the chosen ENE.
• The User Label must be different as one which is already used by another Link Over
Cable.

Task
From MS-GUI main window:
...................................................................................................................................................................................................

1 Select Action > Packet > Construction > Create LAG Link Over Cable from
extremities.

....................................................................................................................................................................................................................................
1350 OMS 14-63
8DG42227DAAA 9.6
Issue 3 December 2012
Transport Link Management Create a LAG Link Over Cable from extremities
Managing LAG Links Over Cable
....................................................................................................................................................................................................................................
Result: The Link Over Cable creation window is displayed.

Figure 14-15 Link Over Cable Creation window

...................................................................................................................................................................................................

2 To create a Link Over Cable:


• Enter a User Label.
• Enter a Comment (optional).
• Select the Extremity A from the available NE list.
• Then, select the LAG Port (A) of the NE from the available port list.
• Select the Extremity Z from the available NE list.
• Then, select the LAG Port (Z) of the NE from the available port list.
• Select the ETP (Z) from the available ETP list.

....................................................................................................................................................................................................................................
14-64 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Transport Link Management Create a LAG Link Over Cable from extremities
Managing LAG Links Over Cable
....................................................................................................................................................................................................................................
Note: If the selected NE is an External NE then:
• Only the ENEs that are compatible with the NE port are displayed. If the NE
extremity has its Manager Control Disabled, only Inner Equipment ENEs are
displayed. If the NE extremity has its Manager Control Enabled, only Customer
Edge ENEs are displayed.
• The ETP (Z) (External Termination Point) field is enabled, select the ETP of the
ENE from the available ETP list.
If the selected NE is a defined Network Element
• Select the Port User Label (Z) (External Termination Point) of the NE from the
available port list.
...................................................................................................................................................................................................

3 Click Ok.
Result: The LAG Link is created.
At the beginning of the operation, the working state is set to Creating.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS 14-65
8DG42227DAAA 9.6
Issue 3 December 2012
Transport Link Management Create a LAG Link Over Cable from Links
Managing LAG Links Over Cable
....................................................................................................................................................................................................................................

Create a LAG Link Over Cable from Links


When to use
This function create a LAG Link Over Cable from Links.

Related information
To create LAG Link , see also: “Create a LAG Link Over Cable from extremities”
(p. 14-63).

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.

Task
From MS-GUI main window:
...................................................................................................................................................................................................

1 Select Action > Packet > Construction > Create LAG Link Over Cable from Links.

....................................................................................................................................................................................................................................
14-66 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Transport Link Management Create a LAG Link Over Cable from Links
Managing LAG Links Over Cable
....................................................................................................................................................................................................................................
Result: The Link Over Cable creation window is displayed.

Figure 14-16 Link Over Cable Creation window

....................................................................................................................................................................................................................................
1350 OMS 14-67
8DG42227DAAA 9.6
Issue 3 December 2012
Transport Link Management Create a LAG Link Over Cable from Links
Managing LAG Links Over Cable
....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

2 To create a Link Over Cable:


• Enter a User Label.
• Enter a Comment (optional).
• Enter the LAG size.
• Enter theLACP.
• Select the Extremity A from the available NE list.
• Select the Hash Key (A) from the list.
• Enter theLAG Id.
• Select the Extremity Z from the available NE list.
• Select the Hash Key (Z) from the list.
• Enter theLAG Id.
• Select the Resorces from the list.
...................................................................................................................................................................................................

3 Click Ok.
Result: The LAG Link is created.
At the beginning of the operation, the working state is set to Creating.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
14-68 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Transport Link Management Create a LAG Link VCG from extremities
Managing LAG Links Over Cable
....................................................................................................................................................................................................................................

Create a LAG Link VCG from extremities


When to use
This function create a LAG Link VCG from extremities.

Related information
To create LAG Link , see also: “Create a LAG Link VCG from Links” (p. 14-72).

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.

Task
From MS-GUI main window:
...................................................................................................................................................................................................

1 Select Action > Packet > Construction > Create LAG Link VCG from extremities.

....................................................................................................................................................................................................................................
1350 OMS 14-69
8DG42227DAAA 9.6
Issue 3 December 2012
Transport Link Management Create a LAG Link VCG from extremities
Managing LAG Links Over Cable
....................................................................................................................................................................................................................................
Result: The Link VCG creation window is displayed.

Figure 14-17 Link VCG Creation window

...................................................................................................................................................................................................

2 To create a Link VCG:


• Enter a User Label.
• Enter a Comment (optional).
• Select the Extremity A from the available NE list.
• Then, select the VCG Termination (A) of the NE from the list.
• Select the Extremity Z from the available NE list.
• Then, select the VCG Termination (Z) of the NE from the list.
• Select the ETP (Z) from the list.

....................................................................................................................................................................................................................................
14-70 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Transport Link Management Create a LAG Link VCG from extremities
Managing LAG Links Over Cable
....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

3 Click Ok.
Result: The LAG Link VCG is created.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS 14-71
8DG42227DAAA 9.6
Issue 3 December 2012
Transport Link Management Create a LAG Link VCG from Links
Managing LAG Links Over Cable
....................................................................................................................................................................................................................................

Create a LAG Link VCG from Links


When to use
This function create a LAG Link VCG from Links.

Related information
This task does not have any related information.

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.

Task
From MS-GUI main window:
...................................................................................................................................................................................................

1 Select Action > Packet > Construction > Create LAG Link VCG from Links.

....................................................................................................................................................................................................................................
14-72 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Transport Link Management Create a LAG Link VCG from Links
Managing LAG Links Over Cable
....................................................................................................................................................................................................................................
Result: The Link VCG creation window is displayed.

Figure 14-18 LAG Link VCG Creation window

....................................................................................................................................................................................................................................
1350 OMS 14-73
8DG42227DAAA 9.6
Issue 3 December 2012
Transport Link Management Create a LAG Link VCG from Links
Managing LAG Links Over Cable
....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

2 To create a LAG Link VCG:


• Enter a User Label.
• Enter a Comment (optional).
• Enter the LAG size.
• Select theLACP from the list.
• Select the Hash Key from the list.
• Select the Extremity A from the available NE list.
• Select the Extremity Z from the available NE list.
• Select the Resorces from the list.
...................................................................................................................................................................................................

3 Click Ok.
Result: The LAG Link VCG is created.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
14-74 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Transport Link Management Modify a LAG Link Over Cable
Managing LAG Links Over Cable
....................................................................................................................................................................................................................................

Modify a LAG Link Over Cable


When to use
The function modifies LAG Link Over Cable characteristics.

Related information
The function gives the possibility to modify:
• LAG Link Over Cable User Label.
• Comment.

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Conditions
To get a positive result:
• If the User Label is modified, the new User Label must be different from any other in
use by Link Over Cable.

Task
From MS-GUI main window:
...................................................................................................................................................................................................

1 Select Search > Packet > Construction > LAG Links Over Cable.
Result: The list window is shown.
...................................................................................................................................................................................................

2 Select one or more items in the list.


...................................................................................................................................................................................................

3 Select Action > LAG Links Over Cable > Modify.


Result: The Link Over Cable modification window is displayed.
...................................................................................................................................................................................................

4 To modify a Link Over Cable:


• Enter a New User Label (optional).
• Modify the Comment (optional).
...................................................................................................................................................................................................

5 Select OK.

....................................................................................................................................................................................................................................
1350 OMS 14-75
8DG42227DAAA 9.6
Issue 3 December 2012
Transport Link Management Modify a LAG Link Over Cable
Managing LAG Links Over Cable
....................................................................................................................................................................................................................................
Result: At the beginning of the operation, the working state of the concerned Link
Over Cable is set to Modifying.
If the User Label is modified, the corresponding Transport Link in (Ethernet domain
or in MPLS domain) is modified too.
At the end of the operation, the working state is set to Normal.
The Link Over Cable List and the opened graphical views are updated.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
14-76 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Transport Link Management Delete a LAG Link Over Cable
Managing LAG Links Over Cable
....................................................................................................................................................................................................................................

Delete a LAG Link Over Cable


When to use
This function consists in deleting a LAG Link Over Cable.

Related information
If the Manager Control is Disabled, the deletion is authorized.
If the Manager Control is Enabled, the usage of the corresponding Transport Link (in
Ethernet Management domain or in MPLS domain) is checked. If Ethernet Segments or
VC-LSP are carried by Transport Link, the deletion is refused. In other case, the
corresponding Ethernet Transport Link or MPLS Transport Link must be deleted before
the Link Over Cable.

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Conditions
To get a positive result:
• The corresponding Ethernet Transport Link or MPLS Transport Link usage state
must be idle.

Task
From MS-GUI main window:
...................................................................................................................................................................................................

1 Select Search > Packet > Construction > LAG Links Over Cable.
Result: The list window is shown.
...................................................................................................................................................................................................

2 Select one or more items in the list.


...................................................................................................................................................................................................

3 Select Action > LAG Links Over Cable > Delete or right-click the mouse and Select
Delete.
...................................................................................................................................................................................................

4 Select OK in the confirmation box to confirm the deletion..

....................................................................................................................................................................................................................................
1350 OMS 14-77
8DG42227DAAA 9.6
Issue 3 December 2012
Transport Link Management Delete a LAG Link Over Cable
Managing LAG Links Over Cable
....................................................................................................................................................................................................................................
Result: After confirmation, the working state of the concerned LAG Links Over
Cable is set to removing.
Then, the LAG Links Over Cable are removed. If the Link Over Cable is internal then
the port usage state is set to Idle.
The LAG Links Over Cable List and the opened graphical views are updated.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
14-78 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Transport Link Management Get the LAG Link Over Cable extremities
Managing LAG Links Over Cable
....................................................................................................................................................................................................................................

Get the LAG Link Over Cable extremities


When to use
This function gets information about the extremities of a LAG Link Over Cable.

Related information
This task does not have any related information.

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.

Task
From MS-GUI main window:
...................................................................................................................................................................................................

1 Select Search > Packet > Construction > LAG Links Over Cable.
Result: The list window is shown.
...................................................................................................................................................................................................

2 Select one or more items in the list.


...................................................................................................................................................................................................

3 Select Search > Inventory from Link Over Cable > Extremities.
Result: The Link over Cable extremities window is shown.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS 14-79
8DG42227DAAA 9.6
Issue 3 December 2012
Transport Link Management View the details of the LAG Link Over Cables
Managing LAG Links Over Cable
....................................................................................................................................................................................................................................

View the details of the LAG Link Over Cables


When to use
This function gets information about the Link Over Cable.

Related information
This task does not have any related information.

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.

Task
From MS-GUI main window:
...................................................................................................................................................................................................

1 Select Search > Packet > Construction > LAG Links Over Cable.
Result: The list window is shown.
...................................................................................................................................................................................................

2 Select one or more items in the list.


...................................................................................................................................................................................................

3 Select Search > Inventory from Link Over Cable > Properties or click the third key of
the mouse then select Properties.
Result: The Link Over Cable properties window is displayed.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
14-80 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Transport Link Management Details of the list of LAG Link Over Cables
Managing LAG Links Over Cable
....................................................................................................................................................................................................................................

Details of the list of LAG Link Over Cables


Attributes of a LAG Link Over Cables
The attributes displayed for each LAG Link Over Cable are:
• User Label.
• Parent Subnetwork.
• Comment.
• Bit Rate.
• Client Type (ETS, ETB).
• Supported Layer (Ethernet, MPLS).
• Working State.
• Availability Status (Normal, In Failure).
• Manager Control (Enabled, Disabled).
• Last Action Date.
• Last Action Type.

....................................................................................................................................................................................................................................
1350 OMS 14-81
8DG42227DAAA 9.6
Issue 3 December 2012
Transport Link Management Overview about links over WDM
Managing links over WDM
....................................................................................................................................................................................................................................

Managing links over WDM

Overview about links over WDM


Link Over WDM description
A Link Over WDM is the image in 1350 OMS PKT Construction domain of Transport
Links managed by the WDM manager.
Links Over WDM are managed by external applications.
Refer to the document: [5] 1350 OMS WDM Guide

....................................................................................................................................................................................................................................
14-82 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Transport Link Management View the list of links over WDM
Managing links over WDM
....................................................................................................................................................................................................................................

View the list of links over WDM


When to use
The Link Over WDM List window presents all links over WDM and their attributes.

Related information
For information about Transport Link, see: “MPLS/T-MPLS Transport link” (p. 11-65).
For information about links over WDM, see: “Overview about links over WDM”
(p. 14-82).

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.

Task
From MS-GUI main window:
...................................................................................................................................................................................................

1 Select Search > Packet > Construction.


Result: The Construction menu is displayed.
...................................................................................................................................................................................................

2 Select Transport Links > Links Over WDM.


Result: The Link Over WDM list window is displayed.
The attributes displayed for each Link Over WDM are:
• User Label.
• Parent Subnetwork.
• Working State.
• Availability Status (Normal, In Failure).
• Manager Control (Enabled, Disabled).

E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS 14-83
8DG42227DAAA 9.6
Issue 3 December 2012
Transport Link Management Get the Link Over WDM extremities
Managing links over WDM
....................................................................................................................................................................................................................................

Get the Link Over WDM extremities


When to use
This function gets information about the extremities (origin and destination) of a Link
Over WDM.

Related information
For information about Transport Link, see: “MPLS/T-MPLS Transport link” (p. 11-65).
For information about links over WDM, see: “Overview about links over WDM”
(p. 14-82).

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.

Task
From MS-GUI main window:
...................................................................................................................................................................................................

1 Select Search > Packet > Construction > Transport Links > Links Over WDM.
Result: The list window is shown.
...................................................................................................................................................................................................

2 Select one or more items in the list.


...................................................................................................................................................................................................

3 Select Search > Inventory from Link Over WDM > Extremities or click the third key of
the mouse then select Extremities.
Result: The Link Over WDM Extremities window is displayed.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
14-84 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Transport Link Management Description of a Link Over WDM Extremities
Managing links over WDM
....................................................................................................................................................................................................................................

Description of a Link Over WDM Extremities


Attributes of a Link Over WDM Extremity
The attributes displayed are:
• User Label.
• NE User Label (A).
• Termination User Label (A).
• NE User Label (Z).
• Termination User Label (Z).

....................................................................................................................................................................................................................................
1350 OMS 14-85
8DG42227DAAA 9.6
Issue 3 December 2012
Transport Link Management View the details of the links over WDM
Managing links over WDM
....................................................................................................................................................................................................................................

View the details of the links over WDM


When to use
This function gets information about a Link Over WDM.

Related information
For information about Transport Link, see: “MPLS/T-MPLS Transport link” (p. 11-65).
For information about links over WDM, see: “Overview about links over WDM”
(p. 14-82).

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.

Task
From MS-GUI main window:
...................................................................................................................................................................................................

1 Select Search > Packet > Construction > Transport Links > Links Over WDM.
Result: The list window is shown.
...................................................................................................................................................................................................

2 Select one or more items in the list.


...................................................................................................................................................................................................

3 Select Search > Inventory from Link Over WDM > Properties or click the third key of
the mouse then select Properties.
Result: The Link Over WDM properties window is displayed.
The attributes displayed for each Link Over WDM are:
• User Label.
• Parent Subnetwork.
• Working State.
• Availability Status (Normal, In Failure).
• Manager Control (Enabled, Disabled).
• Last Action Date.
• Last Action Type.
• Traffic Contract.
• CIR.
....................................................................................................................................................................................................................................
14-86 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Transport Link Management View the details of the links over WDM
Managing links over WDM
....................................................................................................................................................................................................................................
• PIR.
• CBS.
• PBS.

E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS 14-87
8DG42227DAAA 9.6
Issue 3 December 2012
Transport Link Management Overview about links over MPLS
Managing links over MPLS
....................................................................................................................................................................................................................................

Managing links over MPLS

Overview about links over MPLS


Link Over MPLS description
A Link Over MPLS is the image in 1350 OMS PKT Construction domain of a VC-LSP
managed by the MPLS manager.
A Link Over MPLS is automatically created or deleted inside the construction domain at
the implementation or de-implementation of the corresponding VC-LSP.
A Link Over MPLS is automatically modified when the corresponding VC-LSP is
modified.

....................................................................................................................................................................................................................................
14-88 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Transport Link Management View the list of links over MPLS
Managing links over MPLS
....................................................................................................................................................................................................................................

View the list of links over MPLS


When to use
The Link Over MPLS List window presents all links over MPLS and their attributes.

Related information
For details about Transport Links, see: “MPLS/T-MPLS Transport link” (p. 11-65).
For general information about Transport Links, see: “Transport link management”
(p. 11-50).

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Note: A Link Over MPLS appears automatically in this list when a VC-LSP is
implemented.
A Link Over MPLS disappears automatically from this list when a VC-LSP is
de-implemented.

Task
From MS-GUI main window:
...................................................................................................................................................................................................

1 Select Search > Packet > Construction > Transport Links.


Result: The Transport Links menu is displayed.
...................................................................................................................................................................................................

2 Select Links Over MPLS.


Result: The Link Over MPLS list window is displayed.
The attributes displayed for each Link Over MPLS are:
• User Label.
• Parent Subnetwork.
• Working State.
• Availability Status (Normal, In Failure).
• Manager Control (Enabled, Disabled).

E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS 14-89
8DG42227DAAA 9.6
Issue 3 December 2012
Transport Link Management Get the Link Over MPLS extremities
Managing links over MPLS
....................................................................................................................................................................................................................................

Get the Link Over MPLS extremities


When to use
This function gets information about the extremities (origin and destination) of a Link
Over MPLS.

Related information
For information about Transport Link, see: “MPLS/T-MPLS Transport link” (p. 11-65).

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.

Task
From MS-GUI main window:
...................................................................................................................................................................................................

1 Select Search > Packet > Construction > Transport Links > Links Over MPLS.
Result: The list window is shown.
...................................................................................................................................................................................................

2 Select one or more items in the list.


...................................................................................................................................................................................................

3 Select Search > Inventory from Link Over MPLS > Extremities or click the third key of
the mouse then select Extremities.
Result: The Link Over MPLS Extremities window is displayed.
The attributes displayed are:
• User Label.
• NE User Label (A).
• Termination User Label (A).
• NE User Label (Z).
• Termination User Label (Z).

E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
14-90 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Transport Link Management View the details of the links over MPLS
Managing links over MPLS
....................................................................................................................................................................................................................................

View the details of the links over MPLS


When to use
This function gets information about a Link Over MPLS.

Related information
For information about Transport Link, see: .

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.

Task
From MS-GUI main window:
...................................................................................................................................................................................................

1 Select Search > Packet > Construction > Transport Links > Links Over MPLS.
Result: The list window is shown.
...................................................................................................................................................................................................

2 Select one or more items in the list.


...................................................................................................................................................................................................

3 Select Search > Inventory from Link Over MPLS > Properties or click the third key of
the mouse then select Properties.
Result: The Link Over MPLS properties window is displayed.
The attributes displayed for each Link Over MPLS are:
• User Label.
• Parent Subnetwork.
• Working State.
• Availability Status (Normal, In Failure).
• Manager Control (Enabled, Disabled).
• Last Action Date.
• Last Action Type.
• Traffic Contract.
• CIR.
• PIR.

....................................................................................................................................................................................................................................
1350 OMS 14-91
8DG42227DAAA 9.6
Issue 3 December 2012
Transport Link Management View the details of the links over MPLS
Managing links over MPLS
....................................................................................................................................................................................................................................
• CBS.
• PBS.

E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
14-92 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Transport Link Management View the list of links over Radio
Managing Link over Radio
....................................................................................................................................................................................................................................

Managing Link over Radio

View the list of links over Radio


When to use
The function lists presents all links over Radio and their attributes.

Related information
For information about Transport Link, see: “MPLS/T-MPLS Transport link” (p. 11-65).

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.

Task
From MS-GUI main window:
...................................................................................................................................................................................................

1 Select Search > Packet > Construction.


Result: The Construction menu is displayed.
...................................................................................................................................................................................................

2 Select Transport Links > Links Over Radio.


Result: The Link Over Radio list window is displayed.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS 14-93
8DG42227DAAA 9.6
Issue 3 December 2012
Transport Link Management Overview about links over T-MPLS
Managing links over T-MPLS
....................................................................................................................................................................................................................................

Managing links over T-MPLS

Overview about links over T-MPLS


Link Over T-MPLS description
A Link Over T-MPLS is the image in 1350 OMS PKT Construction domain of a VC-LSP
managed by the T-MPLS manager.
A Link Over MPLS is automatically created or deleted inside the construction domain at
the implementation or de-implementation of the corresponding VC-LSP.
A Link Over MPLS is automatically modified when the corresponding VC-LSP is
modified.

....................................................................................................................................................................................................................................
14-94 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Transport Link Management View the list of links over T-MPLS
Managing links over T-MPLS
....................................................................................................................................................................................................................................

View the list of links over T-MPLS


When to use
The Link Over T-MPLS List window presents all links over T-MPLS and their attributes.

Related information
For details about Transport Links, see: “MPLS/T-MPLS Transport link” (p. 11-65).
For general information about Transport Links, see: “Transport link management”
(p. 11-50).

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Note: A Link Over T-MPLS appears automatically in this list when a VC-LSP is
implemented.
A Link Over T-MPLS disappears automatically from this list when a VC-LSP is
de-implemented.

Task
From MS-GUI main window:
...................................................................................................................................................................................................

1 Select Search > Packet > Construction.


Result: The Construction menu is displayed.
...................................................................................................................................................................................................

2 Select Transport Links > Link Over T-MPLS.


Result: The Link Over T-MPLS list window is displayed.
The attributes displayed for each Link Over T-MPLS are:
• User Label.
• Parent Subnetwork.
• Working State.
• Availability Status (Normal, In Failure).
• Manager Control (Enabled, Disabled).

E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS 14-95
8DG42227DAAA 9.6
Issue 3 December 2012
Transport Link Management Get the Link Over T-MPLS extremities
Managing links over T-MPLS
....................................................................................................................................................................................................................................

Get the Link Over T-MPLS extremities


When to use
This function gets information about the extremities (origin and destination) of a Link
Over T-MPLS.

Related information
For information about Transport Link, see: “MPLS/T-MPLS Transport link” (p. 11-65).

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.

Task
From MS-GUI main window:
...................................................................................................................................................................................................

1 Select: Search > Packet > Construction > Transport Links > Links Over T-MPLS.
Result: The list window is shown.
...................................................................................................................................................................................................

2 Select one or more items in the list.


...................................................................................................................................................................................................

3 Select Search > Inventory from Link Over T-MPLS > Extremities or click the third key
of the mouse then select Extremities.
Result: The Link Over T-MPLS Extremities window is displayed.
The attributes displayed are:
• User Label.
• NE User Label (A).
• Termination User Label (A).
• NE User Label (Z).
• Termination User Label (Z).

E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
14-96 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Transport Link Management View the details of the links over T-MPLS
Managing links over T-MPLS
....................................................................................................................................................................................................................................

View the details of the links over T-MPLS


When to use
This function gets information about a Link Over T-MPLS.

Related information
For information about Transport Link, see: “MPLS/T-MPLS Transport link” (p. 11-65).

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.

Task
From MS-GUI main window:
...................................................................................................................................................................................................

1 Select: Search > Packet > Construction > Transport Links > Links Over T-MPLS.
Result: The list window is shown.
...................................................................................................................................................................................................

2 Select one or more items in the list.


...................................................................................................................................................................................................

3 Select Search > Inventory from Link Over T-MPLS > Properties or click the third key of
the mouse then select Properties.
Result: The Link Over T-MPLS properties window is displayed.
The attributes displayed for each Link Over T-MPLS are:
• User Label.
• Parent Subnetwork.
• Working State.
• Availability Status (Normal, In Failure).
• Manager Control (Enabled, Disabled).
• Last Action Date.
• Last Action Type.
• Traffic Contract.
• CIR.
• PIR.

....................................................................................................................................................................................................................................
1350 OMS 14-97
8DG42227DAAA 9.6
Issue 3 December 2012
Transport Link Management View the details of the links over T-MPLS
Managing links over T-MPLS
....................................................................................................................................................................................................................................
• CBS.
• PBS.

E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
14-98 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Transport Link Management Overview about MPLS/T-MPLS infrastructure
Managing MPLS/T-MPLS infrastructure
....................................................................................................................................................................................................................................

Managing MPLS/T-MPLS infrastructure

Overview about MPLS/T-MPLS infrastructure


MPLS/T-MPLS infrastructure description
The section represents the transport connection between two T-MPLS ports, whatever the
underlying transport technology (for example, cable, TDM, WDM).

....................................................................................................................................................................................................................................
1350 OMS 14-99
8DG42227DAAA 9.6
Issue 3 December 2012
Transport Link Management View the list of T-MPLS sections
Managing MPLS/T-MPLS infrastructure
....................................................................................................................................................................................................................................

View the list of T-MPLS sections


When to use
The list presents all the T-MPLS sections and their attributes.

Related information
Note: A Link Over T-MPLS appears automatically in this list when a VC-LSP is
implemented.
A Link Over T-MPLS disappears automatically from this list when a VC-LSP is
de-implemented.
For details about Transport Links, see: “MPLS/T-MPLS Transport link” (p. 11-65).
For general information about Transport Links, see: “Transport link management”
(p. 11-50).
.

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.

Task
From MS-GUI main window:
...................................................................................................................................................................................................

1 Select Search > Packet > Construction.


Result: The Construction menu is displayed.
...................................................................................................................................................................................................

2 Select T-MPLS > T-MPLS sections.


Result: The T-MPLS section list window is displayed.
The attributes displayed for each Link Over T-MPLS are:
• User Label.
• Parent Subnetwork.
• Working State.
• Availability Status (Normal, In Failure).
• Manager Control (Enabled, Disabled).

E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
14-100 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Transport Link Management Get the T-MPLS section extremities
Managing MPLS/T-MPLS infrastructure
....................................................................................................................................................................................................................................

Get the T-MPLS section extremities


When to use
This function gets information about the extremities (origin and destination) of a T-MPLS
section.

Related information
For information about T-MPLS section, see:

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.

Task
From MS-GUI main window:
...................................................................................................................................................................................................

1 Select Search > Packet > Construction >T-MPLS > T-MPLS sections.
Result: The list window is shown.
...................................................................................................................................................................................................

2 Select one or more items in the list.


...................................................................................................................................................................................................

3 Select Search > T-MPLS section > Extremities or click the third key of the mouse then
select Extremities.
Result: The T-MPLS section Extremities window is displayed.
The attributes displayed are:
• User Label.
• NE User Label (A).
• Termination User Label (A).
• NE User Label (Z).
• Termination User Label (Z).

E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS 14-101
8DG42227DAAA 9.6
Issue 3 December 2012
Transport Link Management View the details of the links over T-MPLS
Managing MPLS/T-MPLS infrastructure
....................................................................................................................................................................................................................................

View the details of the links over T-MPLS


When to use
This function gets information about a T-MPLS section.

Related information
For information about T-MPLS section, see:

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.

Task
From MS-GUI main window:
...................................................................................................................................................................................................

1 Select Search > Packet > Construction >T-MPLS > T-MPLS sections.
Result: The list window is shown.
...................................................................................................................................................................................................

2 Select one or more items in the list.


...................................................................................................................................................................................................

3 Select Search > Inventory from T-MPLS section > Properties or click the third key of
the mouse then select Properties.
Result: The T-MPLS section properties window is displayed.
The attributes displayed for each Link Over T-MPLS are:
• User Label.
• Parent Subnetwork.
• Working State.
• Availability Status (Normal, In Failure).
• Manager Control (Enabled, Disabled).
• Last Action Date.
• Last Action Type.
• Traffic Contract.
• CIR.
• PIR.

....................................................................................................................................................................................................................................
14-102 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Transport Link Management View the details of the links over T-MPLS
Managing MPLS/T-MPLS infrastructure
....................................................................................................................................................................................................................................
• CBS.
• PBS.

E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS 14-103
8DG42227DAAA 9.6
Issue 3 December 2012
Transport Link Management Overview
Managing Transport Links by Domain
....................................................................................................................................................................................................................................

Managing Transport Links by Domain

View the list of Transport Links


When to use
The Transport Link List window presents all Transport Links belonging to the same
domain.

Related information
For information about Transport Link, see: “Overview about Transport links ” (p. 14-4).
For Connection Oriented management, see also: “Display the Ethernet ETS Transport
Link list” (p. 18-186).
For Connection Less management, see also: “Display the Ethernet Bridge Transport Link
list” (p. 19-27).

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.

Task
From MS-GUI main window:
...................................................................................................................................................................................................

1 Select Search > Packet > Services.


Result: The Service menu is shown.
...................................................................................................................................................................................................

2 Select one of the proposed types:


• Connection Oriented (ETS) > ETS Transport Links.
• Connection Less (Bridge) > Bridge Transport Links.
Result: The list of the requested Transport Links is shown.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
14-104 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Transport Link Management View the list of Transport Links

....................................................................................................................................................................................................................................

....................................................................................................................................................................................................................................
1350 OMS 14-105
8DG42227DAAA 9.6
Issue 3 December 2012
Transport Link Management View the list of Transport Links

....................................................................................................................................................................................................................................

....................................................................................................................................................................................................................................
14-106 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
15 15
MPLS Provisioning
Management

Overview
Purpose
This chapterdescribes how to provision and monitor the MPLS data.

Contents

Managing Traffic Descriptors (MPLS) 15-4


Overview about Traffic Descriptors (MPLS) 15-5
View the list of Traffic Descriptors (MPLS) 15-6
Description of the list of Traffic Descriptors 15-7
Create a Traffic Descriptor (MPLS) 15-8
Modify a Traffic Descriptor (MPLS) 15-12
Delete a Traffic Descriptor (MPLS) 15-15
View the details of the Traffic Descriptors (MPLS) 15-16
Details of a Traffic Descriptor 15-17
Get the Traffic Descriptor inventory list (MPLS) 15-18
Description of the Traffic Descriptor inventory 15-19
Managing Transport Links (MPLS) 15-20
Overview about Transport Links 15-21
View the list of Transport Links 15-23
Define the Transport Link characteristics 15-25
Get the Transport Link extremities 15-28
Description of the list of Transport Link Extremities 15-30
View the details of the Transport Links 15-31
Details of a Transport Link 15-32
View the bandwidth load of Transport Links 15-33
View the inventory of Transport Links 15-36

...................................................................................................................................................................................................................................
1350 OMS 15-1
8DG42227DAAA 9.6
Issue 3 December 2012
MPLS Provisioning Management Overview

....................................................................................................................................................................................................................................

Description of the Transport Link Inventory 15-38


Managing LSP Tunnels (MPLS) 15-39
Overview about LSP Tunnels 15-40
View the list of LSP tunnels 15-41
Description of the list of LSP Tunnels 15-42
Create an LSP tunnel 15-43
Modify an LSP tunnel 15-45
Delete an LSP tunnel 15-47
Allocate LSP tunnel 15-48
Deallocate LSP tunnel 15-51
List the constraints of an LSP tunnel 15-53
Description of constraints of LSP tunnel 15-55
Add a constraint to an LSP tunnel 15-56
Delete a constraint from an LSP tunnel 15-58
View the details of the LSP tunnel constraints 15-60
Details of a LSP Tunnel Constraint 15-62
View the list of cross connections 15-63
Description of the list of LSP cross connections 15-64
Implement an LSP tunnel 15-65
Get the LSP tunnel extremities 15-67
Description of the list of LSP Tunnel Extremities 15-69
View the details of the LSP tunnels 15-70
Details of a LSP Tunnel 15-71
View the inventory of VC-LSPs 15-72
Description of the LSP Tunnel Inventory 15-73
View the bandwidth load of LSPs 15-74
View the route of LSP Tunnels 15-77
View the list of the Transport Links related to an LSP Tunnel 15-79
Description of the LSP Tunnel inventory 15-80
Managing VC-LSP (MPLS) 15-81
Overview about VC-LSP 15-82
View the list of VC-LSPs 15-83
Description of the list of VC-LSPs 15-84
Create a VC-LSP 15-85
Modify a VC-LSP 15-89

....................................................................................................................................................................................................................................
15-2 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
MPLS Provisioning Management Overview

....................................................................................................................................................................................................................................

Delete a VC-LSP 15-91


Implement a VC-LSP 15-92
De-implement a VC-LSP 15-94
Commission a VC-LSP 15-96
De-commission a VC-LSP 15-98
Get the VC-LSP extremities 15-99
Description of the list of VC-LSP Extremities 15-101
View the details of the VC-LSPs 15-102
Details of a VC-LSP 15-103

....................................................................................................................................................................................................................................
1350 OMS 15-3
8DG42227DAAA 9.6
Issue 3 December 2012
MPLS Provisioning Management
Managing Traffic Descriptors (MPLS)
....................................................................................................................................................................................................................................

Managing Traffic Descriptors (MPLS)

Purpose
This section provides information about the Managing Traffic Descriptors (MPLS).

Contents

Overview about Traffic Descriptors (MPLS) 15-5


View the list of Traffic Descriptors (MPLS) 15-6
Description of the list of Traffic Descriptors 15-7
Create a Traffic Descriptor (MPLS) 15-8
Modify a Traffic Descriptor (MPLS) 15-12
Delete a Traffic Descriptor (MPLS) 15-15
View the details of the Traffic Descriptors (MPLS) 15-16
Details of a Traffic Descriptor 15-17
Get the Traffic Descriptor inventory list (MPLS) 15-18
Description of the Traffic Descriptor inventory 15-19

....................................................................................................................................................................................................................................
15-4 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
MPLS Provisioning Management Overview about Traffic Descriptors (MPLS)
Managing Traffic Descriptors (MPLS)
....................................................................................................................................................................................................................................

Overview about Traffic Descriptors (MPLS)


Tool chain description
Each LSP is characterized by a Traffic Descriptor. It indicates the QoS and the traffic
parameters.
The Traffic Descriptor management tool chain gives the order in which the available
actions can be performed.

Figure 15-1 Traffic Descriptor management chain

....................................................................................................................................................................................................................................
1350 OMS 15-5
8DG42227DAAA 9.6
Issue 3 December 2012
MPLS Provisioning Management View the list of Traffic Descriptors (MPLS)
Managing Traffic Descriptors (MPLS)
....................................................................................................................................................................................................................................

View the list of Traffic Descriptors (MPLS)


When to use
The Traffic Descriptor List window presents all the MPLS Traffic Descriptors and their
attributes.

Related information
For information about Traffic Descriptors, see: “Overview about Traffic Descriptors
(MPLS)” (p. 15-5).

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.

Task
From MS-GUI main window:
...................................................................................................................................................................................................

1 Select Search > Packet > MPLS.


Result: The MPLS menu is displayed.
...................................................................................................................................................................................................

2 Select Descriptor.
Result: The MPLS Traffic Descriptor list is displayed.
See the following topic in this document: “Description of the list of Traffic
Descriptors” (p. 15-7)
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
15-6 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
MPLS Provisioning Management Description of the list of Traffic Descriptors
Managing Traffic Descriptors (MPLS)
....................................................................................................................................................................................................................................

Description of the list of Traffic Descriptors


Attributes of a Traffic Descriptor
The attributes displayed for each Traffic Descriptor are:
• User Label.
• Traffic Contract (Assured Forwarding, Expedited Forwarding Best Effort).
• CIR (Committed Information Rate).
• PIR (Peak Information Rate).
• CBS (Committed Burst Size).
• PBS (Peak Burst Size).

....................................................................................................................................................................................................................................
1350 OMS 15-7
8DG42227DAAA 9.6
Issue 3 December 2012
MPLS Provisioning Management Create a Traffic Descriptor (MPLS)
Managing Traffic Descriptors (MPLS)
....................................................................................................................................................................................................................................

Create a Traffic Descriptor (MPLS)


When to use
This function defines a Traffic Descriptor.

Related information
This function consists in defining a Traffic Descriptor (MPLS) that can be used by LSP
tunnels and VC LSPs.
For information about Traffic Descriptors, see: “Overview about Traffic Descriptors
(MPLS)” (p. 15-5).
MPLS traffic contract and traffic parameters dependencies

Table 15-1 MPLS traffic contract and traffic parameter dependencies

Traffic Traffic Contract.


Descriptor
parameter. BE. EF. AF.

CIR. 0 1. (CIR = PIR). (CIR <= PIR) & (CIR > = 0).
&. if (CIR > 0), (CBS > 0).
(CIR > 0). if (CIR = 0), (CBS = 0).
PIR. > 0. (PIR=CIR) & (PIR (PIR > = CIR) & (PIR > 0).
>0)1.
CBS. 0 1. (CBS = PBS) & (CBS > = 0) & (CBS <= PBS).
(CBS > 0). if (CBS > 0), (CIR > 0).
if (CBS = 0), (CIR = 0).
PBS. > 0. (PBS= CBS) & (PBS > 0) & (PBS > = CBS).
(PBS >0)1.

Notes:
1. Value set by default and not modifiable by the user.

ISA boards and MPLS traffic parameter dependencies

Table 15-2 ISA boards and MPLS traffic parameter dependencies

ISA PR EA or ISA ES16.


Minimum. Maximum.
CIR. 0 or 64. Up to PIR.
PIR. 64. Up to ELR.
CBS. 0. Min (16384, 500/3×CIR ).
PBS. > 0. Min (65335, 500/3×PIR ).

....................................................................................................................................................................................................................................
15-8 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
MPLS Provisioning Management Create a Traffic Descriptor (MPLS)
Managing Traffic Descriptors (MPLS)
....................................................................................................................................................................................................................................
Before you begin
The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Conditions
To get a positive result:
• The Table B-20, “Limits for MPLS Traffic Descriptors” (p. B-4) must not be reached.
• The traffic parameters of the Traffic Descriptor must be different from parameters
used by an existing Traffic Descriptor.
• The User Label must be different as one which is already used by another Traffic
Descriptor.

Task
From MS-GUI main window:
...................................................................................................................................................................................................

1 Select Action > Packet > MPLS > Create Traffic Descriptors.

....................................................................................................................................................................................................................................
1350 OMS 15-9
8DG42227DAAA 9.6
Issue 3 December 2012
MPLS Provisioning Management Create a Traffic Descriptor (MPLS)
Managing Traffic Descriptors (MPLS)
....................................................................................................................................................................................................................................
Result:

Figure 15-2 Traffic Descriptor Creation window

...................................................................................................................................................................................................

2 To create a Traffic Descriptor:


• Enter a User Label.
• Choose a Class of Service.
By using the option button you can choose among the following values:
– Assured Forwarding: A minimum of bandwidth (That is CIR) is reserved.
– Expedited Forwarding: The bandwidth requested by the user (PIR equal to CIR)
is reserved.
– Best Effort: No bandwidth is reserved.
• Enter a Comment (optional).
• Enter the traffic parameters.

....................................................................................................................................................................................................................................
15-10 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
MPLS Provisioning Management Create a Traffic Descriptor (MPLS)
Managing Traffic Descriptors (MPLS)
....................................................................................................................................................................................................................................
In the traffic parameters area, enter the required parameters. The number of
parameters to enter depends on the traffic contract previously chosen. The field to be
filled are in white:
– CIR: in Kbit/s.
– PIR: in Kbit/s.
– CBS: in bytes.
– PBS: in bytes.
...................................................................................................................................................................................................

3 Click Ok button.
Result: After checking the coherence of the traffic parameters values and the selected
traffic contract, the Traffic Descriptor is created.
The Traffic Descriptor (MPLS) list is updated.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS 15-11
8DG42227DAAA 9.6
Issue 3 December 2012
MPLS Provisioning Management Modify a Traffic Descriptor (MPLS)
Managing Traffic Descriptors (MPLS)
....................................................................................................................................................................................................................................

Modify a Traffic Descriptor (MPLS)


When to use
The Link Over Cable modification gives the possibility to modify Traffic Descriptor
characteristics.

Related information
For information about Traffic Descriptors, see: “Overview about Traffic Descriptors
(MPLS)” (p. 15-5).

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Conditions
To get a positive result:
• If the User Label is modified, the new User Label must be different as one which is
already used by another Traffic Descriptor.
• If the selected Traffic Descriptor is busy, Traffic Contract and Traffic Parameters
cannot be modified.

Task
From MS-GUI main window:
...................................................................................................................................................................................................

1 Select Search > Packet > MPLS > Descriptors.


Result: The list window is shown.
...................................................................................................................................................................................................

2 Select one or more items in the list.


...................................................................................................................................................................................................

3 Select Action > Packet > MPLS > Descriptor > Modify or Click the third key of the
mouse and select Modify.

....................................................................................................................................................................................................................................
15-12 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
MPLS Provisioning Management Modify a Traffic Descriptor (MPLS)
Managing Traffic Descriptors (MPLS)
....................................................................................................................................................................................................................................
Result: The TD modification window is displayed.

Figure 15-3 Traffic Descriptor Modification window

If the Traffic Descriptor is associated to an LSP tunnel or VC-LSP, only the Traffic
User Label and Comment can be modified.
...................................................................................................................................................................................................

4 To modify a Traffic Descriptor:


• Enter a new User Label (optional).
• Select a new Class of Service (optional).

....................................................................................................................................................................................................................................
1350 OMS 15-13
8DG42227DAAA 9.6
Issue 3 December 2012
MPLS Provisioning Management Modify a Traffic Descriptor (MPLS)
Managing Traffic Descriptors (MPLS)
....................................................................................................................................................................................................................................
• Modify the Comment (optional).
• Modify the ClR (optional).
• Modify the PIR (optional).
• Modify the CBS (optional).
• Modify the PBS (optional).
...................................................................................................................................................................................................

5 Select OK.
Result: After confirmation of the modification: the Traffic Descriptor list is updated.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
15-14 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
MPLS Provisioning Management Delete a Traffic Descriptor (MPLS)
Managing Traffic Descriptors (MPLS)
....................................................................................................................................................................................................................................

Delete a Traffic Descriptor (MPLS)


When to use
This function consists in deleting a Traffic Descriptor (MPLS) from the 1350 OMS PKT
supervision.

Related information
For information about Traffic Descriptors, see: “Overview about Traffic Descriptors
(MPLS)” (p. 15-5).

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Conditions
To get a positive result:
• No more LSP Tunnel or VC-LSP are using this Traffic Descriptor.

Task
From MS-GUI main window:
...................................................................................................................................................................................................

1 Select Search > Packet > MPLS > Descriptors.


Result: The list window is shown.
...................................................................................................................................................................................................

2 Select one or more items in the list.


...................................................................................................................................................................................................

3 Select Action > Packet > MPLS > Descriptor > Delete or Click the third key of the
mouse and select Delete.
...................................................................................................................................................................................................

4 Select one of the options in the confirmation box. Refer to the procedure “Confirm the
action” (p. 11-40).
Result: After confirmation, the Traffic Descriptors are removed.
The Traffic Descriptor (MPLS) list is updated.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS 15-15
8DG42227DAAA 9.6
Issue 3 December 2012
MPLS Provisioning Management View the details of the Traffic Descriptors (MPLS)
Managing Traffic Descriptors (MPLS)
....................................................................................................................................................................................................................................

View the details of the Traffic Descriptors (MPLS)


When to use
This function gets information about the Traffic Descriptors (MPLS).

Related information
For information about Traffic Descriptors, see: “Overview about Traffic Descriptors
(MPLS)” (p. 15-5).

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.

Task
From MS-GUI main window:
...................................................................................................................................................................................................

1 Select Search > Packet > MPLS > Descriptors.


Result: The list window is shown.
...................................................................................................................................................................................................

2 Select one or more items in the list.


...................................................................................................................................................................................................

3 Select Search > Packet > MPLS > Descriptor > Properties or Click the third key of the
mouse and select Properties.
Result: The Traffic Descriptor properties window is displayed.
See the following topic in this document: “Details of a Traffic Descriptor” (p. 15-17)
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
15-16 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
MPLS Provisioning Management Details of a Traffic Descriptor
Managing Traffic Descriptors (MPLS)
....................................................................................................................................................................................................................................

Details of a Traffic Descriptor


Attributes of a Traffic Descriptor
The attributes displayed for each Traffic Descriptor are:
• User Label.
• Traffic Contract (Assured Forwarding, Expedited Forwarding, Best Effort).
• Comment.
• CIR (Committed Information Rate).
• PIR (Peak Information Rate).
• CBS (Committed Burst Size).
• PBS (Peak Burst Size).

....................................................................................................................................................................................................................................
1350 OMS 15-17
8DG42227DAAA 9.6
Issue 3 December 2012
MPLS Provisioning Management Get the Traffic Descriptor inventory list (MPLS)
Managing Traffic Descriptors (MPLS)
....................................................................................................................................................................................................................................

Get the Traffic Descriptor inventory list (MPLS)


When to use
This function gets information about each LSP tunnel and VC-LSP (and their states) using
the previously selected Traffic Descriptor.

Related information
For information about Traffic Descriptors, see: “Overview about Traffic Descriptors
(MPLS)” (p. 15-5).

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.

Task
From MS-GUI main window:
...................................................................................................................................................................................................

1 Select Search > Packet > MPLS > Descriptors.


Result: The list window is shown.
...................................................................................................................................................................................................

2 Select one or more items in the list.


...................................................................................................................................................................................................

3 Select Search > Packet > MPLS > Descriptor > Get Inventory or Click the third key of
the mouse and Get Inventory.
Result: The inventory list is displayed.
If you select an entity (LSP Tunnel or VC-LSP) in the inventory list and click the right
button, you see a list of commands. The listed commands depend on the provisioning
state and availability status of the selected entity.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
15-18 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
MPLS Provisioning Management Description of the Traffic Descriptor inventory
Managing Traffic Descriptors (MPLS)
....................................................................................................................................................................................................................................

Description of the Traffic Descriptor inventory


Attributes of the inventory
The attributes displayed for each LSP tunnel or VC-LSP are:
• LSP Type (LSP Tunnel or VC-LSP).
• LSP Tunnel or VC-LSP User Label.
• Provisioning State (Defined, Allocated, Partially Implemented, Implemented,
Commissioned).
• Availability Status.

....................................................................................................................................................................................................................................
1350 OMS 15-19
8DG42227DAAA 9.6
Issue 3 December 2012
MPLS Provisioning Management Overview
Managing Transport Links (MPLS)
....................................................................................................................................................................................................................................

Managing Transport Links (MPLS)

Overview
Purpose
This section provides information about the Managing Transport Links (MPLS).

Contents

Overview about Transport Links 15-21


View the list of Transport Links 15-23
Define the Transport Link characteristics 15-25
Get the Transport Link extremities 15-28
Description of the list of Transport Link Extremities 15-30
View the details of the Transport Links 15-31
Details of a Transport Link 15-32
View the bandwidth load of Transport Links 15-33
View the inventory of Transport Links 15-36
Description of the Transport Link Inventory 15-38

....................................................................................................................................................................................................................................
15-20 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
MPLS Provisioning Management Overview about Transport Links
Managing Transport Links (MPLS)
....................................................................................................................................................................................................................................

Overview about Transport Links


Transport Link description
For details about Transport Links, see: “MPLS/T-MPLS Transport link” (p. 11-65).
For general information about Transport Links, see: “Transport link management”
(p. 11-50).
Two kinds of Transport Link can be used as infrastructure:
• based on Link Over TDM, in this case, they can be used to carry LSP Tunnel. In that
case, the extremities of the Transport Link are TDM termination and its transport type
is Link Over TDM.
• based on Link Over Cable, in this case, they can be used to carry VC-LSP. In that
case, the extremities of the Transport Link are one Physical Port and one ETP and its
transport type is Link Over Cable.
The different steps to provide a Transport Link are the following:
• Create Transport link (in the scope of network construction).
The Transport Link is created automatically after the creation or the upload of Links
Over TDM and Links Over Cable dedicated to MPLS.
• Characteristic definition.
For each extremity of the Transport Link, to provision the characteristics (MPLS
Label range) and to activate them. The MPLS Label range is stored.
The Transport Link management tool chain gives the order in which the available actions
can be performed.

....................................................................................................................................................................................................................................
1350 OMS 15-21
8DG42227DAAA 9.6
Issue 3 December 2012
MPLS Provisioning Management Overview about Transport Links
Managing Transport Links (MPLS)
....................................................................................................................................................................................................................................

Figure 15-4 MPLS Transport Link management chain

....................................................................................................................................................................................................................................
15-22 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
MPLS Provisioning Management View the list of Transport Links
Managing Transport Links (MPLS)
....................................................................................................................................................................................................................................

View the list of Transport Links


When to use
The Transport Link list window presents all the MPLS Transport Links and their
attributes.

Related information
For information about Transport Link management, see: “Overview about Transport
Links” (p. 15-21).
For details about Transport Links, see: “MPLS/T-MPLS Transport link” (p. 11-65).
For general information about Transport Links, see: “Transport link management”
(p. 11-50).

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.

Task
From MS-GUI main window:
...................................................................................................................................................................................................

1 Select: Search > Packet > Construction > Transport Links.


.
Result: The Transport Links Menu is displayed.
...................................................................................................................................................................................................

2 Select: Links Over MPLS.


Result: The MPLS Transport Link list is displayed.
The attributes displayed for each Transport Link are:
• User Label.
• Parent Subnetwork.
• Transport Type (Link Over Cable, Link Over TDM).
• Bandwidth (In Kbit/s).
• Usage State (Idle, Busy, Reserved, Not meaningful).

....................................................................................................................................................................................................................................
1350 OMS 15-23
8DG42227DAAA 9.6
Issue 3 December 2012
MPLS Provisioning Management View the list of Transport Links
Managing Transport Links (MPLS)
....................................................................................................................................................................................................................................
• Working State (Normal, Configuring, Removing).
• Provisioning State (Defined, Partially Configured, Configured).

E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
15-24 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
MPLS Provisioning Management Define the Transport Link characteristics
Managing Transport Links (MPLS)
....................................................................................................................................................................................................................................

Define the Transport Link characteristics


When to use
This function consists in defining the characteristics of a Transport Link.

Related information
For information about Transport Link management, see: “Overview about Transport
Links” (p. 15-21).
For details about Transport Links, see: “MPLS/T-MPLS Transport link” (p. 11-65).
For general information about Transport Links, see: “Transport link management”
(p. 11-50).
definition by involved boards
Characteristic definition of a Transport Link is made by setting MPLS label range and by
activation of the interface.
The proposed Static Range Min and Max depend on the type of the boards at the
extremities of the Transport Link:
• for two ISA boards (PR EA or ES16), the Min Range is equal to 1024 and the Max
range is equal to 5119.
• for one ENE (ISA PR) and one ISA PR EA, the Min Range is equal to 1024 and the
Max range is equal to 5119.
• for one ENE (not an ISA PR) and one ISA ES16 board, the label range is set to
1024-5119, by automatic configuration. The user can change it by configuration of the
Transport Link manually. In this case, the Min Range is 16 and the Max range is
5119.
definition by user
The user has the possibility to change these values inside the range.
At the end, on each NE involved in the Transport Link, the physical port, or the logical
port is configured. The MPLS label range is stored in 1350 OMS PKT database, and the
1350 OMS PKT interface is activated.
If the selected Transport Link is based on Link Over Cable, the user can open the
VC-LSP creation window by ticking the Proceed with VC-LSP creation box.
If the selected Transport Link is based on Link Over TDM, the user can open the LSP
tunnel creation window by ticking the Proceed with LSP Tunnel creation box.

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
....................................................................................................................................................................................................................................
1350 OMS 15-25
8DG42227DAAA 9.6
Issue 3 December 2012
MPLS Provisioning Management Define the Transport Link characteristics
Managing Transport Links (MPLS)
....................................................................................................................................................................................................................................
Conditions
To get a positive result:
• The Transport Link does not carry any LSP tunnel (if based on Link Over TDM) or
any VC-LSP (if based on Link Over Cable).
• The NE (extremities of the Transport Link) must not be locked (that is audit,
alignment, reserve are not in progress on the NEs).
• The NE (extremities of the Transport Link) LAC state must not be granted.

Task
From MS-GUI main window:
...................................................................................................................................................................................................

1 Select Search > Packet > MPLS > Transport Link.


Select: Search > Packet > Transport Links > Links Over MPLS.
Result: The list window is shown.
...................................................................................................................................................................................................

2 Select one or more items in the list.


...................................................................................................................................................................................................

3 Select Action > Packet > MPLS > Transport Link > Define Characteristics or Click the
third key of the mouse and select Define Characteristics.
Result:

Figure 15-5 TL Characteristic Definition window (based on Link Over Cable)

....................................................................................................................................................................................................................................
15-26 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
MPLS Provisioning Management Define the Transport Link characteristics
Managing Transport Links (MPLS)
....................................................................................................................................................................................................................................

Figure 15-6 TL Characteristic Definition window (based on Link Over TDM)

...................................................................................................................................................................................................

4 Select OK.
Result: After click Ok button, the Transport Link is updated with the following
states:
• Provisioning State: Configured.
• Working State: Normal.
After the characteristic definition, the Transport Link List is updated.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS 15-27
8DG42227DAAA 9.6
Issue 3 December 2012
MPLS Provisioning Management Get the Transport Link extremities
Managing Transport Links (MPLS)
....................................................................................................................................................................................................................................

Get the Transport Link extremities


When to use
This function gets information about extremities of a Transport Link.

Related information
For information about Transport Link management, see: “Overview about Transport
Links” (p. 15-21).
For details about Transport Links, see: “MPLS/T-MPLS Transport link” (p. 11-65).
For general information about Transport Links, see: “Transport link management”
(p. 11-50).

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.

Task
From MS-GUI main window:
...................................................................................................................................................................................................

1 Select: Search > Packet > Transport Links > Links Over MPLS.
Result: The list window is shown.
...................................................................................................................................................................................................

2 Select one or more items in the list.


...................................................................................................................................................................................................

3 Select Search > Packet > MPLS > Transport Link > Extremities or Click the third key of
the mouse and Extremities.

....................................................................................................................................................................................................................................
15-28 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
MPLS Provisioning Management Get the Transport Link extremities
Managing Transport Links (MPLS)
....................................................................................................................................................................................................................................
Result: The list window is displayed.
See the following topic in this document: “Description of the list of Transport Link
Extremities” (p. 15-30)

Figure 15-7 Transport Link Extremities window

E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS 15-29
8DG42227DAAA 9.6
Issue 3 December 2012
MPLS Provisioning Management Description of the list of Transport Link Extremities
Managing Transport Links (MPLS)
....................................................................................................................................................................................................................................

Description of the list of Transport Link Extremities


Attributes of a Transport Link Extremity
The following attributes are shown:
• User Label.
• Origin (A): NE User Label
• Origin (A): Termination Identifier.
• Origin (A): Activation Status.
• Destination (Z): NE User Label
• Destination (Z): Termination Identifier.
• Destination (Z): Activation Status.

....................................................................................................................................................................................................................................
15-30 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
MPLS Provisioning Management View the details of the Transport Links
Managing Transport Links (MPLS)
....................................................................................................................................................................................................................................

View the details of the Transport Links


When to use
This function gets information about a Transport Link.

Related information
For information about Transport Link management, see: “Overview about Transport
Links” (p. 15-21).
For details about Transport Links, see: “MPLS/T-MPLS Transport link” (p. 11-65).
For general information about Transport Links, see: “Transport link management”
(p. 11-50).

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.

Task
From MS-GUI main window:
...................................................................................................................................................................................................

1 Select: Search > Packet > Transport Links > Links Over MPLS.
Result: The list window is shown.
...................................................................................................................................................................................................

2 Select one or more items in the list.


...................................................................................................................................................................................................

3 Select Search > Packet > MPLS > Transport Link > Properties or Click the third key of
the mouse and Properties.
Result: The TL properties window is displayed.
See the following topic in this document: “Details of a Transport Link” (p. 15-32)
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS 15-31
8DG42227DAAA 9.6
Issue 3 December 2012
MPLS Provisioning Management Details of a Transport Link
Managing Transport Links (MPLS)
....................................................................................................................................................................................................................................

Details of a Transport Link


Attributes of a Transport Link
The attributes displayed for each Transport Link are:
• User Label.
• Parent Subnetwork.
• Transport Type (Link Over Cable, Link Over TDM).
• Bandwidth (In Kbit/s).
• Usage State (Idle, Busy, Reserved, Not meaningful).
• Working State (Normal, Configuring, Removing).
• Provisioning State (Defined, Partially Configured, Configured).
• Routing Service Type.
• Directionality.
• Label Range Min.
• Label Range Max.
• Last Action Type.
• Last Action Date.

....................................................................................................................................................................................................................................
15-32 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
MPLS Provisioning Management View the bandwidth load of Transport Links
Managing Transport Links (MPLS)
....................................................................................................................................................................................................................................

View the bandwidth load of Transport Links


When to use
This function gets information about the bandwidth load of a Transport Link.

Related information
For information about Transport Link management, see: “Overview about Transport
Links” (p. 15-21).
For details about Transport Links, see: “MPLS/T-MPLS Transport link” (p. 11-65).
For general information about Transport Links, see: “Transport link management”
(p. 11-50).

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.

Task
From MS-GUI main window:
...................................................................................................................................................................................................

1 Select: Search > Packet > Transport Links > Links Over MPLS.
Result: The list window is shown.
...................................................................................................................................................................................................

2 Select one or more items in the list.


...................................................................................................................................................................................................

3 Select Search > Packet > Bandwidth Load or Click the third key of the mouse and select
Bandwidth Load.

....................................................................................................................................................................................................................................
1350 OMS 15-33
8DG42227DAAA 9.6
Issue 3 December 2012
MPLS Provisioning Management View the bandwidth load of Transport Links
Managing Transport Links (MPLS)
....................................................................................................................................................................................................................................
Result:

Figure 15-8 Transport Link Over TDM Bandwidth Load window

....................................................................................................................................................................................................................................
15-34 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
MPLS Provisioning Management View the bandwidth load of Transport Links
Managing Transport Links (MPLS)
....................................................................................................................................................................................................................................
Figure 15-9 Transport Link Over Cable Bandwidth Load window

E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS 15-35
8DG42227DAAA 9.6
Issue 3 December 2012
MPLS Provisioning Management View the inventory of Transport Links
Managing Transport Links (MPLS)
....................................................................................................................................................................................................................................

View the inventory of Transport Links


When to use
This function lists LSP tunnel and VC-LSP contained in a Transport Link.

Related information
This function gets information about each LSP tunnel and VC-LSP (and their states)
contained in the previously selected Transport Link.
For information about Transport Link management, see: “Overview about Transport
Links” (p. 15-21).
For details about Transport Links, see: “MPLS/T-MPLS Transport link” (p. 11-65).
For general information about Transport Links, see: “Transport link management”
(p. 11-50).

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.

Task
From MS-GUI main window:
...................................................................................................................................................................................................

1 Select: Search > Packet > Transport Links > Links Over MPLS.
Result: The list window is shown.
...................................................................................................................................................................................................

2 Select one or more items in the list.


...................................................................................................................................................................................................

3 Select Search > Packet > MPLS > Transport Link > Get Inventory or Click the third key
of the mouse and select Get Inventory.

....................................................................................................................................................................................................................................
15-36 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
MPLS Provisioning Management View the inventory of Transport Links
Managing Transport Links (MPLS)
....................................................................................................................................................................................................................................
Result: The Transport Link Inventory list is displayed.

Figure 15-10 Transport Link Inventory List window

If you select an entity (LSP Tunnel or VC-LSP) in the inventory list and click the right
button, you see a list of commands. The listed commands depend on the provisioning
state and availability status of the selected entity.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS 15-37
8DG42227DAAA 9.6
Issue 3 December 2012
MPLS Provisioning Management Description of the Transport Link Inventory
Managing Transport Links (MPLS)
....................................................................................................................................................................................................................................

Description of the Transport Link Inventory


Attributes of Transport Link Inventory
The attributes displayed for each LSP tunnel or VC-LSP are:
• MPLS Label.
• LSP Type(LSP Tunnel or VC-LSP).
• LSP tunnel or VC-LSP User Label.
• Provisioning State (Defined, Allocated, Partially Implemented, Implemented,
Commissioned, Partially Configured, Configured).
• Availability Status.

....................................................................................................................................................................................................................................
15-38 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
MPLS Provisioning Management Overview
Managing LSP Tunnels (MPLS)
....................................................................................................................................................................................................................................

Managing LSP Tunnels (MPLS)

Overview
Purpose
This section provides information about the LSP Tunnels management.

Contents

Overview about LSP Tunnels 15-40


View the list of LSP tunnels 15-41
Description of the list of LSP Tunnels 15-42
Create an LSP tunnel 15-43
Modify an LSP tunnel 15-45
Delete an LSP tunnel 15-47
Allocate LSP tunnel 15-48
Deallocate LSP tunnel 15-51
List the constraints of an LSP tunnel 15-53
Description of constraints of LSP tunnel 15-55
Add a constraint to an LSP tunnel 15-56
Delete a constraint from an LSP tunnel 15-58
View the details of the LSP tunnel constraints 15-60
Details of a LSP Tunnel Constraint 15-62
View the list of cross connections 15-63
Description of the list of LSP cross connections 15-64
Implement an LSP tunnel 15-65
Get the LSP tunnel extremities 15-67
Description of the list of LSP Tunnel Extremities 15-69
View the details of the LSP tunnels 15-70
Details of a LSP Tunnel 15-71
View the inventory of VC-LSPs 15-72
Description of the LSP Tunnel Inventory 15-73
View the bandwidth load of LSPs 15-74
View the route of LSP Tunnels 15-77
View the list of the Transport Links related to an LSP Tunnel 15-79
Description of the LSP Tunnel inventory 15-80
....................................................................................................................................................................................................................................
1350 OMS 15-39
8DG42227DAAA 9.6
Issue 3 December 2012
MPLS Provisioning Management Overview about LSP Tunnels
Managing LSP Tunnels (MPLS)
....................................................................................................................................................................................................................................

Overview about LSP Tunnels


LSP Tunnel description
An LSP tunnel:
• is an MPLS Point to point unidirectional connection.
• ends on ISA PR EA and/or ES16 boards.
• is based on Transport Link (Link Over TDM).
• can carry one or moreVC-LSPs.
An LSP tunnel can be carried by a Transport Link not terminated. In this case one of its
extremities is an ENE.
The LSP tunnel management tool chain gives the order in which the available actions can
be performed.

Figure 15-11 27 LSP Tunnel management chain

....................................................................................................................................................................................................................................
15-40 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
MPLS Provisioning Management View the list of LSP tunnels
Managing LSP Tunnels (MPLS)
....................................................................................................................................................................................................................................

View the list of LSP tunnels


When to use
The LSP Tunnel List window presents all the LSP tunnels and their attributes.

Related information
For information LSP tunnel, see: “LSP Tunnel” (p. 11-66).

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.

Task
From MS-GUI main window:
...................................................................................................................................................................................................

1 Select: Search > Packet > MPLS.


Result: The MPLS menu is displayed.
...................................................................................................................................................................................................

2 Select: LSP Tunnels.


Result: The LSP Tunnel list is displayed.
See the following topic in this document: “Description of the list of LSP Tunnels”
(p. 15-42)
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS 15-41
8DG42227DAAA 9.6
Issue 3 December 2012
MPLS Provisioning Management Description of the list of LSP Tunnels
Managing LSP Tunnels (MPLS)
....................................................................................................................................................................................................................................

Description of the list of LSP Tunnels


Attributes of a LSP Tunnel
The attributes displayed for each LSP tunnel are:
• User Label.
• Parent Subnetwork.
• Usage State (Idle, Busy).
• Working State (Normal, Removing, Allocating, De-allocating, Implementing,
De-implementing).
• Provisioning State (Defined, Allocated, Partially Implemented, Implemented).
• Availability Status (Normal, Degraded, In failure).
• Consistency State (Consistent, Not consistent, Not meaningful).

....................................................................................................................................................................................................................................
15-42 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
MPLS Provisioning Management Create an LSP tunnel
Managing LSP Tunnels (MPLS)
....................................................................................................................................................................................................................................

Create an LSP tunnel


When to use
This function consists in creating an LSP tunnel.

Related information
For information on LSP tunnel, see: “LSP Tunnel” (p. 11-66).
LSP tunnel creation states
The LSP tunnel is created into the 1350 OMS PKT with the following states:
• Working State: Normal.
• Usage State: Idle.
• Availability Status: Not Meaningful.
• Consistency State: Not Meaningful.
• Provisioning State: Defined.
The Usage state of LSP tunnel changes to busy when the LSP Tunnel supports at least
one VC-LSP.

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Conditions
To get a positive result:
• The MPLS Transport Link at the extremity must be based on SDH.
• The User Label must be different as one which is exists.

Task
From MS-GUI main window:
...................................................................................................................................................................................................

1 Select Action > Packet > MPLS > Create LSP Tunnel.
Result: The LSP tunnel creation window is displayed.
To create an LSP tunnel:
• Enter an LSP tunnel User label.
• Enter a Comment (optional).

....................................................................................................................................................................................................................................
1350 OMS 15-43
8DG42227DAAA 9.6
Issue 3 December 2012
MPLS Provisioning Management Create an LSP tunnel
Managing LSP Tunnels (MPLS)
....................................................................................................................................................................................................................................
• In the Origin and Destination areas, choose the NE User Label and Termination
Identifier (that is the TDM termination Identifier). Repeat the procedure for each
extremity of the LSP tunnel.
• Choose the Traffic Descriptor User Label associated to this LSP tunnel by using
the sensitive help.
...................................................................................................................................................................................................

2 Click Ok.
Result: The tree area, opened graphical views, and the LSP Tunnel List are updated.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
15-44 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
MPLS Provisioning Management Modify an LSP tunnel
Managing LSP Tunnels (MPLS)
....................................................................................................................................................................................................................................

Modify an LSP tunnel


When to use
The function modifies LSP tunnel characteristics.

Related information
The LSP tunnel modification gives the possibility to modify:
• User Label.
• Comment.
• Traffic Descriptor.
For information about LSP tunnel, see: “LSP Tunnel” (p. 11-66).

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Conditions
To get a positive result:
• The new User Label must be not in use by another LSP tunnel.
• To modify the Traffic Descriptor associated to a LSP Tunnel, the provisioning state
of the LSP tunnel must be Defined and usage state must be Idle.

Task
From MS-GUI main window:
...................................................................................................................................................................................................

1 Select Search > Packet > Construction > MLSP > LSP Tunnels.
Result: The list window is shown.
...................................................................................................................................................................................................

2 Select one or more items in the list.


...................................................................................................................................................................................................

3 Select Action > LSP Tunnels > Modify.

....................................................................................................................................................................................................................................
1350 OMS 15-45
8DG42227DAAA 9.6
Issue 3 December 2012
MPLS Provisioning Management Modify an LSP tunnel
Managing LSP Tunnels (MPLS)
....................................................................................................................................................................................................................................
Result: The LSP tunnel modification window is displayed.

Figure 15-12 LSP Tunnel Modification window (for an LSP tunnel defined)

...................................................................................................................................................................................................

4 To modify an LSP tunnel, do one or more of the following:


• Enter a new User Label.
• Modify the Comment.
• Modify the Traffic Descriptor User Label (by using the sensitive help). Modification
permitted if the provisioning state of LSP Tunnel is Defined and the usage state is
Idle.
...................................................................................................................................................................................................

5 Select OK.
Result: After confirmation, the tree area and LSP Tunnel list are updated.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
15-46 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
MPLS Provisioning Management Delete an LSP tunnel
Managing LSP Tunnels (MPLS)
....................................................................................................................................................................................................................................

Delete an LSP tunnel


When to use
This function consists in deleting an LSP tunnel from the 1350 OMS PKT supervision.

Related information
For information about LSP tunnel, see: “LSP Tunnel” (p. 11-66).

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Conditions
To get a positive result:
• The provisioning state of the selected LSP tunnel must be set to Defined.

Task
From MS-GUI main window:
...................................................................................................................................................................................................

1 Select Search > Packet > MPLS > LSP Tunnels.


Result: The list window is shown.
...................................................................................................................................................................................................

2 Select one or more items in the list.


...................................................................................................................................................................................................

3 Select Action > Packet > MPLS > LSP Tunnels > Delete or Click the third key of the
mouse and select Delete.
...................................................................................................................................................................................................

4 Select one of the options in the confirmation box. Refer to the procedure “Confirm the
action” (p. 11-40).
Result: After confirmation, if concerned LSP tunnel is associated to a Traffic
Descriptor, a disassociation is automatically done and the LSP tunnel is removed.
Then LSP Tunnel list, the tree area, and the opened graphical views are updated.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS 15-47
8DG42227DAAA 9.6
Issue 3 December 2012
MPLS Provisioning Management Allocate LSP tunnel
Managing LSP Tunnels (MPLS)
....................................................................................................................................................................................................................................

Allocate LSP tunnel


When to use
This operation finds a path route between the two extremities of an LSP tunnel.

Related information
For information about LSP tunnel, see: “LSP Tunnel” (p. 11-66).
effective bandwidth
The system calculates the effective bandwidth of the LSP tunnel according to the
associated Traffic Descriptor (see the table).
Each MPLS Transport Link of the given route must provide the effective bandwidth of
the LSP tunnel. Available Bandwidth of Transport Link is greater than or equal to
Effective bandwidth of LSP tunnel.
For all traffic contract, CIR must be less than or equal to PIR and PIR must be less than or
equal to Transport Link Total bandwidth.

Traffic contract type. Effective bandwidth reserved on Transport Link.


Best Effort. 0 1.
Assured Forwarding. CIR.
Expedited Forwarding. CIR.

Notes:
1. In the case Best Effort traffic contract, no effective bandwidth is reserved. In this case, for
each Transport Link, a Table B-19, “Limits for MPLS Transport Links” (p. B-4) of Best
Effort LSP Tunnel is checked.

Allocation route
Before the allocation operation, the user has given a complete path route in term of
constraints (MPLS Transport Link List). Constraints can optionally be associated with the
MPLS Labels. See “Add a constraint to an LSP tunnel” (p. 15-56).
If the LSP Tunnel is only one, the route is already defined. In this case, the constraint List
is not mandatory. The Transport Link is identified by the LSP tunnel extremities given
during the definition. Even not mandatory, it can be useful for the user to gives a specific
MPLS label.
If the user gives an MPLS Label in the constraint list, the system checks the availability
of the MPLS Label. If the MPLS Label. is used by another LSP Tunnel or VC-LSP, 1350
OMS PKT chooses and reserves automatically an available MPLS label.

....................................................................................................................................................................................................................................
15-48 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
MPLS Provisioning Management Allocate LSP tunnel
Managing LSP Tunnels (MPLS)
....................................................................................................................................................................................................................................
Allocation phase
The LSP tunnel is allocated:
• Along the route used by the LSP Tunnel, LSP links are created. Tunnels are
referenced by an MPLS Label of each crossed Transport Link.
• MPLS Label of each involved Transport Link is reserved to the LSP tunnel.
• LSP Tunnel cross connections are generated.
• Bandwidth of each Transport Link (used and available bandwidths) is computed in
the used direction.
• If the Usage State of each MPLS Transport Link used by the LSP Tunnel was idle,
the Usage State is changed to busy.
Allocation states
The LSP tunnel is also updated with the following states:
• Provisioning State: Allocated.
• Working State: Normal.

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Conditions
To get a positive result:
• The provisioning state of the selected LSP tunnel must be set to Defined.
• The working state must be set to Normal (if not, an operation is running on it).
• The LSP tunnel must be associated to a Traffic Descriptor.
• The constraints on this LSP tunnel have been previously added (except for unitary
LSP tunnel).
• The MPLS Transport Links defined as constraints are contiguous.
• The constraint lists must be compliant with the LSP tunnel extremities.
• The Table B-19, “Limits for MPLS Transport Links” (p. B-4)of Best Effort LSP
tunnel for each Transport Link is not reached.

Task
From MS-GUI main window:
...................................................................................................................................................................................................

1 Select Search > Packet > Construction > MPLS > LSP Tunnels.

....................................................................................................................................................................................................................................
1350 OMS 15-49
8DG42227DAAA 9.6
Issue 3 December 2012
MPLS Provisioning Management Allocate LSP tunnel
Managing LSP Tunnels (MPLS)
....................................................................................................................................................................................................................................
Result: The list window is shown.
...................................................................................................................................................................................................

2 Select one or more items in the list.


...................................................................................................................................................................................................

3 Select Action > LSP Tunnels > Allocate.


...................................................................................................................................................................................................

4 Select one of the options in the confirmation box. Refer to the procedure “Confirm the
action” (p. 11-40).
Result: At the beginning of the operation, the LSP tunnel Working state is set to
Allocating. Then, the 1350 OMS PKT checks the continuity of the route. Then, the
LSP tunnel List is updated.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
15-50 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
MPLS Provisioning Management Deallocate LSP tunnel
Managing LSP Tunnels (MPLS)
....................................................................................................................................................................................................................................

Deallocate LSP tunnel


When to use
This operation allows to the user to deallocate an LSP tunnel.

Related information
For information about LSP tunnel, see: “LSP Tunnel” (p. 11-66).
Deallocation phase
The 1350 OMS PKT retrieves all MPLS Transport Links used by this LSP tunnel. It
updates for each of them available and used bandwidths for the used direction. It frees the
involved MPLS Labels.
The LSP links and the LSP cross connections are also retrieved and deleted.
The LSP Tunnel is de-allocated:
• Bandwidth of each Transport Links used by the LSP tunnel are updated.
• If no more LSP Tunnel is carried, the Usage State of Transport Links used by the LSP
tunnel is changed to idle.
• MPLS Label of each Transport Link involved in LSP links is released.
Deallocation states
The LSP tunnel is also updated with the following states:
• Provisioning State: Defined.
• Working State: Normal.

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Conditions
To get a positive result:
• The provisioning state of the selected LSP tunnel must be set to Allocated.
• The working state must be set to Normal (if not, an operation is running on it).
• The LSP tunnel state is not busy.

Task
From MS-GUI main window:
...................................................................................................................................................................................................

1 Select Search > Packet > Construction > MPLS > LSP Tunnels.

....................................................................................................................................................................................................................................
1350 OMS 15-51
8DG42227DAAA 9.6
Issue 3 December 2012
MPLS Provisioning Management Deallocate LSP tunnel
Managing LSP Tunnels (MPLS)
....................................................................................................................................................................................................................................
Result: The list window is shown.
...................................................................................................................................................................................................

2 Select one or more items in the list.


...................................................................................................................................................................................................

3 Select Action > Packet > LSP Tunnels > Deallocate.


...................................................................................................................................................................................................

4 Select one of the options in the confirmation box. Refer to the procedure “Confirm the
action” (p. 11-40).
Result: After confirmation, the LSP tunnel working state is set to De-allocating. Then,
the LSP tunnel List is updated.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
15-52 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
MPLS Provisioning Management List the constraints of an LSP tunnel
Managing LSP Tunnels (MPLS)
....................................................................................................................................................................................................................................

List the constraints of an LSP tunnel


When to use
This function lists the transports links added as constraints for the selected LSP tunnel.

Related information
For information about LSP tunnel, see: “LSP Tunnel” (p. 11-66).

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Conditions
To get a positive result:
• The working state must be Normal (that is no operation is running on it).

Task
From MS-GUI main window:
...................................................................................................................................................................................................

1 Select Search > Packet > Construction > MPLS > LSP Tunnels.
Result: The list window is shown.
...................................................................................................................................................................................................

2 Select one or more items in the list.


...................................................................................................................................................................................................

3 Select: Search > Packet > MPLS > LSP Tunnels > Constraints.

....................................................................................................................................................................................................................................
1350 OMS 15-53
8DG42227DAAA 9.6
Issue 3 December 2012
MPLS Provisioning Management List the constraints of an LSP tunnel
Managing LSP Tunnels (MPLS)
....................................................................................................................................................................................................................................
Result: The list window is displayed.

Figure 15-13 Constraint List related to an LSP tunnel

E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
15-54 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
MPLS Provisioning Management Description of constraints of LSP tunnel
Managing LSP Tunnels (MPLS)
....................................................................................................................................................................................................................................

Description of constraints of LSP tunnel


Attributes of a constraint
The attributes displayed for each constraint are:
• Constraint Class.
• Class Label (that is User label of the Transport Link).
• Constraint Type.

....................................................................................................................................................................................................................................
1350 OMS 15-55
8DG42227DAAA 9.6
Issue 3 December 2012
MPLS Provisioning Management Add a constraint to an LSP tunnel
Managing LSP Tunnels (MPLS)
....................................................................................................................................................................................................................................

Add a constraint to an LSP tunnel


When to use
This function adds a Transport Link as constraint to an LSP tunnel.

Related information
For information about LSP tunnel, see: “LSP Tunnel” (p. 11-66).

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Conditions
To get a positive result:
• The provisioning state of the selected LSP tunnel must be Defined.
• The working state must be Normal (that is no operation is running on it).

Task
From MS-GUI main window:
...................................................................................................................................................................................................

1 Select Search > Packet > Construction > MPLS > LSP Tunnels.
Result: The list window is shown.
...................................................................................................................................................................................................

2 Select one or more items in the list.


...................................................................................................................................................................................................

3 Select: Action > Packet > MPLS > LSP Tunnel > Add Constraints.

....................................................................................................................................................................................................................................
15-56 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
MPLS Provisioning Management Add a constraint to an LSP tunnel
Managing LSP Tunnels (MPLS)
....................................................................................................................................................................................................................................
Result:

Figure 15-14 Add Constraint to an LSP tunnel window

To add a new LSP tunnel constraint:


• Enter the User Label of the Transport Link.
• Enter a MPLS Label (optional) by using the sensitive help.
...................................................................................................................................................................................................

4 Select OK.
Result: After confirmation, the LSP tunnel constraint is added at the end of the
constraint list as the last one of the route.
Then, the LSP tunnel Constraint List is updated.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS 15-57
8DG42227DAAA 9.6
Issue 3 December 2012
MPLS Provisioning Management Delete a constraint from an LSP tunnel
Managing LSP Tunnels (MPLS)
....................................................................................................................................................................................................................................

Delete a constraint from an LSP tunnel


When to use
This function deletes one constraint related to an LSP tunnel.

Related information
For information LSP tunnel, see: “LSP Tunnel” (p. 11-66).

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Conditions
To get a positive result:
• The provisioning state of the selected LSP tunnel must be Defined.
• The working state must be Normal (that is no operation is running on it).

Task
From MS-GUI main window:
...................................................................................................................................................................................................

1 Select Search > Packet > Construction > MPLS > LSP Tunnels.
Result: The list window is shown.
...................................................................................................................................................................................................

2 Select one item in the list.


...................................................................................................................................................................................................

3 Select: Search > Packet > MPLS > LSP Tunnels > Constraints.
...................................................................................................................................................................................................

4 Select one or more items in the list.


...................................................................................................................................................................................................

5 Select Action > LSP Tunnels > Delete.


...................................................................................................................................................................................................

6 Select one of the options in the confirmation box. Refer to the procedure “Confirm the
action” (p. 11-40).

....................................................................................................................................................................................................................................
15-58 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
MPLS Provisioning Management Delete a constraint from an LSP tunnel
Managing LSP Tunnels (MPLS)
....................................................................................................................................................................................................................................
Result: After confirmation, the LSP tunnel constraints are deleted and the LSP Tunnel
Constraint List is updated.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS 15-59
8DG42227DAAA 9.6
Issue 3 December 2012
MPLS Provisioning Management View the details of the LSP tunnel constraints
Managing LSP Tunnels (MPLS)
....................................................................................................................................................................................................................................

View the details of the LSP tunnel constraints


When to use
This function gets information about a constraint of an LSP tunnel.

Related information
For information about LSP tunnel, see: “LSP Tunnel” (p. 11-66).

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.

Task
From MS-GUI main window:
...................................................................................................................................................................................................

1 Select Search > Packet > Construction > MPLS > LSP Tunnels.
Result: The list window is shown.
...................................................................................................................................................................................................

2 Select one item in the list.


...................................................................................................................................................................................................

3 Select: Search > Packet > MPLS > LSP Tunnels > Constraints.
Result: The list window is shown.
...................................................................................................................................................................................................

4 Select one or more items in the list.


...................................................................................................................................................................................................

5 Select Search > Packet > LSP Tunnels > Properties.

....................................................................................................................................................................................................................................
15-60 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
MPLS Provisioning Management View the details of the LSP tunnel constraints
Managing LSP Tunnels (MPLS)
....................................................................................................................................................................................................................................
Result: The property window is displayed.
See the following topic in this document: “Details of a LSP Tunnel Constraint”
(p. 15-62)

Figure 15-15 LSP Tunnel Constraint Properties window

E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS 15-61
8DG42227DAAA 9.6
Issue 3 December 2012
MPLS Provisioning Management Details of a LSP Tunnel Constraint
Managing LSP Tunnels (MPLS)
....................................................................................................................................................................................................................................

Details of a LSP Tunnel Constraint


Attributes of aLSP Tunnel Constraint
The attributes displayed for each constraint are:
• Constraint Class.
• Class Label (that is User label of the Transport Link).
• Constraint Type.
• MPLS Label.

....................................................................................................................................................................................................................................
15-62 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
MPLS Provisioning Management View the list of cross connections
Managing LSP Tunnels (MPLS)
....................................................................................................................................................................................................................................

View the list of cross connections


When to use
This function lists all cross connections of an LSP tunnel.

Related information
For information about LSP tunnel, see: “LSP Tunnel” (p. 11-66).

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.

Task
From MS-GUI main window:
...................................................................................................................................................................................................

1 Select Search > Packet > Construction > MPLS > LSP Tunnels.
Result: The list window is shown.
...................................................................................................................................................................................................

2 Select one item in the list.


...................................................................................................................................................................................................

3 Select: Search > Packet > LSP Tunnels > Constraints.


Result: The list window is shown.
...................................................................................................................................................................................................

4 Select one or more items in the list.


...................................................................................................................................................................................................

5 Select Search > Packet > LSP Tunnels > Cross Connections.
Result: The list window is displayed.
See the following topic in this document: “Description of the list of LSP cross
connections” (p. 15-64)
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS 15-63
8DG42227DAAA 9.6
Issue 3 December 2012
MPLS Provisioning Management Description of the list of LSP cross connections
Managing LSP Tunnels (MPLS)
....................................................................................................................................................................................................................................

Description of the list of LSP cross connections


Attributes of a LSP cross connection
The attributes displayed for each cross connection are:
• NE User label used by the LSP tunnel.
• cross connection type (LER for the extremity or LSR).
• Ingress Termination Identifier.
• Ingress MPLS Label.
• Egress Termination Identifier.
• Egress MPLS Label.

....................................................................................................................................................................................................................................
15-64 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
MPLS Provisioning Management Implement an LSP tunnel
Managing LSP Tunnels (MPLS)
....................................................................................................................................................................................................................................

Implement an LSP tunnel


When to use
This function implements LSP tunnels.

Related information
For information about LSP tunnel, see: “LSP Tunnel” (p. 11-66).
Implementation phase
Each NE involved in the LSP tunnel is provisioned as following:
• If does not exit in the NE, Traffic Descriptor is created.
• The LER and LSR connections are added to the NE.
• Extremities are activated.
Implementation states
After click Ok button, the cross connections are downloaded and then the LSP tunnel is
updated with the following states:
• Provisioning State: Implemented (or Partially Implemented).
• Working State: Normal.
• Availability Status: Normal (or Degraded or In Failure).

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Conditions
To get a positive result:
• The provisioning state of the selected LSP tunnel must be set to Allocated or
Partially implemented.
• The working state must be set to Normal (if not, an operation is running on it).

Task
From MS-GUI main window:
...................................................................................................................................................................................................

1 Select Search > Packet > Construction > MPLS > LSP Tunnels.
Result: The list window is shown.
...................................................................................................................................................................................................

2 Select one item in the list.


....................................................................................................................................................................................................................................
1350 OMS 15-65
8DG42227DAAA 9.6
Issue 3 December 2012
MPLS Provisioning Management Implement an LSP tunnel
Managing LSP Tunnels (MPLS)
....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

3 Select: Action > Packet > LSP Tunnels > Implement.


Result:

Figure 15-16 LSP Tunnel Implementation window

...................................................................................................................................................................................................

4 The user chooses an LSP tunnel and requests its implementation then its working state is
set to Implementing.
Tick the square to proceed with a VC-LSP creation command after the implementation
procedure.
...................................................................................................................................................................................................

5 Select OK.
Result: After implementation, the LSP Tunnel List is updated.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
15-66 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
MPLS Provisioning Management Get the LSP tunnel extremities
Managing LSP Tunnels (MPLS)
....................................................................................................................................................................................................................................

Get the LSP tunnel extremities


When to use
This function gets information about extremities (origin and destination) of an LSP
tunnel.

Related information
For information about LSP tunnel, see: “LSP Tunnel” (p. 11-66).

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.

Task
From MS-GUI main window:
...................................................................................................................................................................................................

1 Select Search > Packet > Construction > MPLS > LSP Tunnels.
Result: The list window is shown.
...................................................................................................................................................................................................

2 Select one item in the list.


...................................................................................................................................................................................................

3 Select Action > LSP Tunnels > Extremities.

....................................................................................................................................................................................................................................
1350 OMS 15-67
8DG42227DAAA 9.6
Issue 3 December 2012
MPLS Provisioning Management Get the LSP tunnel extremities
Managing LSP Tunnels (MPLS)
....................................................................................................................................................................................................................................
Result: The LSP Tunnel Extremities is shown.
See the following topic in this document: “Description of the list of LSP Tunnel
Extremities ” (p. 15-69)

Figure 15-17 The LSP Tunnel Extremity window

E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
15-68 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
MPLS Provisioning Management Description of the list of LSP Tunnel Extremities
Managing LSP Tunnels (MPLS)
....................................................................................................................................................................................................................................

Description of the list of LSP Tunnel Extremities


Attributes of a LSP Tunnel Extremity
The attributes displayed are:
• User Label.
• NE User Label (A).
• Termination User Label (A).
• NE User Label (Z).
• Termination User Label (Z).

....................................................................................................................................................................................................................................
1350 OMS 15-69
8DG42227DAAA 9.6
Issue 3 December 2012
MPLS Provisioning Management View the details of the LSP tunnels
Managing LSP Tunnels (MPLS)
....................................................................................................................................................................................................................................

View the details of the LSP tunnels


When to use
This function gets information about an LSP tunnel.

Related information
For information about LSP tunnel, see: “LSP Tunnel” (p. 11-66).

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.

Task
From MS-GUI main window:
...................................................................................................................................................................................................

1 Select Search > Packet > Construction > MPLS > LSP Tunnels.
Result: The list window is shown.
...................................................................................................................................................................................................

2 Select one item in the list.


...................................................................................................................................................................................................

3 Select Search > LSP Tunnels > Properties.


Result: The property window is displayed.
See the following topic in this document: “Details of a LSP Tunnel” (p. 15-71)
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
15-70 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
MPLS Provisioning Management Details of a LSP Tunnel
Managing LSP Tunnels (MPLS)
....................................................................................................................................................................................................................................

Details of a LSP Tunnel


Attributes of a LSP Tunnel
The attributes displayed for each LSP tunnel are:
• User Label.
• Parent Subnetwork.
• Usage State (Idle, Busy).
• Working State (Normal, Removing, Allocating, De-allocating, Implementing,
De-implementing).
• Provisioning State (Defined, Allocated, Partially Implemented, Implemented).
• Availability Status (Normal, Degraded, In failure).
• Consistency State (Consistent, Not consistent, Not meaningful).
• Comment.
• Last Action Type.
• Last Action Date.
• Traffic Descriptor User Label.

....................................................................................................................................................................................................................................
1350 OMS 15-71
8DG42227DAAA 9.6
Issue 3 December 2012
MPLS Provisioning Management View the inventory of VC-LSPs
Managing LSP Tunnels (MPLS)
....................................................................................................................................................................................................................................

View the inventory of VC-LSPs


When to use
This function gets information about each VC-LSP (and their states) contained in the
previously selected LSP tunnel.

Related information
For information about LSP tunnel, see: “LSP Tunnel” (p. 11-66).
From the VC-LSP Inventory List window, when you select a VC-LSP entity, you are able
to display, with the right button, a list of commands. Commands depend on the
provisioning state and availability status of this selected entity.

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.

Task
From MS-GUI main window:
...................................................................................................................................................................................................

1 Select Search > Packet > Construction > MPLS > LSP Tunnels.
Result: The list window is shown.
...................................................................................................................................................................................................

2 Select one item in the list.


...................................................................................................................................................................................................

3 Select Search > Packet > VC-LSP Inventory.


Result: The list window is displayed.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
15-72 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
MPLS Provisioning Management Description of the LSP Tunnel Inventory
Managing LSP Tunnels (MPLS)
....................................................................................................................................................................................................................................

Description of the LSP Tunnel Inventory


Attributes of a VC-LSP
The attributes displayed for each VC-LSP are:
• VC-LSP User Label.
• Parent Subnetwork.
• LSP tunnel User Label or VC-LSP User Label.
• Working State.
• Provisioning State (Defined, Allocated, Partially Implemented, Implemented,
Commissioned, Partially Configured, Configured).
• Availability Status.
• Consistency State (Consistent, Not Consistent).

....................................................................................................................................................................................................................................
1350 OMS 15-73
8DG42227DAAA 9.6
Issue 3 December 2012
MPLS Provisioning Management View the bandwidth load of LSPs
Managing LSP Tunnels (MPLS)
....................................................................................................................................................................................................................................

View the bandwidth load of LSPs


When to use
This function gets information about the bandwidth load of an LSP tunnel.

Related information
For information about LSP tunnel, see: “LSP Tunnel” (p. 11-66).

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.

Task
From MS-GUI main window:
...................................................................................................................................................................................................

1 Select Search > Packet > Construction > LSP Tunnels.


Result: The list window is shown.
...................................................................................................................................................................................................

2 Select one item in the list.


...................................................................................................................................................................................................

3 Select Search > Packet > LSP Tunnels > Bandwidth Load.

....................................................................................................................................................................................................................................
15-74 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
MPLS Provisioning Management View the bandwidth load of LSPs
Managing LSP Tunnels (MPLS)
....................................................................................................................................................................................................................................
Result:

Figure 15-18 LSP Tunnel (Best Effort) Bandwidth Load window

Figure 15-19 LSP Tunnel (Assured Forwarding) Bandwidth Load window

....................................................................................................................................................................................................................................
1350 OMS 15-75
8DG42227DAAA 9.6
Issue 3 December 2012
MPLS Provisioning Management View the bandwidth load of LSPs
Managing LSP Tunnels (MPLS)
....................................................................................................................................................................................................................................
Figure 15-20 LSP Tunnel (Expedited Forwarding) Bandwidth Load window

E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
15-76 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
MPLS Provisioning Management View the route of LSP Tunnels
Managing LSP Tunnels (MPLS)
....................................................................................................................................................................................................................................

View the route of LSP Tunnels


When to use
This function presents graphically all Transport Links used by the previously selected
LSP tunnel.

Related information
For information about LSP tunnel, see: “LSP Tunnel” (p. 11-66).

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.

Task
From MS-GUI main window:
...................................................................................................................................................................................................

1 Select Search > Packet > Construction > MPLS > LSP Tunnels.
Result: The list window is shown.
...................................................................................................................................................................................................

2 Select one item in the list.


...................................................................................................................................................................................................

3 Select Search > Packet > LSP Tunnels > Display Route.

....................................................................................................................................................................................................................................
1350 OMS 15-77
8DG42227DAAA 9.6
Issue 3 December 2012
MPLS Provisioning Management View the route of LSP Tunnels
Managing LSP Tunnels (MPLS)
....................................................................................................................................................................................................................................
Result:

Figure 15-21 LSP Tunnel Route window

Appear in blue the Transport Links used by the LSP tunnel.


The following commands are available from the graphical view, depending on the
selected object and its position on the route:
• With no selection: Begin of Route and End of Route commands highlights the
NE used for the beginning or the end of the route.
• With a selected entity (NE, Transport Link, ENE, Off page connector): Begin of
Route and End of Route commands are completed by other commands depending
on the selected entity.

E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
15-78 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
MPLS Provisioning Management View the list of the Transport Links related to an LSP Tunnel
Managing LSP Tunnels (MPLS)
....................................................................................................................................................................................................................................

View the list of the Transport Links related to an LSP Tunnel


When to use
This function consists in listing the Transport Links related to a previously selected LSP
tunnel.

Related information
For information about LSP tunnel, see: “LSP Tunnel” (p. 11-66).

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.

Task
From MS-GUI main window:
...................................................................................................................................................................................................

1 Select Search > Packet > Construction > MPLS > LSP Tunnels.
Result: The list window is shown.
...................................................................................................................................................................................................

2 Select one item in the list.


...................................................................................................................................................................................................

3 Select Search > Packet > LSP Tunnels > List Transport Links.
Result: The list window is displayed.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS 15-79
8DG42227DAAA 9.6
Issue 3 December 2012
MPLS Provisioning Management Description of the LSP Tunnel inventory
Managing LSP Tunnels (MPLS)
....................................................................................................................................................................................................................................

Description of the LSP Tunnel inventory


Attributes of a Transport Link
The attributes displayed for each listed Transport Link are:
• LSP Tunnel User Label.
• Transport link User Label.
• MPLS Label.

....................................................................................................................................................................................................................................
15-80 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
MPLS Provisioning Management Overview
Managing VC-LSP (MPLS)
....................................................................................................................................................................................................................................

Managing VC-LSP (MPLS)

Overview
Purpose
This section provides information about VC-LSP management.

Contents

Overview about VC-LSP 15-82


View the list of VC-LSPs 15-83
Description of the list of VC-LSPs 15-84
Create a VC-LSP 15-85
Modify a VC-LSP 15-89
Delete a VC-LSP 15-91
Implement a VC-LSP 15-92
De-implement a VC-LSP 15-94
Commission a VC-LSP 15-96
De-commission a VC-LSP 15-98
Get the VC-LSP extremities 15-99
Description of the list of VC-LSP Extremities 15-101
View the details of the VC-LSPs 15-102
Details of a VC-LSP 15-103

....................................................................................................................................................................................................................................
1350 OMS 15-81
8DG42227DAAA 9.6
Issue 3 December 2012
MPLS Provisioning Management Overview about VC-LSP
Managing VC-LSP (MPLS)
....................................................................................................................................................................................................................................

Overview about VC-LSP


VC-LSP description
VC-LSP is an infrastructure which can carry one Ethernet Segment.
A VC-LSP can be carried by one LSP tunnel with the same QoS. A VC-LSP can be
carried by a Link Over Cable between ISA PR EA and ISA PR board or between ISA
ES16 and ISA PR.
The VC-LSP management tool chain gives the order in which the available actions can be
performed.

Figure 15-22 VC-LSP management chain

....................................................................................................................................................................................................................................
15-82 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
MPLS Provisioning Management View the list of VC-LSPs
Managing VC-LSP (MPLS)
....................................................................................................................................................................................................................................

View the list of VC-LSPs


When to use
The VC-LSP List window presents all the VC-LSPs and their attributes.

Related information
For information about LSP tunnel, see: “LSP Tunnel” (p. 11-66).
If this list is required from the LSP Tunnel List, only the VC-LSPs supported by the
selected LSP tunnel is displayed.

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.

Task
From MS-GUI main window:
...................................................................................................................................................................................................

1 Select: Search > Packet > MPLS.


Result: The MPLS menu is displayed.
...................................................................................................................................................................................................

2 Select: VC-LSPs.
Result: The VC-LSP list window is displayed.
See the following topic in this document: “Description of the list of VC-LSPs”
(p. 15-84)
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS 15-83
8DG42227DAAA 9.6
Issue 3 December 2012
MPLS Provisioning Management Description of the list of VC-LSPs
Managing VC-LSP (MPLS)
....................................................................................................................................................................................................................................

Description of the list of VC-LSPs


Attributes of a VC-LSP
The attributes displayed for each VC-LSP are:
• User Label.
• Parent Subnetwork.
• Working State (None, Normal, Implementing, De-implementing, Commissioning,
De-commissioning).
• Provisioning State (Allocated, Partially Implemented, Implemented,
Commissioned).
• Availability Status (Normal, Not meaningful, In failure).
• Consistency State (Consistent, Not Consistent, Not meaningful).

....................................................................................................................................................................................................................................
15-84 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
MPLS Provisioning Management Create a VC-LSP
Managing VC-LSP (MPLS)
....................................................................................................................................................................................................................................

Create a VC-LSP
When to use
This function consists in creating a Virtual Connection LSP.

Related information
For information about LSP tunnel, see: “LSP Tunnel” (p. 11-66).
If this action is required from the Transport Link List, the Origin and the Destination
fields are filled with the information contained in the selected Transport Link.
If this action is required from the LSP tunnel List, the Origin, the Destination fields, and
LSP Tunnel user label, are filled with the information contained in the selected LSP
tunnel.
Creation state
The VC-LSP is created into the 1350 OMS PKT with the following state:
• Working State: Normal.
• Provisioning State: Allocated.
• Availability Status: Not Meaningful.
• Consistency State: Not Meaningful.
At the same time, the consumed bandwidth and used MPLS label of the VC-LSP is
reserved. And the related Traffic Descriptor is associated to this VC-LSP.
If the Usage State is idle, the Usage State of supporting LSP tunnel or Transport Link is
set to busy.

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Conditions
To get a positive result:
• if the creating VC-LSP is based on Transport Link, the provisioning state of the
concerned MPLS Transport Link must be configured. See “View the list of Transport
Links” (p. 15-23).
• if the creating VC-LSP is based on LSP tunnel, the provisioning state of the
concerned LSP tunnel must be allocated. See “View the list of LSP tunnels”
(p. 15-41).
• The User Label must be not in use.

....................................................................................................................................................................................................................................
1350 OMS 15-85
8DG42227DAAA 9.6
Issue 3 December 2012
MPLS Provisioning Management Create a VC-LSP
Managing VC-LSP (MPLS)
....................................................................................................................................................................................................................................
Task
From MS-GUI main window:
...................................................................................................................................................................................................

1 Select Search > Packet > Construction > MPLS > VC-LSPs.
Result: The list window is shown.
...................................................................................................................................................................................................

2 Select one item in the list.


...................................................................................................................................................................................................

3 Select Action > Packet > Construction > Create VC-LSP.

....................................................................................................................................................................................................................................
15-86 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
MPLS Provisioning Management Create a VC-LSP
Managing VC-LSP (MPLS)
....................................................................................................................................................................................................................................
Result:

Figure 15-23 VC-LSP Creation window

To create a VC-LSP:
• Enter a VC-LSP User label.
• Enter a Comment (optional).
• If the extremity is an ENE, in the Origin and Destination areas, tick the ENE box.
• Choose the User Label.
• Choose the Termination Identifier. The object can be the TDM termination
Identifier or ETP identifier.
• Select a Traffic Descriptor User Label by using the sensitive help.

....................................................................................................................................................................................................................................
1350 OMS 15-87
8DG42227DAAA 9.6
Issue 3 December 2012
MPLS Provisioning Management Create a VC-LSP
Managing VC-LSP (MPLS)
....................................................................................................................................................................................................................................
• Choose the LSP Tunnel User Label. The action is only needed if the VC-LSP is
based on LSP tunnel. If this field is filled, as the LSP tunnel is unidirectional, the
origin and destination of the VC-LSP must be the same as the chosen LSP tunnel.
• Select a MPLS Label (optional).
• Tick the Process with VC-LSP Implementation box if you want to implement the
VC-LSP just after the VC-LSP creation; the VC-LSP is implemented.
...................................................................................................................................................................................................

4 Click Ok.
Result: The tree area, the opened graphical view and the VC-LSP List are updated.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
15-88 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
MPLS Provisioning Management Modify a VC-LSP
Managing VC-LSP (MPLS)
....................................................................................................................................................................................................................................

Modify a VC-LSP
When to use
The function modifies VC-LSP characteristics.

Related information
The VC-LSP modification gives the possibility to modify:
• VC-LSP User Label.
• Comment.
For information about LSP tunnel, see: “LSP Tunnel” (p. 11-66).

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Conditions
To get a positive result:
• If the User Label is modified, the new User Label must be different as one which is
already used by another LSP tunnel.

Task
From MS-GUI main window:
...................................................................................................................................................................................................

1 Select Search > Packet > Construction > MPLS > VC-LSPs.
Result: The list window is shown.
...................................................................................................................................................................................................

2 Select one or more items in the list.


...................................................................................................................................................................................................

3 Select Action > VC-LSPs > Modify.

....................................................................................................................................................................................................................................
1350 OMS 15-89
8DG42227DAAA 9.6
Issue 3 December 2012
MPLS Provisioning Management Modify a VC-LSP
Managing VC-LSP (MPLS)
....................................................................................................................................................................................................................................
Result:

Figure 15-24 VC-LSP Modification window

...................................................................................................................................................................................................

4 To modify a VC-LSP:
• Enter a new User Label (optional).
• Modify the Comment (optional).
...................................................................................................................................................................................................

5 Select OK.
Result: After confirmation, the tree area and the VC-LSP list are updated.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
15-90 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
MPLS Provisioning Management Delete a VC-LSP
Managing VC-LSP (MPLS)
....................................................................................................................................................................................................................................

Delete a VC-LSP
When to use
This function consists in deleting a VC-LSP from the 1350 OMS PKT supervision.

Related information
For information about LSP tunnel, see: “LSP Tunnel” (p. 11-66).

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Conditions
To get a positive result:
• The provisioning state of the selected VC-LSP must be set to Allocated.

Task
From MS-GUI main window:
...................................................................................................................................................................................................

1 Select Search > Packet > MPLS > VC-LSPs.


Result: The list window is shown.
...................................................................................................................................................................................................

2 Select one or more items in the list.


...................................................................................................................................................................................................

3 Select Action > Packet > MPLS > VC-LSPs > Delete or Click the third key of the mouse
and Delete.
...................................................................................................................................................................................................

4 Select one of the options in the confirmation box. Refer to the procedure “Confirm the
action” (p. 11-40).
Result: After confirmation, the VC-LSPs are removed.
The reserved bandwidth and MPLS label are free. If the supporting LSP tunnel or
Transport Link contains no more VC-LSP, the usage state of is set to idle.
The VC-LSP list, the tree area, and the opened graphical views are updated.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS 15-91
8DG42227DAAA 9.6
Issue 3 December 2012
MPLS Provisioning Management Implement a VC-LSP
Managing VC-LSP (MPLS)
....................................................................................................................................................................................................................................

Implement a VC-LSP
When to use
This function consists in implementing a VC-LSP.

Related information
For information about LSP tunnel, see: “LSP Tunnel” (p. 11-66).
Implementation phase
Each NE involved in the VC-LSP is provisioned by doing the following actions:
• Traffic Descriptor is created if does not exist in the NE.
• Implement the connections (defined by port and label) or cross connections.
After the implementation of the VC-LSP,the working state is set to Normal, the
provisioning state is set to Implemented, and the Consistency State is set to
Consistent.
The VC-LSP List is updated and the VC-LSP appears in the “View the list of links over
MPLS” (p. 14-89) and in the “View the list of Transport Links” (p. 15-23).

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Conditions
To get a positive result:
• The provisioning state of the selected VC-LSP must be set to Allocated or Partially
implemented.
• The working state of the selected VC-LSP must be set to Normal (if not, an operation
is running on it).
• If the VC-LSP is based on LSP tunnel, the Provisioning State of the associated LSP
tunnel must be Implemented.
• The NE extremities must not be locked (that is audit, alignment, reserve are not in
progress).

Task
From MS-GUI main window:
...................................................................................................................................................................................................

1 Select Search > Packet > Construction > MPLS > VC-LSPs.

....................................................................................................................................................................................................................................
15-92 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
MPLS Provisioning Management Implement a VC-LSP
Managing VC-LSP (MPLS)
....................................................................................................................................................................................................................................
Result: The list window is shown.
...................................................................................................................................................................................................

2 Select one item in the list.


...................................................................................................................................................................................................

3 Select: Action > Packet > MPLS > VC-LSP > Implement.
...................................................................................................................................................................................................

4 Select one of the options in the confirmation box. Refer to the procedure “Confirm the
action” (p. 11-40).
Result: The working state of the VC-LSP is set to Implemented.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS 15-93
8DG42227DAAA 9.6
Issue 3 December 2012
MPLS Provisioning Management De-implement a VC-LSP
Managing VC-LSP (MPLS)
....................................................................................................................................................................................................................................

De-implement a VC-LSP
When to use
This function consists in de-implementing a VC-LSP.

Related information
For information about LSP tunnel, see: “LSP Tunnel” (p. 11-66).
Deimplementation phase
For each NE involved in the VC-LSP, the following action is performed:
• The LER connections are deleted from the NE.
• Traffic Descriptor is deleted from the NE when no LSP tunnel or VC-LSP connection
use it.
After de-implementation, the VC-LSP provisioning state is set to Allocated, the
availability status changes to Not-Meaningful, and working state is set to Normal.
In case of error, provisioning state is set to partially implemented.
The VC-LSP List is updated and the VC-LSP disappears in the “View the list of links
over MPLS” (p. 14-89) and in the “View the list of Transport Links” (p. 15-23).

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Conditions
To get a positive result:
• The provisioning state of the selected VC-LSP must be set to implemented or
Partially implemented.
• The working state of the selected VC-LSP must be set to Normal (if not, an operation
is running on it).
• If the VC-LSP is based on LSP tunnel, the Provisioning State of the associated LSP
tunnel must be Implemented.
• The NE extremities must not be locked (that is audit, alignment, reserve are not in
progress).

Task
From MS-GUI main window:
...................................................................................................................................................................................................

1 Select Search > Packet > Construction > MPLS > VC-LSPs.

....................................................................................................................................................................................................................................
15-94 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
MPLS Provisioning Management De-implement a VC-LSP
Managing VC-LSP (MPLS)
....................................................................................................................................................................................................................................
Result: The list window is shown.
...................................................................................................................................................................................................

2 Select one item in the list.


...................................................................................................................................................................................................

3 Select: Action > Packet > MPLS > VC-LSP > Deimplement.
...................................................................................................................................................................................................

4 Select one of the options in the confirmation box. Refer to the procedure “Confirm the
action” (p. 11-40).
Result: The working state of the VC-LSP is set to Deimplemented and no traffic
could be carried by it.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS 15-95
8DG42227DAAA 9.6
Issue 3 December 2012
MPLS Provisioning Management Commission a VC-LSP
Managing VC-LSP (MPLS)
....................................................................................................................................................................................................................................

Commission a VC-LSP
When to use
This function consists in commissioning a VC-LSP.

Related information
For information about LSP tunnel, see: “LSP Tunnel” (p. 11-66).
Commission phase
This operation is an “administrative” operation. It allows to notify the availability of the
VC-LSP to be used as a transport infrastructure to carry Ethernet Segments.
After the commission of the VC-LSP, the working state is set to Normal, the
provisioning state is set to Commissioned. According to the Transport Link availability
status, the availability status changes to Normal, Degraded, or In Failure .
The VC-LSP List is updated.

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Conditions
To get a positive result:
• The provisioning state of the selected VC-LSP must be set to implemented.
• The working state of the selected VC-LSP must be set to Normal (if not, an operation
is running on it).

Task
From MS-GUI main window:
...................................................................................................................................................................................................

1 Select Search > Packet > Construction > MPLS > VC-LSPs.
...................................................................................................................................................................................................

2 Select one item in the list.


...................................................................................................................................................................................................

3 Select: Action > Packet > MPLS > VC-LSP > Commission.
...................................................................................................................................................................................................

4 Select one of the options in the confirmation box. Refer to the procedure “Confirm the
action” (p. 11-40).
....................................................................................................................................................................................................................................
15-96 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
MPLS Provisioning Management Commission a VC-LSP
Managing VC-LSP (MPLS)
....................................................................................................................................................................................................................................
Result: The working state of the VC-LSP is set to Commissioned.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS 15-97
8DG42227DAAA 9.6
Issue 3 December 2012
MPLS Provisioning Management De-commission a VC-LSP
Managing VC-LSP (MPLS)
....................................................................................................................................................................................................................................

De-commission a VC-LSP
When to use
This function consists in decommissioning a VC-LSP.

Related information
For information about LSP tunnel, see: “LSP Tunnel” (p. 11-66).
Decommission phase
After de-commission, for each concerned VC-LSP, the provisioning state is set to
Implemented and the working state is set to Normal.
The VC-LSP List is updated.

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Conditions
To get a positive result:
• The provisioning state of the selected VC-LSP must be set to Commissioned.
• The working state of the selected VC-LSP must be set to Normal (if not, an operation
is running on it).

Task
From MS-GUI main window:
...................................................................................................................................................................................................

1 Select Search > Packet > Construction > MPLS > VC-LSPs.
...................................................................................................................................................................................................

2 Select one item in the list.


...................................................................................................................................................................................................

3 Select: Action > Packet > MPLS > VC-LSP > Decommission.
...................................................................................................................................................................................................

4 Select one of the options in the confirmation box. Refer to the procedure “Confirm the
action” (p. 11-40).
Result: The working state of each concerned VC-LSP is set to decommissioning.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
15-98 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
MPLS Provisioning Management Get the VC-LSP extremities
Managing VC-LSP (MPLS)
....................................................................................................................................................................................................................................

Get the VC-LSP extremities


When to use
This function gets information about the extremities (origin and destination) of a VC-LSP.

Related information
For information about LSP tunnel, see: “LSP Tunnel” (p. 11-66).

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.

Task
From MS-GUI main window:
...................................................................................................................................................................................................

1 Select Search > Packet > Construction > LSP Tunnels.


Result: The list window is shown.
...................................................................................................................................................................................................

2 Select one item in the list.


...................................................................................................................................................................................................

3 Select Search > Packet >LSP Tunnels > Extremities.

....................................................................................................................................................................................................................................
1350 OMS 15-99
8DG42227DAAA 9.6
Issue 3 December 2012
MPLS Provisioning Management Get the VC-LSP extremities
Managing VC-LSP (MPLS)
....................................................................................................................................................................................................................................
Result: The list window is displayed.
See the following topic in this document: “Description of the list of VC-LSP
Extremities” (p. 15-101)

Figure 15-25 VC-LSP Extremities window

E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
15-100 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
MPLS Provisioning Management Description of the list of VC-LSP Extremities
Managing VC-LSP (MPLS)
....................................................................................................................................................................................................................................

Description of the list of VC-LSP Extremities


Attributes of a VC-LSP Extremity
The attributes displayed are:
• User Label.
• NE User Label (A).
• Termination User Label (A).
• MPLS Tunnel Index (A).
• MPLS Tunnel Instance (A).
• NE User Label (Z).
• Termination User Label (Z).
• MPLS Tunnel Index (Z).
• MPLS Tunnel Instance (Z).

....................................................................................................................................................................................................................................
1350 OMS 15-101
8DG42227DAAA 9.6
Issue 3 December 2012
MPLS Provisioning Management View the details of the VC-LSPs
Managing VC-LSP (MPLS)
....................................................................................................................................................................................................................................

View the details of the VC-LSPs


When to use
This function gets information about a VC-LSP.

Related information
For information about LSP tunnel, see: “LSP Tunnel” (p. 11-66).

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.

Task
From MS-GUI main window:
...................................................................................................................................................................................................

1 Select Search > Packet > Construction > MPLS > VC-LSPs.
Result: The list window is shown.
...................................................................................................................................................................................................

2 Select one item in the list.


...................................................................................................................................................................................................

3 Select Search > VC-LSPs > Properties.


Result: The list window is displayed.
See the following topic in this document: “Details of a VC-LSP” (p. 15-103)
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
15-102 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
MPLS Provisioning Management Details of a VC-LSP
Managing VC-LSP (MPLS)
....................................................................................................................................................................................................................................

Details of a VC-LSP
Attributes of a VC-LSP
The attributes displayed for each VC-LSP are:
• User Label.
• Parent SubNetwork.
• Traffic Descriptor.
• Working State (None, Normal, Implementing, De-implementing, Commissioning,
De-commissioning).
• Provisioning State (Allocated, Partially Implemented, Implemented,
Commissioned).
• Availability Status (Normal, Not meaningful, In failure).
• Consistency State (Consistent, Not Consistent, Not meaningful).
• Comment.
• MPLS Label.
• Last Action Type.
• Last Action Date.

....................................................................................................................................................................................................................................
1350 OMS 15-103
8DG42227DAAA 9.6
Issue 3 December 2012
MPLS Provisioning Management Details of a VC-LSP

....................................................................................................................................................................................................................................

....................................................................................................................................................................................................................................
15-104 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
16 16
T-MPLS Provisioning
Management

Overview
Purpose
This chapter describes how to provision and monitor the T-MPLS data.

Contents

Managing T-MPLS PHB profile 16-5


Overview about PHB profile management 16-5
View the list of PHB profiles (T-MPLS) 16-6
Description of the list of T-MPLS PHB Profiles 16-7
Create a PHB profile (T-MPLS) 16-8
Modify a PHB profiles (T-MPLS) 16-9
Delete a PHB profile (T-MPLS) 16-11
View the details of the PHB profiles (T-MPLS) 16-13
Managing Transport Links (T-MPLS) 16-14
Overview about Transport Links 16-14
View the list of Transport Links 16-16
Description of the list of T-MPLS Transport Links 16-17
Define the Transport Link characteristics 16-18
Get the Transport Link extremities 16-20
Description of the list of Transport Link Extremities 16-22
View the details of the Transport Links 16-23
Details of a T-MPLS Transport Link 16-24
View the bandwidth load of Transport Links 16-25
View the inventory of Transport Links 16-28
Description of the inventory of Transport Links 16-30
Managing Virtual Transport (T-MPLS) 16-31

...................................................................................................................................................................................................................................
1350 OMS 16-1
8DG42227DAAA 9.6
Issue 3 December 2012
T-MPLS Provisioning Management Overview

....................................................................................................................................................................................................................................

Overview about Virtual Transports 16-31


View the list of Virtual Transports 16-33
Description of the list of Virtual Transports 16-34
Create a Virtual Transport 16-35
Modify a Virtual Transport 16-37
Delete a Virtual Transport 16-39
View the details of the Virtual Transport 16-40
Details of a Virtual Transport 16-41
Configuration of a Virtual Transport 16-42
Implement a Virtual Transport 16-44
De-implement a Virtual Transport 16-46
View the Virtual Transport extremities 16-48
Description of the list of Virtual Transports 16-49
Managing Pseudo Wires (T-MPLS) 16-50
Overview about Pseudo Wires 16-50
View the list of Pseudo Wires 16-51
Description of the list of Pseudo Wires 16-52
Create a Pseudo Wire 16-53
Modify a PseudoWire 16-55
Delete a Pseudo Wire 16-57
View the details of the Pseudo Wires 16-58
Details of a Pseudo Wire 16-59
Configuration of the route of a Pseudo Wire 16-60
Delete a constraint from a Pseudo Wire 16-62
Configuration of PHB profile of a Pseudo Wire 16-64
Configuration of Layer-2 encapsulation of a Pseudo Wire 16-66
Allocate Pseudo Wire 16-67
De-allocate Pseudo Wire 16-70
Implement a Pseudo Wire 16-72
De-implement a Pseudo Wire 16-74
List the constraints of a Pseudo Wire 16-76
Description of the list of Pseudo Wire Constraints 16-77
View the details of the Pseudo Wire constraints 16-78
Details of a Pseudo Wire Constraint 16-79
View the list of cross connections 16-80

....................................................................................................................................................................................................................................
16-2 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
T-MPLS Provisioning Management Overview

....................................................................................................................................................................................................................................

Description of the list of PW Cross Connections 16-81


View the Pseudo Wire extremities 16-82
Description of the list of PW Extremities 16-83
View the section inventory from Pseudo Wire 16-84
Description of the T-MPLS section Inventory 16-85
View the bandwidth load of Pseudo Wire 16-86
View the route of Pseudo Wires 16-87
View the Pseudo Wires crossing a Pseudo Wire 16-88
Description of the list of Pseudo Wires 16-89
T-MPLS tunnel schema 16-90
T-MPLS tunnel schema 16-90
Ethernet Services in the T-MPLS Domain 16-93
Managing T-MPLS tunnels 16-97
T-MPLS tunnel description 16-97
View the list of T-MPLS tunnels 16-99
Description of the list of T-MPLS tunnels 16-100
Create a T-MPLS tunnel 16-101
Modify a T-MPLS tunnel 16-104
Delete a T-MPLS tunnel 16-106
View the details of the T-MPLS tunnels 16-107
Details of a T-MPLS tunnel 16-108
Configuration of the route of a T-MPLS tunnel 16-109
Delete a constraint from a T-MPLS tunnel 16-111
Configuration of PHB profile of a T-MPLS tunnel 16-113
Configuration of Layer-2 encapsulation of a tunnel 16-115
Allocate T-MPLS tunnel 16-117
De-allocate T-MPLS tunnel 16-120
Implement a T-MPLS tunnel 16-122
De-implement a T-MPLS tunnel 16-124
List the constraints of a T-MPLS tunnel 16-126
Description of the list of T-MPLS tunnel Constraints 16-127
View the details of the T-MPLS tunnel constraints 16-128
Details of a T-MPLS tunnel Constraint 16-129
View the list of cross connections 16-130
Description of the list of T-MPLS tunnel Cross Connections 16-131

....................................................................................................................................................................................................................................
1350 OMS 16-3
8DG42227DAAA 9.6
Issue 3 December 2012
T-MPLS Provisioning Management Overview

....................................................................................................................................................................................................................................

View the T-MPLS tunnel extremities 16-132


Description of the list of T-MPLS tunnel Extremities 16-133
View the section inventory from T-MPLS tunnel 16-134
Description of the Inventory of sections 16-135
View the bandwidth load of T-MPLS tunnel 16-136
View the route of T-MPLS tunnels 16-137
View the Pseudo Wires crossing a T-MPLS tunnel 16-138
Description of the list of Pseudo Wires 16-139
Tunnel protection 16-140
Tunnel protection create 16-140
T-MPLS Routing display 16-144
Tunnel switch commands 16-147
Other info on T-MPLS routing display 16-152
MAC Flushing Protection 16-156
MAC flushing protection description 16-157
MAC flushing protection creation 16-158
MAC flushing protection list 16-160
Attributes of MAC-flushing protection 16-161
Interconnection Scheme list 16-162
Attributes of Interconnection Schemes 16-163
TMPLS EVC: Force MAC flushing 16-164
Tunnel Redundancy 16-165
Description 16-166
Create one-to-one-open protection 16-173
Create Dual-point-to-point Protection 16-175
Create MAC Flushing Protection Schema 16-177
EVC setup 16-178

....................................................................................................................................................................................................................................
16-4 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
T-MPLS Provisioning Management Overview about PHB profile management
Managing T-MPLS PHB profile
....................................................................................................................................................................................................................................

Managing T-MPLS PHB profile

Overview about PHB profile management


PHB profile description
T-MPLS manages the PHB profile configuration in the network.
PKT manages LSP PHB profile creation on domain basis. The creation affects PKT
database only.
The system checks that the requested profile is compatible with the PHB profile on
domain basis.
The LSP PHB profile is created in the network only at tunnel/PW implementation time,
on all nodes crossed by the tunnel.
The elementary LSP PHB profiles automatically created in each NE are called
Node-PHB-Profiles and the system manages their consistency status.
The Node-PHB-Profile exists in PKT database only if there exists an associated
implemented tunnel/PW.
PKT manages PHB profile configuration on domain basis. PHB profile configuration is
allowed only when no traffic is supported, that is, no associated Node-PHB-Profiles exist
and no implemented tunnel/PW is associated to the PHB profile.

....................................................................................................................................................................................................................................
1350 OMS 16-5
8DG42227DAAA 9.6
Issue 3 December 2012
T-MPLS Provisioning Management View the list of PHB profiles (T-MPLS)
Managing T-MPLS PHB profile
....................................................................................................................................................................................................................................

View the list of PHB profiles (T-MPLS)


When to use
This function lists all the PHB profiles.

Related information
For information about LSP PHB profiles, see: “Overview about PHB profile management
” (p. 16-5).
The elementary LSP PHB profiles automatically created in each NE are called
Node-PHB-Profiles. The Node-PHB-Profile exists in PKT database only if there exists an
associated implemented tunnel/PW.

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.

Task
From MS-GUI main window:
...................................................................................................................................................................................................

1 Select Search > Packet > T-MPLS.


Result: The T-MPLS menu is displayed.
...................................................................................................................................................................................................

2 Select QoS > T-MPLS PHB Profile.


Result: The tb-limMplsTransportLinkLSP PHB profile list is displayed.
See the following topic in this document: “Description of the list of T-MPLS PHB
Profiles” (p. 16-7)
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
16-6 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
T-MPLS Provisioning Management Description of the list of T-MPLS PHB Profiles
Managing T-MPLS PHB profile
....................................................................................................................................................................................................................................

Description of the list of T-MPLS PHB Profiles


Attributes of a T-MPLS PHB Profile
T-MPLS manages the PHB profile configuration in the network.
PKT manages LSP PHB profile creation on domain basis. The creation affects PKT
database only.
The system checks that the requested profile is compatible with the PHB profile on
domain basis.
The LSP PHB profile is created in the network only at tunnel/PW implementation time,
on all nodes crossed by the tunnel.
The elementary LSP PHB profiles automatically created in each NE are called
Node-PHB-Profiles and the system manages their consistency status.
The Node-PHB-Profile exists in PKT database only if there exists an associated
implemented tunnel/PW.
PKT manages PHB profile configuration on domain basis. PHB profile configuration is
allowed only when no traffic is supported, that is, no associated Node-PHB-Profiles exist
and no implemented tunnel/PW is associated to the PHB profile.
The attributes displayed for each item are:
• User Label.
• Native PHB(True, False).
• Exp-0, …, Exp-7.

....................................................................................................................................................................................................................................
1350 OMS 16-7
8DG42227DAAA 9.6
Issue 3 December 2012
T-MPLS Provisioning Management Create a PHB profile (T-MPLS)
Managing T-MPLS PHB profile
....................................................................................................................................................................................................................................

Create a PHB profile (T-MPLS)


When to use
This function creates PHB profiles.

Related information
For information about LSP PHB profiles, see: “Overview about PHB profile management
” (p. 16-5).
PKT manages LSP PHB profile creation on domain basis.
Note: The creation affects PKT database only. The system checks that the requested
profile is compatible with the PHB profile on domain basis. The LSP PHB profile is
created in the network only at tunnel/PW implementation time, on all nodes crossed
by the tunnel. The elementary LSP PHB profiles automatically created in each NE are
called Node-PHB-Profiles and the system manages their consistency status. The
Node-PHB-Profile exists in PKT database only if there exists an associated
implemented tunnel/PW.

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.

Task
From MS-GUI main window:
...................................................................................................................................................................................................

1 Select Action > Packet > T-MPLS > Create T-MPLS PHB profile.
Result: To create a LSP PHB profile:
• Enter a User Label.
• Enter a Comment.
• Enter the traffic parameters.
...................................................................................................................................................................................................

2 Click Ok button.
Result: After checking the coherence of the traffic parameters values and the selected
traffic contract, the LSP PHB profile is created.
The LSP PHB profile list is updated.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
16-8 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
T-MPLS Provisioning Management Modify a PHB profiles (T-MPLS)
Managing T-MPLS PHB profile
....................................................................................................................................................................................................................................

Modify a PHB profiles (T-MPLS)


When to use
PKT manages PHB profile configuration on domain basis.

Related information
For information about LSP PHB profiles, see: “Overview about PHB profile management
” (p. 16-5).

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Conditions
To get a positive result:
• PHB profile configuration is allowed only when no traffic is supported, that is, no
associated Node-PHB-Profiles exist and no implemented tunnel/PW is associated to
the PHB profile.

Task
From MS-GUI main window:
...................................................................................................................................................................................................

1 Select Search > Packet > T-MPLS > PHB profile.


Result: The list window is shown.
...................................................................................................................................................................................................

2 Select one or more items in the list.


...................................................................................................................................................................................................

3 Select Action > Packet > T-MPLS > PHB profile > Modify or Click the third key of the
mouse and select Modify.
Result: The PHB profile modification window is displayed.
If the PHB profile is associated to an implemented tunnel/PW, only the Traffic User
Label and Comment can be modified.
...................................................................................................................................................................................................

4 To modify a PHB profile:


• Enter a new User Label (optional).
• Modify the Comment (optional).

....................................................................................................................................................................................................................................
1350 OMS 16-9
8DG42227DAAA 9.6
Issue 3 December 2012
T-MPLS Provisioning Management Modify a PHB profiles (T-MPLS)
Managing T-MPLS PHB profile
....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

5 Select OK.
Result: After confirmation of the modification: the PHB profile list is updated.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
16-10 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
T-MPLS Provisioning Management Delete a PHB profile (T-MPLS)
Managing T-MPLS PHB profile
....................................................................................................................................................................................................................................

Delete a PHB profile (T-MPLS)


When to use
This function deletes the PHB profiles.

Related information
For information about LSP PHB profiles, see: “Overview about PHB profile management
” (p. 16-5).
PKT manages PHB profile deletion on domain basis. only PHB profiles with no
associated tunnel/PW can be deleted.
Note: The deletion affects only PKT database.
PKT manages TD deletion in the NE. The deletion affect all crossed NEs at
tunnel/PW deimplementation time. TD deletion is transparent to the operator.

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Conditions
To get a positive result:
• No more Tunnel or PW are using this profile.

Task
From MS-GUI main window:
...................................................................................................................................................................................................

1 Select Search > Packet > T-MPLS > PHB profile.


Result: The list window is shown.
...................................................................................................................................................................................................

2 Select one or more items in the list.


...................................................................................................................................................................................................

3 Select Action > Packet > T-MPLS > PHB profile > Delete or Click the third key of the
mouse and select Delete.
...................................................................................................................................................................................................

4 Select one of the options in the confirmation box. Refer to the procedure “Confirm the
action” (p. 11-40).

....................................................................................................................................................................................................................................
1350 OMS 16-11
8DG42227DAAA 9.6
Issue 3 December 2012
T-MPLS Provisioning Management Delete a PHB profile (T-MPLS)
Managing T-MPLS PHB profile
....................................................................................................................................................................................................................................
Result: After confirmation, the selected PHB profiles are removed.
The PHB profile list is updated.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
16-12 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
T-MPLS Provisioning Management View the details of the PHB profiles (T-MPLS)
Managing T-MPLS PHB profile
....................................................................................................................................................................................................................................

View the details of the PHB profiles (T-MPLS)


When to use
This function gets information about the PHB profile.

Related information
For information about LSP PHB profiles, see: “Overview about PHB profile management
” (p. 16-5).

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.

Task
From MS-GUI main window:
...................................................................................................................................................................................................

1 Select Search > Packet > T-MPLS > PHB profile.


Result: The list window is shown.
...................................................................................................................................................................................................

2 Select one or more items in the list.


...................................................................................................................................................................................................

3 Select Search > Packet > T-MPLS > PHB profile > Properties or Click the third key of
the mouse and select Properties.
Result: The PHB profile properties window is displayed.
The attributes displayed for each PHB profile are:
• User Label.
• Comment.

E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS 16-13
8DG42227DAAA 9.6
Issue 3 December 2012
T-MPLS Provisioning Management Overview about Transport Links
Managing Transport Links (T-MPLS)
....................................................................................................................................................................................................................................

Managing Transport Links (T-MPLS)

Overview about Transport Links


Transport Link description
For details about Transport Links, see: “T-MPLS Transport link” (p. 11-65).
For general information about Transport Links, see: “Transport link management”
(p. 11-50).
Two kinds of Transport Link can be used as infrastructure:
• based on Link Over TDM, in this case, they can be used to carry LSP Tunnel. In that
case, the extremities of the Transport Link are TDM termination and its transport type
is Link Over TDM.
• based on Link Over Cable, in this case, they can be used to carry VC-LSP. In that
case, the extremities of the Transport Link are one Physical Port and one ETP and its
transport type is Link Over Cable.
The different steps to provide a Transport Link are the following:
• Create Transport link (in the scope of network construction).
The Transport Link is created automatically after the creation or the upload of Links
Over TDM and Links Over Cable dedicated to T-MPLS.
• Characteristic definition.
For each extremity of the Transport Link, to provision the characteristics (T-MPLS
Label range) and to activate them. The T-MPLS Label range is stored.
The Transport Link management tool chain gives the order in which the available actions
can be performed.

....................................................................................................................................................................................................................................
16-14 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
T-MPLS Provisioning Management Overview about Transport Links
Managing Transport Links (T-MPLS)
....................................................................................................................................................................................................................................

Figure 16-1 T-MPLS Transport Link management chain

....................................................................................................................................................................................................................................
1350 OMS 16-15
8DG42227DAAA 9.6
Issue 3 December 2012
T-MPLS Provisioning Management View the list of Transport Links
Managing Transport Links (T-MPLS)
....................................................................................................................................................................................................................................

View the list of Transport Links


When to use
The Transport Link list window presents all the T-MPLS Transport Links and their
attributes.

Related information
For information about Transport Link management, see: “Overview about Transport
Links” (p. 16-14).
For details about Transport Links, see: “T-MPLS Transport link” (p. 11-65).
For general information about Transport Links, see: “Transport link management”
(p. 11-50).

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.

Task
From MS-GUI main window:
...................................................................................................................................................................................................

1 Select: Search > Packet > Construction > Transport Links.


...................................................................................................................................................................................................

2 Select: Links Over T-MPLS.


Result: The T-MPLS Transport Link list is displayed.
See the following topic in this document: “Description of the list of T-MPLS
Transport Links” (p. 16-17)
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
16-16 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
T-MPLS Provisioning Management Description of the list of T-MPLS Transport Links
Managing Transport Links (T-MPLS)
....................................................................................................................................................................................................................................

Description of the list of T-MPLS Transport Links


Attributes of a T-MPLS Transport Link
The attributes displayed for each Transport Link are:
• User Label.
• Parent Subnetwork.
• Transport Type (Link Over Cable, Link Over TDM).
• Bandwidth (In Kbit/s).
• Usage State (Idle, Busy, Reserved, Not meaningful).
• Working State (Normal, Configuring, Removing).
• Provisioning State (Defined, Partially Configured, Configured).

....................................................................................................................................................................................................................................
1350 OMS 16-17
8DG42227DAAA 9.6
Issue 3 December 2012
T-MPLS Provisioning Management Define the Transport Link characteristics
Managing Transport Links (T-MPLS)
....................................................................................................................................................................................................................................

Define the Transport Link characteristics


When to use
This function consists in defining the characteristics of a Transport Link.

Related information
For information about Transport Link management, see: “Overview about Transport
Links” (p. 16-14).
For details about Transport Links, see: “T-MPLS Transport link” (p. 11-65).
For general information about Transport Links, see: “Transport link management”
(p. 11-50).
Characteristic definition
Characteristic definition of a Transport Link is made by setting T-MPLS label range and
by activation of the interface.
The proposed Static Range Min and Max depend on the type of the boards at the
extremities of the Transport Link:
• for two ISA boards (PR EA or ES16), the Min Range is equal to 1024 and the Max
range is equal to 5119.
• for one ENE (ISA PR) and one ISA PR EA, the Min Range is equal to 1024 and the
Max range is equal to 5119.
• for one ENE (not an ISA PR) and one ISA ES16 board, the label range is set to
1024-5119, by automatic configuration. The user can change it by configuration of the
Transport Link manually. In this case, the Min Range is 16 and the Max range is
5119.
The user has the possibility to change these values inside the range.
At the end, on each NE involved in the Transport Link, the physical port, or the logical
port is configured. The T-MPLS label range is stored in 1350OMS-PKT database, and the
1350 OMS PKT interface is activated.
If the selected Transport Link is based on Link Over Cable, the user can open the
VC-LSP creation window by ticking the Proceed with VC-LSP creation box.
If the selected Transport Link is based on Link Over TDM, the user can open the LSP
tunnel creation window by ticking the Proceed with LSP Tunnel creation box.

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.

....................................................................................................................................................................................................................................
16-18 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
T-MPLS Provisioning Management Define the Transport Link characteristics
Managing Transport Links (T-MPLS)
....................................................................................................................................................................................................................................
Conditions
To get a positive result:
• The Transport Link does not carry any LSP tunnel (if based on Link Over TDM) or
any VC-LSP (if based on Link Over Cable).
• The NE (extremities of the Transport Link) must not be locked (that is, audit,
alignment, ad reserve are not in progress on the NEs).
• The NE (extremities of the Transport Link) LAC state must not be granted.

Task
From MS-GUI main window:
...................................................................................................................................................................................................

1 Select: Search > Packet > Construction > Transport Links > Links Over T-MPLS.
Result: The list window is shown.
...................................................................................................................................................................................................

2 Select one or more items in the list.


...................................................................................................................................................................................................

3 Select Action > Packet > T-MPLS Transport Link > Define Characteristics or Click the
third key of the mouse and select Define Characteristics.
Result: The Define window is shown.
...................................................................................................................................................................................................

4 Select OK.
Result: After click Ok button, the Transport Link is updated with the following
states:
• Provisioning State: Configured.
• Working State: Normal.
After the characteristic definition, the Transport Link List is updated.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS 16-19
8DG42227DAAA 9.6
Issue 3 December 2012
T-MPLS Provisioning Management Get the Transport Link extremities
Managing Transport Links (T-MPLS)
....................................................................................................................................................................................................................................

Get the Transport Link extremities


When to use
This function gets information about extremities of a Transport Link.

Related information
For information about Transport Link management, see: “Overview about Transport
Links” (p. 16-14).
For details about Transport Links, see: “T-MPLS Transport link” (p. 11-65).
For general information about Transport Links, see: “Transport link management”
(p. 11-50).

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.

Task
From MS-GUI main window:
...................................................................................................................................................................................................

1 Select: Search > Packet > Construction > Transport Links > Links Over T-MPLS.
Result: The list window is shown.
...................................................................................................................................................................................................

2 Select one or more items in the list.


...................................................................................................................................................................................................

3 Select Search > Packet > T-MPLS Transport Link > Extremities or Click the third key of
the mouse and Extremities.

....................................................................................................................................................................................................................................
16-20 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
T-MPLS Provisioning Management Get the Transport Link extremities
Managing Transport Links (T-MPLS)
....................................................................................................................................................................................................................................
Result: The Transport Link Extremities window is shown.
See the following topic in this document: “Description of the list of Transport Link
Extremities” (p. 16-22)

Figure 16-2 Transport Link Extremities window

E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS 16-21
8DG42227DAAA 9.6
Issue 3 December 2012
T-MPLS Provisioning Management Description of the list of Transport Link Extremities
Managing Transport Links (T-MPLS)
....................................................................................................................................................................................................................................

Description of the list of Transport Link Extremities


Attributes of a Transport Link Extremity
The attributes displayed are:
• User Label.
• NE User Label (A).
• Termination Identifier (A).
• Activation Status (A).
• NE User Label (Z).
• Termination Identifier (Z).
• Activation Status (Z).

....................................................................................................................................................................................................................................
16-22 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
T-MPLS Provisioning Management View the details of the Transport Links
Managing Transport Links (T-MPLS)
....................................................................................................................................................................................................................................

View the details of the Transport Links


When to use
This function gets information about a Transport Link.

Related information
For information about Transport Link management, see: “Overview about Transport
Links” (p. 16-14).
For details about Transport Links, see: “T-MPLS Transport link” (p. 11-65).
For general information about Transport Links, see: “Transport link management”
(p. 11-50).

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.

Task
From MS-GUI main window:
...................................................................................................................................................................................................

1 Select: Search > Packet > Construction > Transport Links > Links Over T-MPLS.
Result: The list window is shown.
...................................................................................................................................................................................................

2 Select one or more items in the list.


...................................................................................................................................................................................................

3 Select Search > Packet > T-MPLS Transport Link > Properties or Click the third key of
the mouse and Properties.
Result: The T-MPLS Transport Link properties window is displayed.
See the following topic in this document: “Details of a T-MPLS Transport Link”
(p. 16-24)
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS 16-23
8DG42227DAAA 9.6
Issue 3 December 2012
T-MPLS Provisioning Management Details of a T-MPLS Transport Link
Managing Transport Links (T-MPLS)
....................................................................................................................................................................................................................................

Details of a T-MPLS Transport Link


Attributes of a T-MPLS Transport Link
The attributes displayed for each Transport Link are:
• User Label.
• Parent Subnetwork.
• Transport Type (Link Over Cable, Link Over TDM).
• Bandwidth (In Kbit/s).
• Usage State (Idle, Busy, Reserved, Not meaningful).
• Working State (Normal, Configuring, Removing).
• Provisioning State (Defined, Partially Configured, Configured).
• Routing Service Type.
• Directionality.
• Label Range Min.
• Label Range Max.
• Last Action Type.
• Last Action Date.

....................................................................................................................................................................................................................................
16-24 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
T-MPLS Provisioning Management View the bandwidth load of Transport Links
Managing Transport Links (T-MPLS)
....................................................................................................................................................................................................................................

View the bandwidth load of Transport Links


When to use
This function gets information about the bandwidth load of a Transport Link.

Related information
For information about Transport Link management, see: “Overview about Transport
Links” (p. 16-14).
For details about Transport Links, see: “T-MPLS Transport link” (p. 11-65).
For general information about Transport Links, see: “Transport link management”
(p. 11-50).

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.

Task
From MS-GUI main window:
...................................................................................................................................................................................................

1 Select: Search > Packet > Construction > Transport Links > Links Over T-MPLS.
Result: The list window is shown.
...................................................................................................................................................................................................

2 Select one or more items in the list.


...................................................................................................................................................................................................

3 Select Search > Packet > T-MPLS Transport Link > Bandwidth Load or Click the third
key of the mouse and select Bandwidth Load.

....................................................................................................................................................................................................................................
1350 OMS 16-25
8DG42227DAAA 9.6
Issue 3 December 2012
T-MPLS Provisioning Management View the bandwidth load of Transport Links
Managing Transport Links (T-MPLS)
....................................................................................................................................................................................................................................
Result:

Figure 16-3 Transport Link Over TDM Bandwidth Load window

....................................................................................................................................................................................................................................
16-26 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
T-MPLS Provisioning Management View the bandwidth load of Transport Links
Managing Transport Links (T-MPLS)
....................................................................................................................................................................................................................................
Figure 16-4 Transport Link Over Cable Bandwidth Load window

E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS 16-27
8DG42227DAAA 9.6
Issue 3 December 2012
T-MPLS Provisioning Management View the inventory of Transport Links
Managing Transport Links (T-MPLS)
....................................................................................................................................................................................................................................

View the inventory of Transport Links


When to use
This function gets information about each LSP tunnel and VC-LSP (and their states)
contained in the previously selected Transport Link.

Related information
For information about Transport Link management, see: “Overview about Transport
Links” (p. 16-14).
For details about Transport Links, see: “T-MPLS Transport link” (p. 11-65).
For general information about Transport Links, see: “Transport link management”
(p. 11-50).
If you select an entity (LSP Tunnel or VC-LSP) in the inventory list and click the right
button, you see a list of commands. The listed commands depend on the provisioning
state and availability status of the selected entity.

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.

Task
From MS-GUI main window:
...................................................................................................................................................................................................

1 Select: Search > Packet > Construction > Transport Links > Links Over T-MPLS.
Result: The list window is shown.
...................................................................................................................................................................................................

2 Select one or more items in the list.


...................................................................................................................................................................................................

3 Select Search > Packet > T-MPLS Transport Link > Get Inventory or Click the third key
of the mouse and select Get Inventory.

....................................................................................................................................................................................................................................
16-28 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
T-MPLS Provisioning Management View the inventory of Transport Links
Managing Transport Links (T-MPLS)
....................................................................................................................................................................................................................................
Result: The Transport Link Inventory list is displayed.

Figure 16-5 Transport Link Inventory List window

E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS 16-29
8DG42227DAAA 9.6
Issue 3 December 2012
T-MPLS Provisioning Management Description of the inventory of Transport Links
Managing Transport Links (T-MPLS)
....................................................................................................................................................................................................................................

Description of the inventory of Transport Links


Attributes of a Transport Link inventory
The attributes displayed for each LSP tunnel or VC-LSP are:
• T-MPLS Label.
• LSP Type(LSP Tunnel or VC-LSP).
• LSP tunnel or VC-LSP User Label.
• Provisioning State (Defined, Allocated, Partially Implemented, Implemented,
Commissioned, Partially Configured, Configured).
• Availability Status.

....................................................................................................................................................................................................................................
16-30 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
T-MPLS Provisioning Management Overview about Virtual Transports
Managing Virtual Transport (T-MPLS)
....................................................................................................................................................................................................................................

Managing Virtual Transport (T-MPLS)

Overview about Virtual Transports


T-MPLS Virtual Transport description
Application manages the VT creation and configuration both in database (read-write
access) and in the NE. T-MPLS and EOT are notified about VT creation and
configuration. T-MPLS and EOT can request to CORE the configuration of adaptive VTs
only. VT and VTQ information is stored in database tables that can be also read by
T-MPLS and EOT (read-only access). T-MPLS and EOT manage the bandwidth reserved
on each VT and VTQ. CORE has to know the bandwidth lock/unlock only on VT basis.
CORE does not need to know the exact amount of reserved bandwidth. The VT concept
represents a portion of the section egress bandwidth and allows to reserve that bandwidth
portion for a specific transport class. When the service is allocated (Ethernet Segment
allocated over one Transport Link or T-MPLS tunnel/PW allocated over one section), the
system associates that Ethernet Segment/tunnel/PW with one Virtual Transport (VT) of
the egress port. At allocation time, the operator can optionally specify the underlying
associated VT. If not specified by user, the system automatically associates the Ethernet
Segment/Tunnel/PW with the default Virtual Transport associated with the egress port.
The default VT initially uses all the bandwidth corresponding to the egress shaping rate.
The manual addition of new VTs over the same egress port forces the automatic reduction
of the bandwidth available to the default VT.
User is requested to create all VTs in advance to traffic implementation. PKT is also
requested to Takeover VTs existing in the network. When the operator creates a new VT,
the operator has to specify, with respect to VT bandwidth management, whether this VT
is adaptive or fixed. For fixed VTs, the VT bandwidth parameters can only be changed by
operator (carried traffic must fit VT bandwidth parameters). For adaptive VTs, the VT
bandwidth can only be changed automatically when traffic is set up or torn-down (VT
bandwidth parameters must fit traffic bandwidth demand). VTs Takeover from the
network are automatically managed by PKT as fixed VTs.

Application behavior creating T-MPLS Virtual Transport


When creates a Virtual Transport, the application:
• Checks that the section constraints describe a fully connected route between the end
nodes.
• Checks that the PW PHB profile is supported by the domain Egress PHB Profile.
• Defines the PW and updates the T-MPLS DB allocating the PW along the constraints.
• Associates the PW to a null TD (PIR=CIR=0 and PBS=CBS=0), if the user does not
specify the bandwidth parameters.

....................................................................................................................................................................................................................................
1350 OMS 16-31
8DG42227DAAA 9.6
Issue 3 December 2012
T-MPLS Provisioning Management Overview about Virtual Transports
Managing Virtual Transport (T-MPLS)
....................................................................................................................................................................................................................................
• Set the reserved CIR parameter equal to the TD CIR parameter. If an allocated service
is over one implemented PW, the PW reserved CIR represents the CIR required to
support the PW committed bandwidth, while the TD CIR represents the committed
bandwidth of the implemented PW.
• When the supported services are implemented, TD CIR is enlarged to match the
reserved CIR. If the PW are deallocated, the reserved CIR is reduced down to the TD
CIR value.
• If the user does not constrain the underlying Virtual Transport (by means of VT
parameter), the application allocates the PW on the default VT.
• If the user requests Control Word enabling (CW enabling), then CW insertion is
enabled on PW terminations at implementation time.
Note: It is not possible to create the PW using other underlying PWs. Only E-LSP
PWs are supported.

....................................................................................................................................................................................................................................
16-32 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
T-MPLS Provisioning Management View the list of Virtual Transports
Managing Virtual Transport (T-MPLS)
....................................................................................................................................................................................................................................

View the list of Virtual Transports


When to use
This function presents all the Virtual Transports and their attributes.

Related information
For information about Virtual Transports, see: “Overview about Virtual Transports”
(p. 16-31).

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.

Task
From MS-GUI main window:
...................................................................................................................................................................................................

1 Select: Search > Packet > T-MPLS.


Result: The T-MPLS menu is displayed.
...................................................................................................................................................................................................

2 Select: Virtual Transport.


Result: The Virtual Transport list is displayed.
See the following topic in this document: “Description of the list of Virtual
Transports” (p. 16-34)
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS 16-33
8DG42227DAAA 9.6
Issue 3 December 2012
T-MPLS Provisioning Management Description of the list of Virtual Transports
Managing Virtual Transport (T-MPLS)
....................................................................................................................................................................................................................................

Description of the list of Virtual Transports


Attributes of a Virtual Transport
The attributes displayed for each Pseudo Wire are:
• User Label.
• Working State (Normal, Removing, Allocating, De-allocating, Implementing,
De-implementing).
• Last Action.
• Configuration State (Idle, Busy).
• Operational State (Idle, Busy).
• Alarm Status (Normal, Degraded, In failure).
• Flow (Idle, Busy).
• Protection Role (Working, Protecting).
• Protection Status (Working, Protecting).
• Provisioning Type (Defined, Allocated, Partially Implemented, Implemented).
• Cration date.
• CIR.
• PIR.
• CBS.
• PBS.
• Reserved CIR.
• A Port ID.
• Z Port ID.
• A Port.
• Z Port.

....................................................................................................................................................................................................................................
16-34 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
T-MPLS Provisioning Management Create a Virtual Transport
Managing Virtual Transport (T-MPLS)
....................................................................................................................................................................................................................................

Create a Virtual Transport


When to use
This function manages Virtual Transport creation and allocation.

Related information
For information about Virtual Transport, see: “Overview about Virtual Transports”
(p. 16-31).
For details about the checks performed and default values assumed, refer to: “Application
behavior creating T-MPLS Virtual Transport” (p. 16-31).
Note: It is not possible to create the PW using other underlying PWs. Only E-LSP
PWs are supported.
When creates a Virtual Transport, the application:
• Checks that the section constraints describe a fully connected route between the end
nodes.
• Checks that the PW PHB profile is supported by the domain Egress PHB Profile.
• Defines the PW and updates the T-MPLS DB allocating the PW along the constraints.
• Associates the PW to a null TD (PIR=CIR=0 and PBS=CBS=0), if the user does not
specify the bandwidth parameters.
• Set the reserved CIR parameter equal to the TD CIR parameter. If an allocated service
is over one implemented PW, the PW reserved CIR represents the CIR required to
support the PW committed bandwidth, while the TD CIR represents the committed
bandwidth of the implemented PW.
• When the supported services are implemented, TD CIR is enlarged to match the
reserved CIR. If the PWs are deallocated, the reserved CIR is reduced down to the TD
CIR value.
• If the user does not constrain the underlying Virtual Transport (by means of VT
parameter), the application allocates the PW on the default VT.
• If the user requests Control Word enabling (CW enabling), then CW insertion is
enabled on PW terminations at implementation time.

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.

....................................................................................................................................................................................................................................
1350 OMS 16-35
8DG42227DAAA 9.6
Issue 3 December 2012
T-MPLS Provisioning Management Create a Virtual Transport
Managing Virtual Transport (T-MPLS)
....................................................................................................................................................................................................................................
Conditions
To get a positive result:
• The User Label must be different as one which is exists.
• The user must define the complete route of Virtual Transport in terms of section
constraints.
If the user does not define the PW route, PW is created in defined state.
Note: The creation of a PW using other underlying PWs is forbidden. Only E-LSP
PWs are supported.

Task
From MS-GUI main window:
...................................................................................................................................................................................................

1 Select Action > Packet > Construction > Create Virtual Transport.
Result: The Virtual Transport creation wizard is displayed.
To create a Virtual Transport, the user specify:
• Pseudo Wire User label.
• PHB Profile (optional).
• Direction (bidirectional, unidirectional).
• PM enabling (no, on-implementation).
• CW enabling (no, on-implementation).
• Edge points (end NNI ports).
• Routing constraints (optionally).
• Bandwidth parameters: (optionally)
– PIR.
– Reserved CIR.
– PBS.
– CBS.
...................................................................................................................................................................................................

2 Click Ok.
Result: If the operation completes without errors the final PW state is allocated,
otherwise the state is defined with workingState equal to failedToAllocate.
The Usage state of Pseudo Wire changes to busy when the Pseudo Wire supports at
least one T-MPLS section.
Then, the tree area, opened graphical views and the Pseudo Wire List are updated.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
16-36 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
T-MPLS Provisioning Management Modify a Virtual Transport
Managing Virtual Transport (T-MPLS)
....................................................................................................................................................................................................................................

Modify a Virtual Transport


When to use
The function modifies Virtual Transport characteristics.

Related information
For information about Pseudo Wire, see: “T-MPLS tunnel description” (p. 16-97).
This function gives the possibility to modify:
• User Label.
• Comment.

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Conditions
To get a positive result:
• If the User Label is modified, the new User Label must be different as one which is
already used by another Pseudo Wire.
• If the provisioning state of the Pseudo Wire is Defined and usage state is Idle, the
user can modify the Traffic Descriptor associated to the Pseudo Wire.

Task
From MS-GUI main window:
...................................................................................................................................................................................................

1 Select Search > Packet > T-MPLS > T-MPLS Virtual Transport.
Result: The list window is shown.
...................................................................................................................................................................................................

2 Select one item in the list.


...................................................................................................................................................................................................

3 Select Action > Packet > Virtual Transport > Modify.


Result: The Virtual Transport modification window is displayed.
...................................................................................................................................................................................................

4 To modify a Virtual Transport:


• Enter a new User Label (optional).
• Modify the Comment (optional).
....................................................................................................................................................................................................................................
1350 OMS 16-37
8DG42227DAAA 9.6
Issue 3 December 2012
T-MPLS Provisioning Management Modify a Virtual Transport
Managing Virtual Transport (T-MPLS)
....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

5 Select OK.
Result: After confirmation of the modification: the tree area and the Virtual Transport
list are updated.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
16-38 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
T-MPLS Provisioning Management Delete a Virtual Transport
Managing Virtual Transport (T-MPLS)
....................................................................................................................................................................................................................................

Delete a Virtual Transport


When to use
This function consists in deleting a Virtual Transport.

Related information
For information about Virtual Transport, see: “T-MPLS tunnel description” (p. 16-97).

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Conditions
To get a positive result:
• The selected Pseudo Wire must be set toAllocated or Defined.
• The selected Pseudo Wire must not support allocated nor implemented Pseudo
Wires.

Task
From MS-GUI main window:
...................................................................................................................................................................................................

1 Select Search > Packet > T-MPLS > Virtual Transports.


Result: The list window is shown.
...................................................................................................................................................................................................

2 Select one or more items in the list.


...................................................................................................................................................................................................

3 Select Action > Packet > Virtual Transports > Delete or Click the third key of the
mouse and select Delete.
...................................................................................................................................................................................................

4 Select one of the options in the confirmation box. Refer to the procedure “Confirm the
action” (p. 11-40).
Result: After confirmation, if concerned Virtual Transport is associated to a Traffic
Descriptor, a disassociation is automatically done and the Virtual Transport is
removed.
Then Virtual Transport list, the tree area, and the opened graphical views are updated.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS 16-39
8DG42227DAAA 9.6
Issue 3 December 2012
T-MPLS Provisioning Management View the details of the Virtual Transport
Managing Virtual Transport (T-MPLS)
....................................................................................................................................................................................................................................

View the details of the Virtual Transport


When to use
This function gets information about a Virtual Transport.

Related information
For information about Virtual Transport, see: “T-MPLS tunnel description” (p. 16-97).

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.

Task
From MS-GUI main window:
...................................................................................................................................................................................................

1 Select Search > Packet > T-MPLS > Virtual Transports.


Result: The list window is shown.
...................................................................................................................................................................................................

2 Select one item in the list.


...................................................................................................................................................................................................

3 Select Search > Virtual Transports > Properties.


Result: The property window is displayed.
See the following topic in this document: “Details of a Virtual Transport” (p. 16-41)
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
16-40 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
T-MPLS Provisioning Management Details of a Virtual Transport
Managing Virtual Transport (T-MPLS)
....................................................................................................................................................................................................................................

Details of a Virtual Transport


Attributes of a Virtual Transport
The attributes displayed for each Virtual Transport are:
• User Label.
• Parent Subnetwork.
• Usage State (Idle, Busy).
• Working State (Normal, Removing, Allocating, De-allocating, Implementing,
De-implementing).
• Provisioning State (Defined, Allocated, Partially Implemented, Implemented).
• Availability Status (Normal, Degraded, In failure).
• Consistency State (Consistent, Not consistent, Not meaningful).
• Comment.
• Last Action Type.
• Last Action Date.
• Traffic Descriptor User Label.

....................................................................................................................................................................................................................................
1350 OMS 16-41
8DG42227DAAA 9.6
Issue 3 December 2012
T-MPLS Provisioning Management Configuration of a Virtual Transport
Managing Virtual Transport (T-MPLS)
....................................................................................................................................................................................................................................

Configuration of a Virtual Transport


When to use
This function consists configuring Virtual Transport.

Related information
For information about Virtual Transport, see: “T-MPLS tunnel description” (p. 16-97).
For information about LSP PHB profiles, see: “Overview about PHB profile management
” (p. 16-5).

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Conditions
To get a positive result:
• The Virtual Transport must not support any Pseudo Wire.

Task
From MS-GUI main window:
...................................................................................................................................................................................................

1 Select Search > Packet > T-MPLS > Virtual Transport.


Result: The list window is shown.
...................................................................................................................................................................................................

2 Select one item in the list.


...................................................................................................................................................................................................

3 Select: Action > Packet > Virtual Transport > configure.


Result: The list window is shown.
...................................................................................................................................................................................................

4 Select one item in the list.


...................................................................................................................................................................................................

5 Select: Action > Packet > T-MPLS Pseudo Wire CTP > Add PHB Profile.
The operator selects the previously created PHB profile on domain basis to be associated
with that tunnel CTP.

....................................................................................................................................................................................................................................
16-42 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
T-MPLS Provisioning Management Configuration of a Virtual Transport
Managing Virtual Transport (T-MPLS)
....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

6 Select OK.
Result: PKT associates the new PHB to the CTP in database and then, if the tunnel is
implemented, PKT creates automatically the new Node-PHB in the node and deletes
the previously associated one, if not used by any other tunnel. PKT checks that the
tunnel does not support any PW, since the operation requires tunnel deactivation and
reactivation.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS 16-43
8DG42227DAAA 9.6
Issue 3 December 2012
T-MPLS Provisioning Management Implement a Virtual Transport
Managing Virtual Transport (T-MPLS)
....................................................................................................................................................................................................................................

Implement a Virtual Transport


When to use
This function implements a Virtual Transport.

Related information
For information about Virtual Transport, see: “T-MPLS tunnel description” (p. 16-97).
Virtual Transport provisioning
Each NE involved in the Virtual Transport is provisioned as following:
• If does not exit in the NE, Traffic Descriptor is created.
• The LER and LSR connections are added to the NE.
• Extremities are activated.
If tunnel alarm enabling rule is on-implementation, MEPs are automatically created and
activated on tunnel terminations at this stage.
If tunnel PM enabling rule is on-implementation, PM counting is automatically started
on tunnel terminations at this stage.
If at tunnel creation time the operator specified one PHB profile (selecting from a
portfolio of profiles available on domain basis) different from default, PKT automatically
implements the corresponding Node-PHB profiles on all tunnel segments. Similarly,
based on the tunnel bandwidth parameters, PKT automatically creates in each crossed NE
the corresponding TD.
If the tunnel uses an adaptive VT, PKT automatically configures VT bandwidth as
follows:
• VT Reserved CIR = Sum (LSP CIR) , where the sum spans all allocated and
implemented LSP (tunnel or PW) directly supported by the VT, including current
tunnel, is unchanged.
• VT CIR = Sum (LSP CIR) , where the sum spans all implemented LSP (tunnel or PW)
directly supported by the VT, including current tunnel.
• VT PIR = Max (LSP PIR) , where the max is computed for all implemented LSP
(tunnel or PW) directly supported by the VT, including current tunnel.
Virtual Transport states
The Virtual Transport is updated with the following states:
• Provisioning State: Implemented (or Partially Implemented).
• Working State: Normal.
• Availability Status: Normal (or Degraded or In Failure).

Before you begin


The system is running.
The system is properly configured.

....................................................................................................................................................................................................................................
16-44 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
T-MPLS Provisioning Management Implement a Virtual Transport
Managing Virtual Transport (T-MPLS)
....................................................................................................................................................................................................................................
The system is connected by MS-GUI.
The MS-GUI is set to map mode.

Conditions
To get a positive result:
• The selected Pseudo Wire must be set to Allocated.
• The working state must be set to Normal.

Task
From MS-GUI main window:
...................................................................................................................................................................................................

1 Select Search > Packet > T-MPLS > Virtual Transports.


Result: The list window is shown.
...................................................................................................................................................................................................

2 Select one item in the list.


...................................................................................................................................................................................................

3 Select: Action > Packet > T-MPLS > Virtual Transport > Implement.
...................................................................................................................................................................................................

4 Select OK.
Result: After implementation, the Virtual Transport List is updated.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS 16-45
8DG42227DAAA 9.6
Issue 3 December 2012
T-MPLS Provisioning Management De-implement a Virtual Transport
Managing Virtual Transport (T-MPLS)
....................................................................................................................................................................................................................................

De-implement a Virtual Transport


When to use
This function consists in de-implementing a Virtual Transport to remove the tunnel from
the network.

Related information
For information about Virtual Transport, see: “T-MPLS tunnel description” (p. 16-97).
deimplementation phase
If the tunnel were using a dedicated Node PHB profile, the PHB is automatically deleted
from the NE. If the tunnel were using a dedicated TD, TD is automatically deleted from
the NE.
If the tunnel uses an adaptive VT, PKT automatically reconfigures VT bandwidth as
follows:
• VT Reserved CIR=sum(LSP CIR , where the sum spans all allocated and
implemented LSP (tunnel or PW) directly supported by the VT, including current
tunnel, is unchanged.
• VT CIR=sum(LSP CIR , where the sum spans all implemented LSP (tunnel or PW)
directly supported by the VT, excluding current tunnel.
• VT Reserved PIR=Max(LSP PIR , where the max is computed for all
implemented LSP (tunnel or PW) directly supported by the VT, excluding current
tunnel.

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Conditions
To get a positive result:
• The provisioning state of the selected Pseudo Wire must be set to Implemented or
Partially implemented.
• The Pseudo Wire must carry no implemented T-MPLS Pseudo Wires.

Task
From MS-GUI main window:
...................................................................................................................................................................................................

1 Select Search > Packet > T-MPLS > Virtual Transports.

....................................................................................................................................................................................................................................
16-46 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
T-MPLS Provisioning Management De-implement a Virtual Transport
Managing Virtual Transport (T-MPLS)
....................................................................................................................................................................................................................................
Result: The list window is shown.
...................................................................................................................................................................................................

2 Select one or more items in the list.


...................................................................................................................................................................................................

3 Select Action > Packet > Virtual Transport > De-Implement.


...................................................................................................................................................................................................

4 Select one of the options in the confirmation box. Refer to the procedure “Confirm the
action” (p. 11-40).
Result: The user chooses a Pseudo Wire and requests its de-implementation then
working state is set to allocated and no traffic could be carried by it.
After de-implementation, the Pseudo Wire List is updated.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS 16-47
8DG42227DAAA 9.6
Issue 3 December 2012
T-MPLS Provisioning Management View the Virtual Transport extremities
Managing Virtual Transport (T-MPLS)
....................................................................................................................................................................................................................................

View the Virtual Transport extremities


When to use
This function gets information about extremities (origin and destination) of a Virtual
Transport.

Related information
For information about Virtual Transport, see: “T-MPLS tunnel description” (p. 16-97).

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.

Task
From MS-GUI main window:
...................................................................................................................................................................................................

1 Select Search > Packet > T-MPLS > Virtual Transport.


Result: The list window is shown.
...................................................................................................................................................................................................

2 Select one item in the list.


...................................................................................................................................................................................................

3 Select Action > Virtual Transports > Extremities.


Result: The list window is displayed.
See the following topic in this document: “Description of the list of Virtual
Transports” (p. 16-49)
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
16-48 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
T-MPLS Provisioning Management Description of the list of Virtual Transports
Managing Virtual Transport (T-MPLS)
....................................................................................................................................................................................................................................

Description of the list of Virtual Transports


Attributes of a Virtual Transport
The attributes displayed are:
• User Label.
• NE User Label (A).
• Termination User Label (A).
• NE User Label (Z).
• Termination User Label (Z).

....................................................................................................................................................................................................................................
1350 OMS 16-49
8DG42227DAAA 9.6
Issue 3 December 2012
T-MPLS Provisioning Management Overview about Pseudo Wires
Managing Pseudo Wires (T-MPLS)
....................................................................................................................................................................................................................................

Managing Pseudo Wires (T-MPLS)

Overview about Pseudo Wires


T-MPLS Pseudo Wire description
Pseudo Wires are point-to-point logical connections between NNI ports. Pseudo Wires are
usable by only one service.
The route of a Pseudo Wire spans one or more T-MPLS sections and or tunnels.
The purpose of a Pseudo Wire is to carry one service across T-MPLS network.
Pseudo Wires are Label Switched Paths (LSP). The Pseudo Wire terminations correspond
to:
• a label Push at the ingress LER.
• a label Pop at the egress LER.
The cross connection (XC) correspond to a Label Swap at the LSR.
T-MPLS manages the T-MPLS tunnel creation in the database, requested by user
(bottom-up approach) or by PW creation (top-down approach). The T-MPLS Tunnel, or
T-MPLS Path, is a logical entity that represents point-to-point connections between NNI
ports. The tunnel route can span one or more T-MPLS sections or one or more underlying
tunnels. The T-MPLS tunnel is an example of Label Switched Path (LSP). The tunnel
purpose is to enhance the scalability of T-MPLS logical connections. The tunnel can carry
one or more services (PW), it can be involved in a protection schema (linear colon, linear
plus, or MPLS Ring). The tunnel supports OAM capabilities: tunnel terminations can
instantiate and enable the Maintenance End Points (MEPs). The system is able to
configure a tunnel between NNI ports belonging to contiguous T-MPLS domains using
only the sections present in T-MPLS DB. In this version, a tunnel cannot be created using
other underlying tunnels. Only E-LSP tunnels are supported. The tunnel creation can be
performed by the operator using the T-MPLS GUI or automatically during a client service
definition. When creating the tunnel, the operator can fully specify the tunnel route by
means of section constraints or can specify only the end NNI ports with, optionally, a
partial or complete list of section constraints. The tunnel creation is an operation that
defines the tunnel and reserves the resources in T-MPLS DB. If the operation fails, the
tunnel is put in “defined” state with working state “failedToAllocate” value and the
system notifies the cause of the failure. While in “defined” state, the operator can remove
the tunnel or modify the input parameters (edge points, section constraints, and so on) and
perform again the creation. If the creation completes successfully the tunnel is in
“allocated” state. Tunnel creation is the same for static, dynamic, and mixed tunnels. In
all cases, the system is required to compute the tunnel nominal route. The static case and
the dynamic case differ only in the way the nominal route is provisioned.

....................................................................................................................................................................................................................................
16-50 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
T-MPLS Provisioning Management View the list of Pseudo Wires
Managing Pseudo Wires (T-MPLS)
....................................................................................................................................................................................................................................

View the list of Pseudo Wires


When to use
This function presents all the Pseudo Wires and their attributes.

Related information
For information about Pseudo Wire, see: “Overview about Pseudo Wires” (p. 16-50).

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.

Task
From MS-GUI main window:
...................................................................................................................................................................................................

1 Select: Search > Packet > T-MPLS.


Result: The T-MPLS menu is displayed.
...................................................................................................................................................................................................

2 Select: T-MPLS Pseudo Wires.


Result: The Pseudo Wire list is displayed.
See the following topic in this document: “Description of the list of Pseudo Wires”
(p. 16-52)
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS 16-51
8DG42227DAAA 9.6
Issue 3 December 2012
T-MPLS Provisioning Management Description of the list of Pseudo Wires
Managing Pseudo Wires (T-MPLS)
....................................................................................................................................................................................................................................

Description of the list of Pseudo Wires


Attributes of a Pseudo Wire
The attributes displayed for each Pseudo Wire are:
• User Label.
• Working State (Normal, Removing, Allocating, De-allocating, Implementing,
De-implementing).
• Last Action.
• Configuration State (Idle, Busy).
• Operational State (Idle, Busy).
• Alarm Status (Normal, Degraded, In failure).
• Flow (Idle, Busy).
• Protection Role (Working, Protecting).
• Protection Status (Working, Protecting).
• Provisioning Type (Defined, Allocated, Partially Implemented, Implemented).
• Cration date.
• CIR.
• PIR.
• CBS.
• PBS.
• Reserved CIR.
• A Port ID.
• Z Port ID.
• A Port.
• Z Port.

....................................................................................................................................................................................................................................
16-52 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
T-MPLS Provisioning Management Create a Pseudo Wire
Managing Pseudo Wires (T-MPLS)
....................................................................................................................................................................................................................................

Create a Pseudo Wire


When to use
This function manages Pseudo Wire creation and allocation.

Related information
For information about Pseudo Wire, see: “Overview about Pseudo Wires” (p. 16-50).
Pseudo Wire allocation
The system checks that the section constraints describe a fully connected route between
the end nodes.
The system checks that the PW PHB profile is supported by the domain Egress PHB
Profile.
The system defines the PW and updates the T-MPLS DB allocating the PW along the
constraints.
If the operator does not specify the bandwidth parameters, the system creates the PW with
associated null TD (PIR=CIR=0 and PBS=CBS=0 ).
The reserved CIR parameter is always equal to the TD CIR parameter, except when the
services is allocated and over one implemented PW. In such case, the PW reserved CIR
represents the CIR required to support the PW committed bandwidth, while the TD CIR
represents the committed bandwidth of the implemented PW.
When the supported services are implemented, TD CIR is enlarged to match the reserved
CIR.
If the PWs are deallocated, the reserved CIR is reduced down to the TD CIR value.
If the operator does not constrain the underlying Virtual Transport (by means of VT
parameter), the system allocates the PW on the default VT.
If the operator requests Control Word enabling (CW enabling), then CW insertion is
enabled on PW terminations at implementation time.

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Conditions
To get a positive result:
• The User Label must be different as one which is exists.
• The user must define the complete route of Pseudo Wire in terms of section
constraints.
....................................................................................................................................................................................................................................
1350 OMS 16-53
8DG42227DAAA 9.6
Issue 3 December 2012
T-MPLS Provisioning Management Create a Pseudo Wire
Managing Pseudo Wires (T-MPLS)
....................................................................................................................................................................................................................................
If the user does not define the PW route, PW is created in defined state.
Note: In this version, a PW cannot be created using other underlying PWs. Only
E-LSP PWs are supported.

Task
From MS-GUI main window:
...................................................................................................................................................................................................

1 Select Action > Packet > T-MPLS > Create Pseudo Wire.
Result: The Pseudo Wire creation wizard is displayed.
To create a Pseudo Wire, the user specify:
• Pseudo Wire User label.
• PHB Profile (optional).
• Direction (bidirectional, unidirectional).
• PM enabling (no, on-implementation).
• CW enabling (no, on-implementation).
• Edge points (end NNI ports).
• Routing constraints (optionally).
• Bandwidth parameters: (optionally)
– PIR.
– Reserved CIR.
– PBS.
– CBS.
...................................................................................................................................................................................................

2 Click Ok.
Result: If the operation completes without errors, the final PW state is allocated;
otherwise the state is defined with workingState equal to failedToAllocate.
The Usage state of Pseudo Wire changes to busy when the Pseudo Wire supports at
least one T-MPLS section.
Then, the tree area, opened graphical views and the Pseudo Wire List are updated.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
16-54 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
T-MPLS Provisioning Management Modify a PseudoWire
Managing Pseudo Wires (T-MPLS)
....................................................................................................................................................................................................................................

Modify a PseudoWire
When to use
This function modifies PseudoWire characteristics.

Related information
For information about Pseudo Wire, see: “Overview about Pseudo Wires” (p. 16-50).
This function gives the possibility to modify:
• User Label.
• Comment.

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Conditions
To get a positive result:
• If the User Label is modified, the new User Label must be different as one which is
already used by another Pseudo Wire.
• If the provisioning state of the Pseudo Wire is Defined and usage state is Idle, the
Traffic Descriptor associated to the Pseudo Wire is modifiable.

Task
From MS-GUI main window:
...................................................................................................................................................................................................

1 Select Search > Packet > T-MPLS > T-MPLS Pseudo Wires.
Result: The list window is shown.
...................................................................................................................................................................................................

2 Select one item in the list.


...................................................................................................................................................................................................

3 Select Action > Packet > T-MPLS Pseudo Wire > Modify.
Result: The Pseudo Wire modification window is displayed.
...................................................................................................................................................................................................

4 To modify a Pseudo Wire:


• Enter a new User Label (optional).
• Modify the Comment (optional).
....................................................................................................................................................................................................................................
1350 OMS 16-55
8DG42227DAAA 9.6
Issue 3 December 2012
T-MPLS Provisioning Management Modify a PseudoWire
Managing Pseudo Wires (T-MPLS)
....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

5 Select OK.
Result: After confirmation of the modification: the tree area and Pseudo Wire list are
updated.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
16-56 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
T-MPLS Provisioning Management Delete a Pseudo Wire
Managing Pseudo Wires (T-MPLS)
....................................................................................................................................................................................................................................

Delete a Pseudo Wire


When to use
This function consists in deleting a Pseudo Wire.

Related information
For information about Pseudo Wire, see: “Overview about Pseudo Wires” (p. 16-50).

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Conditions
To get a positive result:
• The selected Pseudo Wire must be set toAllocated or Defined.
• The selected Pseudo Wire must not support allocated nor implemented Pseudo
Wires.

Task
From MS-GUI main window:
...................................................................................................................................................................................................

1 Select Search > Packet > T-MPLS > T-MPLS Pseudo Wires.
Result: The list window is shown.
...................................................................................................................................................................................................

2 Select one or more items in the list.


...................................................................................................................................................................................................

3 Select Action > Packet > T-MPLS Pseudo Wires > Delete or Click the third key of the
mouse and select Delete.
...................................................................................................................................................................................................

4 Select one of the options in the confirmation box. Refer to the procedure “Confirm the
action” (p. 11-40).
Result: After confirmation, if concerned Pseudo Wire is associated to a Traffic
Descriptor, a disassociation is automatically done and the Pseudo Wire is removed.
Then Pseudo Wire list, the tree area, and the opened graphical views are updated.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS 16-57
8DG42227DAAA 9.6
Issue 3 December 2012
T-MPLS Provisioning Management View the details of the Pseudo Wires
Managing Pseudo Wires (T-MPLS)
....................................................................................................................................................................................................................................

View the details of the Pseudo Wires


When to use
This function gets information about a Pseudo Wire.

Related information
For information about Pseudo Wire, see: “Overview about Pseudo Wires” (p. 16-50).

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.

Task
From MS-GUI main window:
...................................................................................................................................................................................................

1 Select Search > Packet > T-MPLS > T-MPLS Pseudo Wires.
Result: The list window is shown.
...................................................................................................................................................................................................

2 Select one item in the list.


...................................................................................................................................................................................................

3 Select Search > Packet > T-MPLS Pseudo Wires > Properties.
Result: The property window is displayed.
See the following topic in this document: “Details of a Pseudo Wire” (p. 16-59)
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
16-58 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
T-MPLS Provisioning Management Details of a Pseudo Wire
Managing Pseudo Wires (T-MPLS)
....................................................................................................................................................................................................................................

Details of a Pseudo Wire


Attributes of a Pseudo Wire
The attributes displayed for each Pseudo Wire are:
• User Label.
• Parent Subnetwork.
• Usage State (Idle, Busy).
• Working State (Normal, Removing, Allocating, De-allocating, Implementing,
De-implementing).
• Provisioning State (Defined, Allocated, Partially Implemented, Implemented).
• Availability Status (Normal, Degraded, In failure).
• Consistency State (Consistent, Not consistent, Not meaningful).
• Comment.
• Last Action Type.
• Last Action Date.
• Traffic Descriptor User Label.

....................................................................................................................................................................................................................................
1350 OMS 16-59
8DG42227DAAA 9.6
Issue 3 December 2012
T-MPLS Provisioning Management Configuration of the route of a Pseudo Wire
Managing Pseudo Wires (T-MPLS)
....................................................................................................................................................................................................................................

Configuration of the route of a Pseudo Wire


When to use
This function consists in adding/removing sections as constraint to a Pseudo Wire.

Related information
For information about Pseudo Wire, see: “Overview about Pseudo Wires” (p. 16-50).
PKT starts the reroute operation and reallocates the tunnel along a new route that satisfies
the updated list of constraints.

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Conditions
To get a positive result:
• The Pseudo Wire must be allocated.

Task
From MS-GUI main window:
...................................................................................................................................................................................................

1 Select Search > Packet > T-MPLS > T-MPLS Pseudo Wires.
Result: The list window is shown.
...................................................................................................................................................................................................

2 Select one or more items in the list.


...................................................................................................................................................................................................

3 Select: Action > Packet > T-MPLS Pseudo Wire > Add Constraints.
Result: To add a new Pseudo Wire constraint:
• Enter the User Label of the Pseudo Wire.
• Enter a T-MPLS Label (optional) by using the sensitive help.
...................................................................................................................................................................................................

4 Select OK.

....................................................................................................................................................................................................................................
16-60 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
T-MPLS Provisioning Management Configuration of the route of a Pseudo Wire
Managing Pseudo Wires (T-MPLS)
....................................................................................................................................................................................................................................
Result: After confirmation, the Pseudo Wire constraint is added at the end of the
constraint list as the last one of the route.
Then, the Pseudo Wire Constraint List is updated.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS 16-61
8DG42227DAAA 9.6
Issue 3 December 2012
T-MPLS Provisioning Management Delete a constraint from a Pseudo Wire
Managing Pseudo Wires (T-MPLS)
....................................................................................................................................................................................................................................

Delete a constraint from a Pseudo Wire


When to use
This function consists in deleting one constraint related to a Pseudo Wire.

Related information
For information about Pseudo Wire, see: “Overview about Pseudo Wires” (p. 16-50).
PKT starts the reroute operation and reallocates the tunnel along a new route that satisfies
the updated list of constraints.

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Conditions
To get a positive result:
• The provisioning state of the selected Pseudo Wire must be Defined.
• The working state must be Normal (that is, no operation is running on it).

Task
From MS-GUI main window:
...................................................................................................................................................................................................

1 Select Search > Packet > T-MPLS > T-MPLS Pseudo Wires.
Result: The list window is shown.
...................................................................................................................................................................................................

2 Select one item in the list.


...................................................................................................................................................................................................

3 Select: Search > Packet > T-MPLS Pseudo Wire > Constraints.
...................................................................................................................................................................................................

4 Select one or more items in the list.


...................................................................................................................................................................................................

5 Select Action > T-MPLS Pseudo Wires > Delete.


...................................................................................................................................................................................................

6 Select one of the options in the confirmation box. Refer to the procedure “Confirm the
action” (p. 11-40).

....................................................................................................................................................................................................................................
16-62 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
T-MPLS Provisioning Management Delete a constraint from a Pseudo Wire
Managing Pseudo Wires (T-MPLS)
....................................................................................................................................................................................................................................
Result: After confirmation, the Pseudo Wire constraints are deleted and the Pseudo
Wire Constraint List is updated.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS 16-63
8DG42227DAAA 9.6
Issue 3 December 2012
T-MPLS Provisioning Management Configuration of PHB profile of a Pseudo Wire
Managing Pseudo Wires (T-MPLS)
....................................................................................................................................................................................................................................

Configuration of PHB profile of a Pseudo Wire


When to use
This function consists in adding/removing PHB Profile to a Pseudo Wire.

Related information
For information about Pseudo Wire, see: “Overview about Pseudo Wires” (p. 16-50).
For information about LSP PHB profiles, see: “Overview about PHB profile management
” (p. 16-5).
The operator selects the previously created PHB profile on domain basis to be associated
with that tunnel CTP.
PKT associates the new PHB to the CTP in database and then, if the tunnel is
implemented, PKT creates automatically the new Node-PHB in the node and deletes the
previously associated one, if not used by any other tunnel. PKT checks that the tunnel
does not support any PW, since the operation requires tunnel deactivation and
reactivation.

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Conditions
To get a positive result:
• The Pseudo Wire must not support any Pseudo Wire.

Task
From MS-GUI main window:
...................................................................................................................................................................................................

1 Select Search > Packet > T-MPLS > T-MPLS Pseudo Wires.
Result: The list window is shown.
...................................................................................................................................................................................................

2 Select one item in the list.


...................................................................................................................................................................................................

3 Select: Action > Packet > T-MPLS Pseudo Wire > tunnel CTP.

....................................................................................................................................................................................................................................
16-64 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
T-MPLS Provisioning Management Configuration of PHB profile of a Pseudo Wire
Managing Pseudo Wires (T-MPLS)
....................................................................................................................................................................................................................................
Result: The list window is shown.
...................................................................................................................................................................................................

4 Select one item in the list.


...................................................................................................................................................................................................

5 Select: Action > Packet > T-MPLS Pseudo Wire CTP > Add PHB Profile.
...................................................................................................................................................................................................

6 Select OK.
Result: Profile is added to the Pseudo Wire CTP.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS 16-65
8DG42227DAAA 9.6
Issue 3 December 2012
T-MPLS Provisioning Management Configuration of Layer-2 encapsulation of a Pseudo Wire
Managing Pseudo Wires (T-MPLS)
....................................................................................................................................................................................................................................

Configuration of Layer-2 encapsulation of a Pseudo Wire


When to use
This function consists in adding/removing Layer-2 encapsulation Profile to a Pseudo
Wire.

Related information
For information about Pseudo Wire, see: “Overview about Pseudo Wires” (p. 16-50).

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Conditions
To get a positive result:
• The Pseudo Wire must not support any Pseudo Wire.
• Underlying layer of the T-MPLS Port is MAU.

Task
From MS-GUI main window:
...................................................................................................................................................................................................

1 Select Search > Packet > T-MPLS > T-MPLS Pseudo Wires.
Result: The list window is shown.
...................................................................................................................................................................................................

2 Select one item in the list.


...................................................................................................................................................................................................

3 Select: Action > Packet > T-MPLS Pseudo Wire > Add Layer-2 encapsulation Profile.
...................................................................................................................................................................................................

4 Select OK.
Result: Profile is added to the Pseudo Wire.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
16-66 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
T-MPLS Provisioning Management Allocate Pseudo Wire
Managing Pseudo Wires (T-MPLS)
....................................................................................................................................................................................................................................

Allocate Pseudo Wire


When to use
This operation is performed when the user wants to find a path route between the two
extremities of a Pseudo Wire.

Related information
For information about Pseudo Wire, see: “Overview about Pseudo Wires” (p. 16-50).
Before the allocation operation, the user has given a complete path route in term of
constraints (T-MPLS Pseudo Wire List). Constraints can optionally be associated with the
T-MPLS Labels. See “Add a constraint to an LSP tunnel” (p. 15-56).
If the Pseudo Wire is only one, the route is already defined. In this case, the constraint
List is not mandatory. The Pseudo Wire is identified by the Pseudo Wire extremities given
during the definition. Even not mandatory, it can be useful for the user to gives a specific
T-MPLS label.
Pseudo Wire bandwidth
The system calculates the effective bandwidth of the Pseudo Wire according to the
associated Traffic Descriptor (see the table).
Each T-MPLS Pseudo Wire of the given route must provide the effective bandwidth of the
Pseudo Wire. Available Bandwidth of Pseudo Wire is greater than or equal to Effective
bandwidth of Pseudo Wire.

Traffic contract type. Effective bandwidth reserved on Pseudo Wire.


Best Effort. 0 1.
Assured Forwarding. CIR.
Expedited Forwarding. CIR.

Notes:
1. In the case Best Effort traffic contract, no effective bandwidth is reserved. In this case, for
each Pseudo Wire, a maximum number of Best Effort Pseudo Wire is checked.

For all traffic contract, CIR must be less than or equal to PIR and PIR must be less than or
equal to Pseudo Wire Total bandwidth.
If the user gives a T-MPLS Label in the constraint list, the system checks the availability
of the T-MPLS Label. If the T-MPLS Label. is used by another Pseudo Wire or T-MPLS
section, 1350 OMS PKT chooses and reserves automatically an available T-MPLS label.

....................................................................................................................................................................................................................................
1350 OMS 16-67
8DG42227DAAA 9.6
Issue 3 December 2012
T-MPLS Provisioning Management Allocate Pseudo Wire
Managing Pseudo Wires (T-MPLS)
....................................................................................................................................................................................................................................
Allocation phase
The Pseudo Wire is allocated:
• LSP links along the route used by the Pseudo Wire are created, referenced by a
T-MPLS Label of each crossed Pseudo Wire.
• The 1350 OMS PKT checks the continuity of the route.
• T-MPLS Label of each involved Pseudo Wire is reserved to the Pseudo Wire.
• Pseudo Wire cross connections are generated.
• Bandwidth of each Pseudo Wire (used and available bandwidths) is computed in the
used direction.
• If the Usage State of each T-MPLS Pseudo Wire used by the Pseudo Wire is idle, the
state change to busy.
Pseudo Wire states
The Pseudo Wire is also updated with the following states:
• Provisioning State: Allocated.
• Working State: Normal.

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Conditions
To get a positive result:
• The provisioning state of the selected Pseudo Wire must be set to Defined.
• The working state must be set to Normal (if not, an operation is running on it).
• The Pseudo Wire must be associated to a Traffic Descriptor.
• The constraints on this Pseudo Wire have been previously added (except for unitary
Pseudo Wire).
• The T-MPLS sections defined as constraints are contiguous.
• The constraint lists must be compliant with the Pseudo Wire extremities.
• The maximum number of Best Effort Pseudo Wire for each Pseudo Wire is not
reached.

Task
From MS-GUI main window:
...................................................................................................................................................................................................

1 Select Search > Packet > T-MPLS > T-MPLS Pseudo Wires.

....................................................................................................................................................................................................................................
16-68 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
T-MPLS Provisioning Management Allocate Pseudo Wire
Managing Pseudo Wires (T-MPLS)
....................................................................................................................................................................................................................................
Result: The list window is shown.
...................................................................................................................................................................................................

2 Select one or more items in the list.


...................................................................................................................................................................................................

3 Select Action > T-MPLS Pseudo Wires > Allocate.


...................................................................................................................................................................................................

4 Select one of the options in the confirmation box. Refer to the procedure “Confirm the
action” (p. 11-40).
Result: The Pseudo Wire Working state is set to Allocated.
The Pseudo Wire List is updated.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS 16-69
8DG42227DAAA 9.6
Issue 3 December 2012
T-MPLS Provisioning Management De-allocate Pseudo Wire
Managing Pseudo Wires (T-MPLS)
....................................................................................................................................................................................................................................

De-allocate Pseudo Wire


When to use
This operation allows to the user to de-allocate a Pseudo Wire.

Related information
For information about Pseudo Wire, see: “Overview about Pseudo Wires” (p. 16-50).
deallocation phase
The 1350 OMS PKT retrieves all T-MPLS Pseudo Wires used by this Pseudo Wire. It
updates for each of them available and used bandwidths for the used direction. It frees the
involved T-MPLS Labels.
The LSP links and the LSP cross connections are also retrieved and deleted.
The Pseudo Wire is de-allocated:
• Bandwidth of each Pseudo Wires used by the Pseudo Wire are updated.
• If no more Pseudo Wire is carried, the Usage State of Pseudo Wires used by the
Pseudo Wire is changed to idle.
• T-MPLS Label of each Pseudo Wire involved in LSP links is released.
Pseudo Wire states
The Pseudo Wire is also updated with the following states:
• Provisioning State: Defined.
• Working State: Normal.

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Conditions
To get a positive result:
• The provisioning state of the selected Pseudo Wire must be set to Allocated.
• The working state must be set to Normal (if not, an operation is running on it).
• The Pseudo Wire state is not busy.

Task
From MS-GUI main window:
...................................................................................................................................................................................................

1 Select Search > Packet > T-MPLS > T-MPLS Pseudo Wires.

....................................................................................................................................................................................................................................
16-70 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
T-MPLS Provisioning Management De-allocate Pseudo Wire
Managing Pseudo Wires (T-MPLS)
....................................................................................................................................................................................................................................
Result: The list window is shown.
...................................................................................................................................................................................................

2 Select one or more items in the list.


...................................................................................................................................................................................................

3 Select Action > T-MPLS Pseudo Wires > Deallocate.


...................................................................................................................................................................................................

4 Select one of the options in the confirmation box. Refer to the procedure “Confirm the
action” (p. 11-40).
Result: After confirmation, the Pseudo Wire working state is set to De-allocated.
Then, the Pseudo Wire List is updated.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS 16-71
8DG42227DAAA 9.6
Issue 3 December 2012
T-MPLS Provisioning Management Implement a Pseudo Wire
Managing Pseudo Wires (T-MPLS)
....................................................................................................................................................................................................................................

Implement a Pseudo Wire


When to use
This function implements a Pseudo Wire.

Related information
For information about Pseudo Wire, see: “Overview about Pseudo Wires” (p. 16-50).
Implementation phase
The tunnel provisioning can be static, dynamic, or mixed. Static means that the tunnel is
provisioned directly by NMS. Dynamic means that the tunnel is provisioned through
control plane. In mixed provisioning, PKT manages the tunnel creation and activation,
partially in the data plane and partially in the control plane.
Each NE involved in the Pseudo Wire is provisioned as following:
• If does not exit in the NE, Traffic Descriptor is created.
• The LER connections and the LSR connections are added to the NE.
• Extremities are activated.
If tunnel alarm enabling rule is on-implementation, MEPs are automatically created and
activated on tunnel terminations at this stage.
If tunnel PM enabling rule is on-implementation, PM counting is automatically started
on tunnel terminations at this stage.
If at tunnel creation time the operator specified one PHB profile (selecting from a
portfolio of profiles available on domain basis) different from default, PKT automatically
implements the corresponding Node-PHB profiles on all tunnel segments. Similarly,
based on the tunnel bandwidth parameters, PKT automatically creates in each crossed NE
the corresponding TD.
If the tunnel uses an adaptive VT, PKT automatically configures VT bandwidth as
follows:
• VT Reserved CIR = Sum (LSP CIR), where the sum spans all allocated and
implemented LSP (tunnel or PW) directly supported by the VT, including current
tunnel, is unchanged.
• VT CIR = Sum (LSP CIR), where the sum spans all implemented LSP (tunnel or PW)
directly supported by the VT, including current tunnel.
• VT PIR = Max (LSP PIR), where the max is computed for all implemented LSP
(tunnel or PW) directly supported by the VT, including current tunnel.

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.

....................................................................................................................................................................................................................................
16-72 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
T-MPLS Provisioning Management Implement a Pseudo Wire
Managing Pseudo Wires (T-MPLS)
....................................................................................................................................................................................................................................
The MS-GUI is set to map mode.
Conditions
To get a positive result:
• The selected Pseudo Wire must be set to Allocated.
• The working state must be set to Normal.

Task
From MS-GUI main window:
...................................................................................................................................................................................................

1 Select Search > Packet > T-MPLS > T-MPLS Pseudo Wires.
Result: The list window is shown.
...................................................................................................................................................................................................

2 Select one item in the list.


...................................................................................................................................................................................................

3 Select: Action > Packet > T-MPLS Pseudo Wire > Implement.
...................................................................................................................................................................................................

4 Select OK.
Result: The Pseudo Wire is updated with the following states:
• Provisioning State: Implemented (or Partially Implemented).
• Working State: Normal.
• Availability Status: Normal (or Degraded or In Failure).
After implementation, the Pseudo Wire List is updated.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS 16-73
8DG42227DAAA 9.6
Issue 3 December 2012
T-MPLS Provisioning Management De-implement a Pseudo Wire
Managing Pseudo Wires (T-MPLS)
....................................................................................................................................................................................................................................

De-implement a Pseudo Wire


When to use
This function consists in de-implementing a Pseudo Wire to remove the tunnel from the
network.

Related information
For information about Pseudo Wire, see: “Overview about Pseudo Wires” (p. 16-50).
Deimplementation phase
PKT manages the static tunnel removal from the data plane, dynamic tunnel removal
from the control plane, or both.
If the tunnel were using a dedicated Node-PHB profile, the profile is automatically
deleted from the NE. If the tunnel were using a dedicated TD, the TD is automatically
deleted from the NE.
If the tunnel uses an adaptive VT, PKT automatically reconfigures VT bandwidth as
follows:
• VT Reserved CIR = Sum (LSP CIR), where the sum spans all allocated and
implemented LSP (tunnel or PW) directly supported by the VT, including current
tunnel, is unchanged.
• VT CIR = Sum (LSP CIR), where the sum spans all implemented LSP (tunnel or PW)
directly supported by the VT, excluding current tunnel.
• VT PIR = Max (LSP PIR), where the max is computed for all implemented LSP
(tunnel or PW) directly supported by the VT, excluding current tunnel.

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Conditions
To get a positive result:
• The Provisioning state of the selected Pseudo Wire must be set to Implemented or
Partially implemented.
• The Pseudo Wire must carry no implemented T-MPLS Pseudo Wires.

Task
From MS-GUI main window:
...................................................................................................................................................................................................

1 Select Search > Packet > T-MPLS > T-MPLS Pseudo Wires.
....................................................................................................................................................................................................................................
16-74 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
T-MPLS Provisioning Management De-implement a Pseudo Wire
Managing Pseudo Wires (T-MPLS)
....................................................................................................................................................................................................................................
Result: The list window is shown.
...................................................................................................................................................................................................

2 Select one or more items in the list.


...................................................................................................................................................................................................

3 Select Action > T-MPLS Pseudo Wires > De-Implement.


...................................................................................................................................................................................................

4 Select one of the options in the confirmation box. Refer to the procedure “Confirm the
action” (p. 11-40).
Result: The user chooses a Pseudo Wire and requests its de-implementation then
working state is set to allocated and no traffic could be carried by it.
After de-implementation, the Pseudo Wire List is updated.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS 16-75
8DG42227DAAA 9.6
Issue 3 December 2012
T-MPLS Provisioning Management List the constraints of a Pseudo Wire
Managing Pseudo Wires (T-MPLS)
....................................................................................................................................................................................................................................

List the constraints of a Pseudo Wire


When to use
This function lists the T-MPLS sections acting as constraints for the selected Pseudo
Wire.

Related information
For information about Pseudo Wire, see: “Overview about Pseudo Wires” (p. 16-50).

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Conditions
To get a positive result:
• The Pseudo Wire must be allocated.

Task
From MS-GUI main window:
...................................................................................................................................................................................................

1 Select Search > Packet > T-MPLS > T-MPLS Pseudo Wires.
Result: The list window is shown.
...................................................................................................................................................................................................

2 Select one item in the list.


...................................................................................................................................................................................................

3 Select: Search > Packet > T-MPLS Pseudo Wire > Constraints.
Result: The list window is displayed.
See the following topic in this document: “Description of the list of Pseudo Wire
Constraints” (p. 16-77)
Only routing constraints created by operator are displayed to the UI.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
16-76 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
T-MPLS Provisioning Management Description of the list of Pseudo Wire Constraints
Managing Pseudo Wires (T-MPLS)
....................................................................................................................................................................................................................................

Description of the list of Pseudo Wire Constraints


Attributes of a Pseudo Wire Constraint
The attributes displayed for each constraint are:
• User label.
• HOPLIST-ID.
• PATH-ID.
• HOP-ID.
• Hop-Ip-Address.
• Hop Port AID.
• Label in.
• Label out.
• Include mode.
• Explicit mode.
• Loose mode.
Note: Only routing constraints created by operator are displayed to the UI.

....................................................................................................................................................................................................................................
1350 OMS 16-77
8DG42227DAAA 9.6
Issue 3 December 2012
T-MPLS Provisioning Management View the details of the Pseudo Wire constraints
Managing Pseudo Wires (T-MPLS)
....................................................................................................................................................................................................................................

View the details of the Pseudo Wire constraints


When to use
This function gets information about a constraint of a Pseudo Wire.

Related information
For information about Pseudo Wire, see: “Overview about Pseudo Wires” (p. 16-50).

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.

Task
From MS-GUI main window:
...................................................................................................................................................................................................

1 SelectSearch > Packet > T-MPLS > T-MPLS Pseudo Wires.


Result: The list window is shown.
...................................................................................................................................................................................................

2 Select one item in the list.


...................................................................................................................................................................................................

3 Select: Search > Packet > T-MPLS Pseudo Wire > Constraints.
Result: The list window is shown.
...................................................................................................................................................................................................

4 Select one or more items in the list.


...................................................................................................................................................................................................

5 Select Search > Packet > T-MPLS Pseudo Wires > Properties.
Result: The property windiow is shown.
See the following topic in this document: “Details of a Pseudo Wire Constraint”
(p. 16-79)
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
16-78 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
T-MPLS Provisioning Management Details of a Pseudo Wire Constraint
Managing Pseudo Wires (T-MPLS)
....................................................................................................................................................................................................................................

Details of a Pseudo Wire Constraint


Attributes of a Pseudo Wire Constraint
The attributes displayed for each Pseudo Wire are:
• User Label.
• Parent Subnetwork.
• Usage State (Idle, Busy).
• Working State (Normal, Removing, Allocating, De-allocating, Implementing,
De-implementing).
• Provisioning State (Defined, Allocated, Partially Implemented, Implemented).
• Availability Status (Normal, Degraded, In failure).
• Consistency State (Consistent, Not consistent, Not meaningful).
• Comment.
• Last Action Type.
• Last Action Date.
• Traffic Descriptor User Label.

....................................................................................................................................................................................................................................
1350 OMS 16-79
8DG42227DAAA 9.6
Issue 3 December 2012
T-MPLS Provisioning Management View the list of cross connections
Managing Pseudo Wires (T-MPLS)
....................................................................................................................................................................................................................................

View the list of cross connections


When to use
This function lists all cross connections of a Pseudo Wire.

Related information
For information about Pseudo Wire, see: “Overview about Pseudo Wires” (p. 16-50).

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.

Task
From MS-GUI main window:
...................................................................................................................................................................................................

1 Select Search > Packet > T-MPLS > T-MPLS Pseudo Wires.
Result: The list window is shown.
...................................................................................................................................................................................................

2 Select one item in the list.


...................................................................................................................................................................................................

3 Select: Search > Packet > T-MPLS Pseudo Wire > Constraints.
Result: The list window is shown.
...................................................................................................................................................................................................

4 Select one or more items in the list.


...................................................................................................................................................................................................

5 Select Search > Packet > T-MPLS Pseudo Wires > Cross Connections.
Result: The list window is displayed.
See the following topic in this document: “Description of the list of PW Cross
Connections” (p. 16-81)
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
16-80 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
T-MPLS Provisioning Management Description of the list of PW Cross Connections
Managing Pseudo Wires (T-MPLS)
....................................................................................................................................................................................................................................

Description of the list of PW Cross Connections


Attributes of a PW Cross Connection
The attributes displayed for each cross connection are:
• NE User label used by the Pseudo Wire.
• cross connection type (LER for the extremity or LSR).
• Ingress Termination Identifier.
• Ingress T-MPLS Label.
• Egress Termination Identifier.
• Egress T-MPLS Label.

....................................................................................................................................................................................................................................
1350 OMS 16-81
8DG42227DAAA 9.6
Issue 3 December 2012
T-MPLS Provisioning Management View the Pseudo Wire extremities
Managing Pseudo Wires (T-MPLS)
....................................................................................................................................................................................................................................

View the Pseudo Wire extremities


When to use
This function gets information about extremities (origin and destination) of a Pseudo
Wire.

Related information
For information about Pseudo Wire, see: “Overview about Pseudo Wires” (p. 16-50).

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.

Task
From MS-GUI main window:
...................................................................................................................................................................................................

1 Select Search > Packet > T-MPLS > T-MPLS Pseudo Wires.
Result: The list window is shown.
...................................................................................................................................................................................................

2 Select one item in the list.


...................................................................................................................................................................................................

3 Select Action > Packet > T-MPLS Pseudo Wires > Extremities.
Result: The list window is displayed.
See the following topic in this document: “Description of the list of PW Extremities”
(p. 16-83)
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
16-82 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
T-MPLS Provisioning Management Description of the list of PW Extremities
Managing Pseudo Wires (T-MPLS)
....................................................................................................................................................................................................................................

Description of the list of PW Extremities


Attributes of a PW Extremities
The attributes displayed are:
• User Label.
• NE User Label (A).
• Termination User Label (A).
• NE User Label (Z).
• Termination User Label (Z).

....................................................................................................................................................................................................................................
1350 OMS 16-83
8DG42227DAAA 9.6
Issue 3 December 2012
T-MPLS Provisioning Management View the section inventory from Pseudo Wire
Managing Pseudo Wires (T-MPLS)
....................................................................................................................................................................................................................................

View the section inventory from Pseudo Wire


When to use
This function gets information about each T-MPLS section (and their states) contained in
the previously selected Pseudo Wire.

Related information
For information about Pseudo Wire, see: “T-MPLS tunnel description” (p. 16-97).

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.

Task
From MS-GUI main window:
...................................................................................................................................................................................................

1 Select Search > Packet > T-MPLS > T-MPLS Pseudo Wires.
Result: The list window is shown.
...................................................................................................................................................................................................

2 Select one item in the list.


...................................................................................................................................................................................................

3 Select Search > Packet > T-MPLS Pseudo Wires > T-MPLS Section Inventory.
choose one of the objects related to the tunnel:
• Pseudo Wires crossing the T-MPLS tunnel.
• Protection Groups involving the tunnel.
• T-MPLS server sections.
• Routing constraints associated to the tunnel.
• Spare (working/protecting) tunnel in case of trail 1-to-1 protection.
Result: The list of the requested object is shown.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
16-84 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
T-MPLS Provisioning Management Description of the T-MPLS section Inventory
Managing Pseudo Wires (T-MPLS)
....................................................................................................................................................................................................................................

Description of the T-MPLS section Inventory


Attributes of a T-MPLS section Inventory
One of the objects related to the tunnel is shown:
• Pseudo Wires crossing the T-MPLS tunnel.
• Protection Groups involving the tunnel.
• T-MPLS server sections.
• Routing constraints associated to the tunnel.
• Spare (working/protecting) tunnel in case of trail 1-to-1 protection.

....................................................................................................................................................................................................................................
1350 OMS 16-85
8DG42227DAAA 9.6
Issue 3 December 2012
T-MPLS Provisioning Management View the bandwidth load of Pseudo Wire
Managing Pseudo Wires (T-MPLS)
....................................................................................................................................................................................................................................

View the bandwidth load of Pseudo Wire


When to use
This function gets information about the bandwidth load of a Pseudo Wire.

Related information
For information about Pseudo Wire, see: “Overview about Pseudo Wires” (p. 16-50).

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.

Task
From MS-GUI main window:
...................................................................................................................................................................................................

1 Select Search > Packet > T-MPLS Pseudo Wires.


Result: The list window is shown.
...................................................................................................................................................................................................

2 Select one item in the list.


...................................................................................................................................................................................................

3 Select Search > Packet > T-MPLS section Bandwidth Load.


Result: The system displays:
• the green-committed bandwidth = TU-CIR.
• the green-reserved bandwidth used by all supported PWs = TU-reserved-CIR.
• the yellow (peak minus committed) bandwidth = TU-PIR – TU-CIR.
• the yellow (peak minus reserved) bandwidth used by all supported PWs = TU-PIR
– TU-reserved-CIR.
• the overbooking ratio.
Note: The overbooking ratio is computed as the ratio between the yellow
bandwidth used by all supported PWs and the yellow bandwidth made available
by the tunnel.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
16-86 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
T-MPLS Provisioning Management View the route of Pseudo Wires
Managing Pseudo Wires (T-MPLS)
....................................................................................................................................................................................................................................

View the route of Pseudo Wires


When to use
This function presents graphically all Pseudo Wires used by the previously selected
Pseudo Wire.

Related information
For information about Pseudo Wire, see: “Overview about Pseudo Wires” (p. 16-50).
commands on map
The following commands are available from the graphical view, depending on the
selected object and its position on the route:
• With no selection: Begin of Route and End of Route commands highlights the NE
used for the beginning or the end of the route.
• With a selected entity (NE, Pseudo Wire, ENE, Off page connector): Begin of Route
and End of Route commands are completed by other commands depending on the
selected entity.

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.

Task
From MS-GUI main window:
...................................................................................................................................................................................................

1 Select Search > Packet > T-MPLS > T-MPLS Pseudo Wires.
Result: The list window is shown.
...................................................................................................................................................................................................

2 Select one item in the list.


...................................................................................................................................................................................................

3 Select Search > Packet > T-MPLS section Display Route.


Result: The Pseudo Wires used by the Pseudo Wire appear in blue.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS 16-87
8DG42227DAAA 9.6
Issue 3 December 2012
T-MPLS Provisioning Management View the Pseudo Wires crossing a Pseudo Wire
Managing Pseudo Wires (T-MPLS)
....................................................................................................................................................................................................................................

View the Pseudo Wires crossing a Pseudo Wire


When to use
This function consists in listing the Pseudo Wires related to a previously selected Pseudo
Wire.

Related information
For information about Pseudo Wire, see: “Overview about Pseudo Wires” (p. 16-50).

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.

Task
From MS-GUI main window:
...................................................................................................................................................................................................

1 Select Search > Packet > T-MPLS > T-MPLS Pseudo Wires.
Result: The list window is shown.
...................................................................................................................................................................................................

2 Select one item in the list.


...................................................................................................................................................................................................

3 Select Search > Packet > List Pseudo Wires.


Result: The list window is displayed.
See the following topic in this document: “Description of the list of Pseudo Wires”
(p. 16-89)
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
16-88 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
T-MPLS Provisioning Management Description of the list of Pseudo Wires
Managing Pseudo Wires (T-MPLS)
....................................................................................................................................................................................................................................

Description of the list of Pseudo Wires


Attributes of a Pseudo Wire
The attributes displayed for each listed Pseudo Wire are:
• Pseudo Wire User Label.
• Pseudo Wire User Label.
• T-MPLS Label.

....................................................................................................................................................................................................................................
1350 OMS 16-89
8DG42227DAAA 9.6
Issue 3 December 2012
T-MPLS Provisioning Management T-MPLS tunnel schema
T-MPLS tunnel schema
....................................................................................................................................................................................................................................

T-MPLS tunnel schema

T-MPLS tunnel schema


Layering
Layering

Figure 16-6 Layering

Tunnel entities
Tunnel entities

....................................................................................................................................................................................................................................
16-90 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
T-MPLS Provisioning Management T-MPLS tunnel schema
T-MPLS tunnel schema
....................................................................................................................................................................................................................................

Figure 16-7 Tunnel entities

PW entities
PW entities

....................................................................................................................................................................................................................................
1350 OMS 16-91
8DG42227DAAA 9.6
Issue 3 December 2012
T-MPLS Provisioning Management T-MPLS tunnel schema
T-MPLS tunnel schema
....................................................................................................................................................................................................................................

Figure 16-8 PW entities

....................................................................................................................................................................................................................................
16-92 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
T-MPLS Provisioning Management Ethernet Services in the T-MPLS Domain
T-MPLS tunnel schema
....................................................................................................................................................................................................................................

Ethernet Services in the T-MPLS Domain


Generals on T-MPLS Ethernet services
The following considerations are valid for all Ethernet services built over one T-MPLS
domain:
• in case of Virtual services, e.g. EVPLINE and EVPLAN, it is possible to share the same
UNI for more than one service
• each T-MPLS transport link (PW) is dedicated to only one Ethernet service (EVC). The
hardware implementation is standard compliant (the FPGA inserts/strips the PW label at
the UNI in case of p2p connections)
• there is no need to have a routing algorythm at the Ethernet layer over one T-MPLS
domain. In fact, one PW connects always two edge nodes and so routing is done at the
T-MPLS layer. The notable exception to this rule is the case of H-VPLS services, but in
that case routing at the Ethernet layer is again avoided since the operator has to specify
the VPLS core nodes
• for scalability reasons, for all service types, all Ethernet flows belonging to the same
EVC termination must be transported over the same PW towards each remote EVC
termination. Specifically,
•• for point-to-point services: in case an EVC termination has multiple ingress Ethernet
flows, all flows must be mapped to the same PW; similarly, in case of multiple egress
flows, all flows must be (de)mapped from the same PW
•• for multipoint services: in case one EVC termination has multiple Ethernet ingress
flows, all flows must be mapped to only one PW dedicated to each remote destination;
similarly, in case of multiple egress flows, all flows must be (de)mapped from only one
PW for each remote source

POINT-TO-POINT EVC OVER T-MPLS - EVPL service


The EVPL EVC must be layered over two unidirectional T-MPLS PWs (uniformly or
diversely routed) if different bandwidth characteristics (traffic descriptors) are required
for the forward and backward directions.
All Ethernet flows that compose the EVC termination must be carried over the same PW.
PKT checks that the bandwidth parameters of the T-MPLS transport link satisfy the
bandwidth requirements of the associated ETS ingress flow:
- Max Flow PIR <= TL PIR
- Σ Flow CIR <= TL CIR
- Max Flow PBS <= TL PBS
- Σ Flow CBS <= TL CBS
PKT reserves the flow’s bandwidth on the TL in PKT database
: - TL reserved PIR = Max (Max flow PIR, Σ flow CIR)
....................................................................................................................................................................................................................................
1350 OMS 16-93
8DG42227DAAA 9.6
Issue 3 December 2012
T-MPLS Provisioning Management Ethernet Services in the T-MPLS Domain
T-MPLS tunnel schema
....................................................................................................................................................................................................................................
- TL reserved CIR = Σ flow CIR
- TL reserved PBS = Max (Max flow PBS, Σ flow CBS)
- TL reserved CBS = Σ flow CBS

POINT-TO-POINT EVC OVER T-MPLS - EPL service


The EPL service reserves the edge port (UNI) usage to only one service.
Other service constraints are
: - service frame disposition is only “deliver unconditionally”
- L2 CP processing is always “tunnel” except for PAUSE frames that are discarded
- policing mode of Ethernet flow is only “color blind”
- only “guaranteed” CoS of Ethernet flow is allowed
- no specific traffic classification is applied to the Ethernet flow
Apart from service characteristic values, the same management of the EVPL service
applies.

MULTI POINT-TO-MULTI POINT EVC OVER T-MPLS - EVPLAN service


The EVC contains a set of EVC terminations at the edge nodes. There is a set of core
PWs interconnecting a set of core nodes, in full-mesh modality. The core PWs are always
bidirectional. The core nodes are also edge nodes when they have EVC terminations.
All edge nodes are also core nodes and, in the top-down workflow, they are automatically
interconnected by the system with a full mesh of core PWs (top-down allocation phase).
In the bottom-up workflow, the operator has to manually select the full-mesh of core PWs
(bottom-up allocation phase).
If an edge node is not a core node, then it must be interconnected to one core node with
one unidirectional or bidirectional spoke PW for each EVC termination in the edge node.
A core node contains one Virtual Switch Instance (VSI). The VSI is a split-horizon
bridge, in the sense that no traffic egressing from one core PW is allowed to ingress
another core PW. An edge node contains at least one EVC termination.
The case where all EVC terminations are present in one single edge node is allowed.
The same UNI and the same tunnel infrastructure could be shared between different
services, point-to-point or multi-point services.

DUAL-HOMED EVPLINE SERVICES FOR HYBRID T-MPLS NETWORK


The management of hybrid ring-closure scenarios, requires the introduction of a the
Dual-Homed EVPLINE service type.
The Dual-Homed EVPLINE service is always bidirectional, while the infrastructure PWs
can be:
- bidirectional, in the hierarchical topology scenario
....................................................................................................................................................................................................................................
16-94 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
T-MPLS Provisioning Management Ethernet Services in the T-MPLS Domain
T-MPLS tunnel schema
....................................................................................................................................................................................................................................
- unidirectional, in the flat topology scenario
In the flat scenario, two unidirectional spoke PWs are associated to the same TSS40 EVC
termination.

Figure 16-9 DH EVPLINE infrastructure

....................................................................................................................................................................................................................................
1350 OMS 16-95
8DG42227DAAA 9.6
Issue 3 December 2012
T-MPLS Provisioning Management Ethernet Services in the T-MPLS Domain
T-MPLS tunnel schema
....................................................................................................................................................................................................................................
Broadband TeleVision (BTV) service
The BTV service is a rooted-multipoint service (aka bidirectional E-TREE service w/
packet replication) for video distribution from one root EVC termination towards many
leaf EVC terminations. The BTV traffic flows in the downstream direction for video
distribution, but it could need also upstream traffic for video channel selection.
It is needed to block traffic from leaf to leaf

Broadcast service
The broadcast service is a rooted-multipoint service (aka unidirectional E-TREE service
w/ packet replication) for traffic distribution from one root EVC termination towards
many leaf EVC terminations. The broadcast traffic flows only in the downstream
direction.

High-Speed Internet (HSI) service


The HSI service is a rooted-multipoint service (aka bidirectional E-TREE service w/o
packet replication), namely a service characterized by one EVC termination as root and
all other EVC terminations as leaves.
It allows connecting one main site with many remote sites of the same customer
(back-hauling) or one main site with many remote sites associated to different customers
(broadband access).
The HSI traffic flows both in the root to leaf direction (downstream) and in the leaf to
root direction (upstream). The downstream and upstream directions have usually different
bandwidth characteristics.
The features are:
- it is possible to have different bandwidth characteristics for downstream and upstream
traffic
- there is no need to replicate packets originated by the root termination towards more
than one leaf termination

....................................................................................................................................................................................................................................
16-96 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
T-MPLS Provisioning Management T-MPLS tunnel description
Managing T-MPLS tunnels
....................................................................................................................................................................................................................................

Managing T-MPLS tunnels

T-MPLS tunnel description


Tunnel definition
Tunnels are point-to-point logical connections between NNI ports. The tunnel route spans
one or more T-MPLS sections.
The same tunnel can carry one or more PW. The tunnel purpose is to enhance scalability
of T-MPLS logical connections.

Tunnels as LSPs
Tunnels are Label Switched Paths (LSP). The Tunnel terminations correspond to:
• A label Push at the ingress LER.
• Aa label Pop at the egress LER.
T-MPLS manages the T-MPLS tunnel creation in the database, requested by user
(bottom-up approach) or by PW creation (top-down approach). The T-MPLS Tunnel, or
T-MPLS Path, is a logical entity that represents point-to-point connections between NNI
ports. The tunnel route can span one or more T-MPLS sections or one or more underlying
tunnels. The T-MPLS tunnel is an example of Label Switched Path (LSP).

Purpose of the tunnel


The tunnel purpose is to enhance the scalability of T-MPLS logical connections. The
tunnel can carry one or more client services (PW), it can be involved in a protection
schema (linear colon, linear plus, or MPLS Ring).
The tunnel supports OAM capabilities: the user can instantiate and enable the
Maintenance End Points (MEPs) on tunnels terminations.

System configuration of the tunnel


The system is able to configure a tunnel between NNI ports belonging to contiguous
T-MPLS domains using only the sections present in T-MPLS DB. A tunnel cannot be
created using other underlying tunnels. Only E-LSP tunnels are supported.

User creation of the tunnel


The tunnel creation can be performed by the operator using the T-MPLS GUI or
automatically during a client service definition. When creating the tunnel, the operator
can fully specify the tunnel route by means of section constraints or can specify only the
end NNI ports with, optionally, a partial or complete list of section constraints. The tunnel
creation is an operation that defines the tunnel and reserves the resources in T-MPLS DB.

....................................................................................................................................................................................................................................
1350 OMS 16-97
8DG42227DAAA 9.6
Issue 3 December 2012
T-MPLS Provisioning Management T-MPLS tunnel description
Managing T-MPLS tunnels
....................................................................................................................................................................................................................................
When creation fails
If the operation fails, the tunnel is put in “defined” state with working state
“failedToAllocate” value and the system notifies the cause of the failure. While in
“defined” state, the operator can remove the tunnel or modify the input parameters (edge
points, section constraints, and so on) and perform again the creation.

Successful creation
If the creation completes successfully the tunnel is in “allocated” state. Tunnel creation is
the same for static, dynamic, and mixed tunnels. In all cases, the system is required to
compute the tunnel nominal route. The static case and the dynamic case differ only in the
way the nominal route is provisioned.

....................................................................................................................................................................................................................................
16-98 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
T-MPLS Provisioning Management View the list of T-MPLS tunnels
Managing T-MPLS tunnels
....................................................................................................................................................................................................................................

View the list of T-MPLS tunnels


When to use
The T-MPLS tunnel List window presents all the T-MPLS tunnels and their attributes.

Related information
For information about T-MPLS tunnel, see: “T-MPLS tunnel description” (p. 16-97).

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.

Task
From MS-GUI main window:
...................................................................................................................................................................................................

1 Select: Search > Packet > T-MPLS.


Result: The T-MPLS menu is displayed.
...................................................................................................................................................................................................

2 Select: T-MPLS tunnel.


Result: The T-MPLS tunnel list is displayed.
See the following topic in this document: “Description of the list of T-MPLS tunnels”
(p. 16-100)
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS 16-99
8DG42227DAAA 9.6
Issue 3 December 2012
T-MPLS Provisioning Management Description of the list of T-MPLS tunnels
Managing T-MPLS tunnels
....................................................................................................................................................................................................................................

Description of the list of T-MPLS tunnels


Attributes of a T-MPLS tunnel
The attributes displayed for each T-MPLS tunnel are:
• User Label.
• Working State (Normal, Removing, Allocating, De-allocating, Implementing,
De-implementing).
• Last Action.
• Configuration State (Idle, Busy).
• Operational State (Idle, Busy).
• Alarm Status (Normal, Degraded, In failure).
• Flow (Idle, Busy).
• Protection Role (Working, Protecting).
• Protection Status (Working, Protecting).
• Provisioning Type (Defined, Allocated, Partially Implemented, Implemented).
• Cration date.
• CIR.
• PIR.
• CBS.
• PBS.
• Reserved CIR.
• A Port ID.
• Z Port ID.
• A Port.
• Z Port.

....................................................................................................................................................................................................................................
16-100 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
T-MPLS Provisioning Management Create a T-MPLS tunnel
Managing T-MPLS tunnels
....................................................................................................................................................................................................................................

Create a T-MPLS tunnel


When to use
This function manages T-MPLS tunnel creation and allocation.

Related information
For information about T-MPLS tunnel, see: “T-MPLS tunnel description” (p. 16-97).
creation phase
The system perform the following actions:
• The system checks that the section constraints describe a fully connected route
between the end nodes.
• The system checks that the tunnel PHB profile is supported by the domain Egress
PHB Profile.
• The system defines the tunnel and updates the T-MPLS DB allocating the tunnel
along the section constraints.
• If the operator does not specify the bandwidth parameters, the system creates the
tunnel with associated null TD (PIR=CIR=0 and PBS=CBS=0 ).
• If the operator does not constrain the underlying Virtual Transport (by means of VT
parameter), the system allocates the tunnel on the default VT.
The reserved CIR parameter is always equal to the TD CIR parameter, except when an
allocated PWs is over one implemented tunnel. In such case, the tunnel reserved CIR
represents the CIR required to support the PW committed bandwidth, while the TD CIR
represents the committed bandwidth of the implemented tunnel.
When the supported PWs are implemented, TD CIR is enlarged to match the reserved
CIR. If the PWs are deallocated, the reserved CIR is reduced down to the TD CIR value.
The alarms enabling rule tells if the alarm correlation for this tunnel is enabled or not. It
tells also when the correlation has been enabled, either at tunnel implementation or
subsequently by manual enabling command. In case of alarms “enabling-on-
implementation” or “manual-enabling”, the system creates MEPs with default values. The
user is also allowed to set MEP attribute values.
The PM enabling rule tells whether the performance monitoring for this tunnel is started
or not. It tells also when the monitoring has been enabled, either at tunnel implementation
or subsequently by manual start command. In case of PM “enabling-on-implementation”
or “manual-enabling” after the implementation, the operator has also to specify the
granularity of the measures to be started.
The routing constraints are specified in terms of underlying T-MPLS sections. With VT
management, the constraint can also be further refined selecting the VT logical
connection over the selected T-MPLS section. The association between Tunnel and VT is
provisioned by means of TL1.

....................................................................................................................................................................................................................................
1350 OMS 16-101
8DG42227DAAA 9.6
Issue 3 December 2012
T-MPLS Provisioning Management Create a T-MPLS tunnel
Managing T-MPLS tunnels
....................................................................................................................................................................................................................................
Before you begin
The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Conditions
To get a positive result:
• The User Label must be different as one which is exists.
• The user must define the complete route of T-MPLS tunnel in terms of section
constraints.
If the user does not define the tunnel route, tunnel is created in defined state.
Note: In this version, a tunnel cannot be created using other underlying tunnels. Only
E-LSP tunnels are supported.

Task
From MS-GUI main window:
...................................................................................................................................................................................................

1 Select Action > Packet > T-MPLS > Create T-MPLS tunnel.
Result: The T-MPLS tunnel creation wizard is displayed.
To create a T-MPLS tunnel, the user specify:
• T-MPLS tunnel User label.
• PHB Profile (optional).
• Direction (bidirectional, unidirectional).
• Alarms enabling rule (no-enabling, manual-enabling, enabling-on-
implementation).
• PM enabling rule (no-enabling, manual-enabling, enabling-on-
implementation).
• Protection level (unprotected, trail-1-to-1, full-restoration).
• Edge points (end NNI ports).
• Routing constraints (optionally).
• Bandwidth parameters (optionally)
– PIR.
– Reserved CIR.
– PBS.
– CBS.
...................................................................................................................................................................................................

2 Click Ok.

....................................................................................................................................................................................................................................
16-102 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
T-MPLS Provisioning Management Create a T-MPLS tunnel
Managing T-MPLS tunnels
....................................................................................................................................................................................................................................
Result: If the operation completes without errors the final tunnel state is allocated;
otherwise. the state is defined with workingState equal to failedToAllocate.
The Usage state of T-MPLS tunnel changes to busy when the T-MPLS tunnel
supports at least one T-MPLS section.
Then, the tree area, opened graphical views and the T-MPLS tunnel List are updated.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS 16-103
8DG42227DAAA 9.6
Issue 3 December 2012
T-MPLS Provisioning Management Modify a T-MPLS tunnel
Managing T-MPLS tunnels
....................................................................................................................................................................................................................................

Modify a T-MPLS tunnel


When to use
The function modifies T-MPLS tunnel characteristics

Related information
For information about T-MPLS tunnel, see: “T-MPLS tunnel description” (p. 16-97).
The T-MPLS tunnel modification gives the possibility to modify:
• T-MPLS tunnel User Label.
• Comment.

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Conditions
To get a positive result:
• If the User Label is modified, the new User Label must be different as one which is
already used by another T-MPLS tunnel.
• If the provisioning state of the T-MPLS tunnel is Defined and usage state is Idle,
the Traffic Descriptor associated to the T-MPLS tunnel is modifiable.

Task
From MS-GUI main window:
...................................................................................................................................................................................................

1 Select Search > Packet > T-MPLS > T-MPLS tunnels.


Result: The list window is shown.
...................................................................................................................................................................................................

2 Select one item in the list.


...................................................................................................................................................................................................

3 Select Action > Packet > T-MPLS tunnel > Modify.


Result: The T-MPLS tunnel modification window is displayed.
...................................................................................................................................................................................................

4 To modify a T-MPLS tunnel:


• Enter a new User Label (optional).
• Modify the Comment (optional).
....................................................................................................................................................................................................................................
16-104 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
T-MPLS Provisioning Management Modify a T-MPLS tunnel
Managing T-MPLS tunnels
....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

5 Select OK.
Result: After confirmation, the tree area and the T-MPLS tunnel list are updated.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS 16-105
8DG42227DAAA 9.6
Issue 3 December 2012
T-MPLS Provisioning Management Delete a T-MPLS tunnel
Managing T-MPLS tunnels
....................................................................................................................................................................................................................................

Delete a T-MPLS tunnel


When to use
This function consists in deleting a T-MPLS tunnel.

Related information
For information about T-MPLS tunnel, see: “T-MPLS tunnel description” (p. 16-97).

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Conditions
To get a positive result:
• The selected T-MPLS tunnel must be set toAllocated or Defined.
• The selected T-MPLS tunnel must not support allocated nor implemented Pseudo
Wires.

Task
From MS-GUI main window:
...................................................................................................................................................................................................

1 Select Search > Packet > T-MPLS > T-MPLS tunnels.


Result: The list window is shown.
...................................................................................................................................................................................................

2 Select one or more items in the list.


...................................................................................................................................................................................................

3 Select Action > Packet > T-MPLS tunnels > Delete or Click the third key of the mouse
and select Delete.
...................................................................................................................................................................................................

4 Select one of the options in the confirmation box. Refer to the procedure “Confirm the
action” (p. 11-40).
Result: After confirmation, if concerned T-MPLS tunnel is associated to a Traffic
Descriptor, a disassociation is automatically done and the T-MPLS tunnel is removed.
Then T-MPLS tunnel list, the tree area, and the opened graphical views are updated.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
16-106 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
T-MPLS Provisioning Management View the details of the T-MPLS tunnels
Managing T-MPLS tunnels
....................................................................................................................................................................................................................................

View the details of the T-MPLS tunnels


When to use
This function gets information about a T-MPLS tunnel.

Related information
For information about T-MPLS tunnel, see: “T-MPLS tunnel description” (p. 16-97).

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.

Task
From MS-GUI main window:
...................................................................................................................................................................................................

1 Select Search > Packet > T-MPLS > T-MPLS tunnels.


Result: The list window is shown.
...................................................................................................................................................................................................

2 Select one item in the list.


...................................................................................................................................................................................................

3 Select Search > T-MPLS tunnels > Properties.


Result: The property window is displayed.
See the following topic in this document: “Details of a T-MPLS tunnel” (p. 16-108)
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS 16-107
8DG42227DAAA 9.6
Issue 3 December 2012
T-MPLS Provisioning Management Details of a T-MPLS tunnel
Managing T-MPLS tunnels
....................................................................................................................................................................................................................................

Details of a T-MPLS tunnel


Attributes of a T-MPLS tunnel
The attributes displayed for each T-MPLS tunnel are:
• User Label.
• Parent Subnetwork.
• Usage State (Idle, Busy).
• Working State (Normal, Removing, Allocating, De-allocating, Implementing,
De-implementing).
• Provisioning State (Defined, Allocated, Partially Implemented, Implemented).
• Availability Status (Normal, Degraded, In failure).
• Consistency State (Consistent, Not consistent, Not meaningful).
• Comment.
• Last Action Type.
• Last Action Date.
• Traffic Descriptor User Label.

....................................................................................................................................................................................................................................
16-108 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
T-MPLS Provisioning Management Configuration of the route of a T-MPLS tunnel
Managing T-MPLS tunnels
....................................................................................................................................................................................................................................

Configuration of the route of a T-MPLS tunnel


When to use
This function consists in adding/removing sections as constraint to a T-MPLS tunnel.

Related information
For information about T-MPLS tunnel, see: “T-MPLS tunnel description” (p. 16-97).
PKT starts the reroute operation and reallocates the tunnel along a new route that satisfies
the updated list of constraints.

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Conditions
To get a positive result:
• The T-MPLS tunnel must be allocated.

Task
From MS-GUI main window:
...................................................................................................................................................................................................

1 Select Search > Packet > T-MPLS > T-MPLS tunnels.


Result: The list window is shown.
...................................................................................................................................................................................................

2 Select one or more items in the list.


...................................................................................................................................................................................................

3 Select: Action > Packet > T-MPLS tunnel > Add Constraints.
Result: To add a new T-MPLS tunnel constraint:
• Enter the User Label of the Pseudo Wire.
• Enter a T-MPLS Label (optional) by using the sensitive help.
...................................................................................................................................................................................................

4 Select OK.

....................................................................................................................................................................................................................................
1350 OMS 16-109
8DG42227DAAA 9.6
Issue 3 December 2012
T-MPLS Provisioning Management Configuration of the route of a T-MPLS tunnel
Managing T-MPLS tunnels
....................................................................................................................................................................................................................................
Result: After confirmation, the T-MPLS tunnel constraint is added at the end of the
constraint list as the last one of the route.
Then, the T-MPLS tunnel Constraint List is updated.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
16-110 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
T-MPLS Provisioning Management Delete a constraint from a T-MPLS tunnel
Managing T-MPLS tunnels
....................................................................................................................................................................................................................................

Delete a constraint from a T-MPLS tunnel


When to use
This function consists in deleting one constraint related to a T-MPLS tunnel.

Related information
For information about T-MPLS tunnel, see: “T-MPLS tunnel description” (p. 16-97).
PKT starts the reroute operation and reallocates the tunnel along a new route that satisfies
the updated list of constraints.

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Conditions
To get a positive result:
• The provisioning state of the selected T-MPLS tunnel must be Defined.
• The working state must be Normal (that is, no operation is running on it).

Task
From MS-GUI main window:
...................................................................................................................................................................................................

1 Select Search > Packet > T-MPLS > T-MPLS tunnels.


Result: The list window is shown.
...................................................................................................................................................................................................

2 Select one item in the list.


...................................................................................................................................................................................................

3 Select: Search > Packet > T-MPLS > T-MPLS tunnels > Constraints.
...................................................................................................................................................................................................

4 Select one or more items in the list.


...................................................................................................................................................................................................

5 Select Action > T-MPLS tunnels > Delete.


...................................................................................................................................................................................................

6 Select one of the options in the confirmation box. Refer to the procedure “Confirm the
action” (p. 11-40).

....................................................................................................................................................................................................................................
1350 OMS 16-111
8DG42227DAAA 9.6
Issue 3 December 2012
T-MPLS Provisioning Management Delete a constraint from a T-MPLS tunnel
Managing T-MPLS tunnels
....................................................................................................................................................................................................................................
Result: After confirmation, the T-MPLS tunnel constraints are deleted and the
T-MPLS tunnel Constraint List is updated.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
16-112 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
T-MPLS Provisioning Management Configuration of PHB profile of a T-MPLS tunnel
Managing T-MPLS tunnels
....................................................................................................................................................................................................................................

Configuration of PHB profile of a T-MPLS tunnel


When to use
This function consists in adding/removing PHB Profile to a T-MPLS tunnel.

Related information
For information about T-MPLS tunnel, see: “T-MPLS tunnel description” (p. 16-97).
For information about LSP PHB profiles, see: “Overview about PHB profile management
” (p. 16-5).
The operator selects the previously created PHB profile on domain basis to be associated
with that tunnel CTP.
PKT associates the new PHB to the CTP in database. If the tunnel is implemented, PKT
creates automatically the new Node-PHB in the node and deletes the previously
associated one. If the old Node-PHB must not be used by any other tunnel. PKT checks
that the tunnel does not support any PW, since the operation requires tunnel deactivation
and reactivation.

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Conditions
To get a positive result:
• The T-MPLS tunnel must not support any Pseudo Wire.

Task
From MS-GUI main window:
...................................................................................................................................................................................................

1 Select Search > Packet > T-MPLS > T-MPLS tunnels.


Result: The list window is shown.
...................................................................................................................................................................................................

2 Select one item in the list.


...................................................................................................................................................................................................

3 Select: Action > Packet > T-MPLS tunnel > tunnel CTP.

....................................................................................................................................................................................................................................
1350 OMS 16-113
8DG42227DAAA 9.6
Issue 3 December 2012
T-MPLS Provisioning Management Configuration of PHB profile of a T-MPLS tunnel
Managing T-MPLS tunnels
....................................................................................................................................................................................................................................
Result: The list window is shown.
...................................................................................................................................................................................................

4 Select one item in the list.


...................................................................................................................................................................................................

5 Select: Action > Packet > T-MPLS tunnel CTP > Add PHB Profile.
...................................................................................................................................................................................................

6 Select OK.
Result: The profile is added to tunnel.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
16-114 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
T-MPLS Provisioning Management Configuration of Layer-2 encapsulation of a tunnel
Managing T-MPLS tunnels
....................................................................................................................................................................................................................................

Configuration of Layer-2 encapsulation of a tunnel


When to use
This function consists in adding/removing Layer-2 encapsulation Profile to a T-MPLS
tunnel.

Related information
For information about T-MPLS tunnel, see: “T-MPLS tunnel description” (p. 16-97).
The operator selects the previously created PHB profile on domain basis to be associated
with that tunnel CTP.
PKT associates the new PHB to the CTP in database. If the tunnel is implemented, PKT
creates automatically the new Node-PHB in the node and deletes the previously
associated one. The old Node-PHB must not be used by any other tunnel. PKT checks
that the tunnel does not support any PW, since the operation requires tunnel deactivation
and reactivation.

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Conditions
To get a positive result:
• The T-MPLS tunnel must not support any Pseudo Wire.
• Underlying layer of the T-MPLS Port is MAU.

Task
From MS-GUI main window:
...................................................................................................................................................................................................

1 Select Search > Packet > T-MPLS > T-MPLS tunnels.


Result: The list window is shown.
...................................................................................................................................................................................................

2 Select one item in the list.


...................................................................................................................................................................................................

3 Select: Action > Packet > T-MPLS tunnel > tunnel CTP.

....................................................................................................................................................................................................................................
1350 OMS 16-115
8DG42227DAAA 9.6
Issue 3 December 2012
T-MPLS Provisioning Management Configuration of Layer-2 encapsulation of a tunnel
Managing T-MPLS tunnels
....................................................................................................................................................................................................................................
Result: The list window is shown.
...................................................................................................................................................................................................

4 Select one item in the list.


...................................................................................................................................................................................................

5 Select: Action > Packet > T-MPLS tunnel CTP > Add PHB Profile.
...................................................................................................................................................................................................

6 Select OK.
Result: The profile is added to the tunnel CTP.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
16-116 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
T-MPLS Provisioning Management Allocate T-MPLS tunnel
Managing T-MPLS tunnels
....................................................................................................................................................................................................................................

Allocate T-MPLS tunnel


When to use
This operation is performed when the user wants to find a path route between the two
extremities of a T-MPLS tunnel.

Related information
For information about T-MPLS tunnel, see: “T-MPLS tunnel description” (p. 16-97).
route
Before the allocation operation, the user has given a complete path route in term of
constraints (T-MPLS Pseudo Wire List). Constraints can optionally be associated with the
T-MPLS Labels. See “Add a constraint to an LSP tunnel” (p. 15-56).
The 1350 OMS PKT checks the continuity of the route.
If the T-MPLS tunnel is only one, the route is already defined. In this case, the constraint
List is not mandatory. The Pseudo Wire is identified by the T-MPLS tunnel extremities
given during the definition. Even not mandatory, it can be useful for the user to gives a
specific T-MPLS label.
If the user gives a T-MPLS Label in the constraint list, the system checks the availability
of the T-MPLS Label. If the T-MPLS Label. is used by another T-MPLS tunnel or
T-MPLS section, 1350 OMS PKT chooses and reserves automatically an available
T-MPLS label.
bandwidth
The system calculates the effective bandwidth of the T-MPLS tunnel according to the
associated Traffic Descriptor (see the table).
Each T-MPLS Pseudo Wire of the given route must provide the effective bandwidth of the
T-MPLS tunnel. Available Bandwidth of Pseudo Wire is greater than or equal to Effective
bandwidth of T-MPLS tunnel.

Traffic contract type. Effective bandwidth reserved on Pseudo Wire.


Best Effort. 0 1.
Assured Forwarding. CIR.
Expedited Forwarding. CIR.

Notes:
1. In the case Best Effort traffic contract, no effective bandwidth is reserved. In this case, for
each Pseudo Wire, a maximum number of Best Effort T-MPLS tunnel is checked.

For all traffic contract, CIR must be less than or equal to PIR and PIR must be less than or
equal to Pseudo Wire Total bandwidth.

....................................................................................................................................................................................................................................
1350 OMS 16-117
8DG42227DAAA 9.6
Issue 3 December 2012
T-MPLS Provisioning Management Allocate T-MPLS tunnel
Managing T-MPLS tunnels
....................................................................................................................................................................................................................................
allocation phase
The T-MPLS tunnel is allocated:
• LSP links along the route used by the T-MPLS tunnel are created, referenced by a
T-MPLS Label of each crossed Pseudo Wire.
• T-MPLS Label of each involved Pseudo Wire is reserved to the T-MPLS tunnel.
• T-MPLS tunnel cross connections are generated.
• Bandwidth of each Pseudo Wire (used and available bandwidths) is computed in the
used direction.
• If the Usage State of each T-MPLS Pseudo Wire used by the T-MPLS tunnel is idle,
the state changes to busy.
tunnel states
The T-MPLS tunnel is also updated with the following states:
• Provisioning State: Allocated.
• Working State: Normal.

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Conditions
To get a positive result:
• The provisioning state of the selected T-MPLS tunnel must be set to Defined.
• The working state must be set to Normal (if not, an operation is running on it).
• The T-MPLS tunnel must be associated to a Traffic Descriptor.
• The constraints on the T-MPLS tunnel have been previously added (except for unitary
T-MPLS tunnel).
• The T-MPLS sections defined as constraints are contiguous.
• The constraint lists must be compliant with the T-MPLS tunnel extremities.
• The maximum number of Best Effort T-MPLS tunnel for each Pseudo Wire is not
reached.

Task
From MS-GUI main window:
...................................................................................................................................................................................................

1 Select Search > Packet > T-MPLS > T-MPLS tunnels.

....................................................................................................................................................................................................................................
16-118 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
T-MPLS Provisioning Management Allocate T-MPLS tunnel
Managing T-MPLS tunnels
....................................................................................................................................................................................................................................
Result: The list window is shown.
...................................................................................................................................................................................................

2 Select one or more items in the list.


...................................................................................................................................................................................................

3 Select Action > T-MPLS tunnels > Allocate.


...................................................................................................................................................................................................

4 Select one of the options in the confirmation box. Refer to the procedure “Confirm the
action” (p. 11-40).
Result: At the beginning of the operation, the T-MPLS tunnel Working state is set to
Allocated. Then, the T-MPLS tunnel List is updated.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS 16-119
8DG42227DAAA 9.6
Issue 3 December 2012
T-MPLS Provisioning Management De-allocate T-MPLS tunnel
Managing T-MPLS tunnels
....................................................................................................................................................................................................................................

De-allocate T-MPLS tunnel


When to use
This operation allows to the user to de-allocate a T-MPLS tunnel.

Related information
For information about T-MPLS tunnel, see: “T-MPLS tunnel description” (p. 16-97).
deallocation phase
The 1350 OMS PKT retrieves all T-MPLS Pseudo Wires used by the T-MPLS tunnel. It
updates for each of them available and used bandwidths for the used direction. It frees the
involved T-MPLS Labels.
The LSP links and the LSP cross connections are also retrieved and deleted.
The T-MPLS tunnel is de-allocated:
• Bandwidth of each Pseudo Wires used by the T-MPLS tunnel are updated.
• If no more T-MPLS tunnel is carried, the Usage State of Pseudo Wires used by the
T-MPLS tunnel is changed to idle.
• T-MPLS Label of each Pseudo Wire involved in LSP links is released.
The T-MPLS tunnel is also updated with the following states:
• Provisioning State: Defined.
• Working State: Normal.

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Conditions
To get a positive result:
• The provisioning state of the selected T-MPLS tunnel must be set to Allocated.
• The working state must be set to Normal (if not, an operation is running on it).
• The T-MPLS tunnel state is not busy.

Task
From MS-GUI main window:
...................................................................................................................................................................................................

1 Select Search > Packet > T-MPLS > T-MPLS tunnels.

....................................................................................................................................................................................................................................
16-120 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
T-MPLS Provisioning Management De-allocate T-MPLS tunnel
Managing T-MPLS tunnels
....................................................................................................................................................................................................................................
Result: The list window is shown.
...................................................................................................................................................................................................

2 Select one or more items in the list.


...................................................................................................................................................................................................

3 Select Action > T-MPLS > T-MPLS tunnels > Deallocate.


...................................................................................................................................................................................................

4 Select one of the options in the confirmation box. Refer to the procedure “Confirm the
action” (p. 11-40).
Result: After confirmation, the T-MPLS tunnel working state is set to Defined.
Then, the T-MPLS tunnel List is updated.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS 16-121
8DG42227DAAA 9.6
Issue 3 December 2012
T-MPLS Provisioning Management Implement a T-MPLS tunnel
Managing T-MPLS tunnels
....................................................................................................................................................................................................................................

Implement a T-MPLS tunnel


When to use
This function implements a T-MPLS tunnel.

Related information
For information about T-MPLS tunnel, see: “T-MPLS tunnel description” (p. 16-97).
Implementation phase
The tunnel provisioning can be static, dynamic, or mixed. Static means that the tunnel is
provisioned directly by NMS. Dynamic means that the tunnel is provisioned through
control plane. In mixed provisioning, PKT manages the tunnel creation and activation,
partially in the data plane and partially in the control plane.
Each NE involved in the T-MPLS tunnel is provisioned as following:
• If does not exit in the NE, Traffic Descriptor is created.
• The LER connections and the LSR connections are added to the NE.
• Extremities are activated.
If tunnel alarm enabling rule is on-implementation MEPs are automatically created and
activated on tunnel terminations at this stage.
If tunnel PM enabling rule is on-implementation, PM counting is automatically started
on tunnel terminations at this stage.
If at tunnel creation time the operator specified one PHB profile (selecting from a
portfolio of profiles available on domain basis) different from default, PKT automatically
implements the corresponding Node-PHB profiles on all tunnel segments. Similarly,
based on the tunnel bandwidth parameters, PKT automatically creates in each crossed NE
the corresponding TD.
If the tunnel uses an adaptive VT, PKT automatically configures VT bandwidth as
follows:
• VT Reserved CIR = Sum (LSP CIR), where the sum spans all allocated and
implemented LSP (tunnel or PW) directly supported by the VT, including current
tunnel, is unchanged.
• VT CIR = Sum (LSP CIR), where the sum spans all implemented LSP (tunnel or PW)
directly supported by the VT, including current tunnel.
• VT PIR = Max (LSP PIR), where the max is computed for all implemented LSP
(tunnel or PW) directly supported by the VT, including current tunnel.
tunnel states
The T-MPLS tunnel is updated with the following states:
• Provisioning State: Implemented (or Partially Implemented).
• Working State: Normal.
• Availability Status: Normal (or Degraded or In Failure).

....................................................................................................................................................................................................................................
16-122 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
T-MPLS Provisioning Management Implement a T-MPLS tunnel
Managing T-MPLS tunnels
....................................................................................................................................................................................................................................
Before you begin
The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Conditions
To get a positive result:
• The selected T-MPLS tunnel must be set to Allocated.
• The working state must be set to Normal.

Task
From MS-GUI main window:
...................................................................................................................................................................................................

1 Select Search > Packet > T-MPLS > T-MPLS tunnels.


Result: The list window is shown.
...................................................................................................................................................................................................

2 Select one item in the list.


...................................................................................................................................................................................................

3 Select: Action > Packet > T-MPLS > T-MPLS tunnel > Implement.
...................................................................................................................................................................................................

4 Select OK.
Result: After implementation, the T-MPLS tunnel List is updated.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS 16-123
8DG42227DAAA 9.6
Issue 3 December 2012
T-MPLS Provisioning Management De-implement a T-MPLS tunnel
Managing T-MPLS tunnels
....................................................................................................................................................................................................................................

De-implement a T-MPLS tunnel


When to use
This function consists in de-implementing a T-MPLS tunnel to remove the tunnel from
the network.

Related information
For information about T-MPLS tunnel, see: “T-MPLS tunnel description” (p. 16-97).
Deimplementation phase
PKT manages the static tunnel removal from the data plane, dynamic tunnel removal
from the control plane, or both.
If the tunnel were using a dedicated Node-PHB profile, the profile is automatically
deleted from the NE. If the tunnel were using a dedicated TD, the TD is automatically
deleted from the NE.
If the tunnel uses an adaptive VT, PKT automatically reconfigures VT bandwidth as
follows:
• VT Reserved CIR = Sum (LSP CIR), where the sum spans all allocated and
implemented LSP (tunnel or PW) directly supported by the VT, including current
tunnel, is unchanged.
• VT CIR = Sum (LSP CIR), where the sum spans all implemented LSP (tunnel or PW)
directly supported by the VT, excluding current tunnel.
• VT PIR = Max (LSP PIR), where the max is computed for all implemented LSP
(tunnel or PW) directly supported by the VT, excluding current tunnel.
Tunnel states
The user chooses a T-MPLS tunnel and requests its de-implementation. After operation,
then the working state is set to de-implementing and no traffic can be carried by it.

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Conditions
To get a positive result:
• The provisioning state of the selected T-MPLS tunnel must be set to Implemented
or Partially implemented.
• The T-MPLS tunnel must carry no implemented T-MPLS Pseudo Wires.

....................................................................................................................................................................................................................................
16-124 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
T-MPLS Provisioning Management De-implement a T-MPLS tunnel
Managing T-MPLS tunnels
....................................................................................................................................................................................................................................
Task
From MS-GUI main window:
...................................................................................................................................................................................................

1 Select Search > Packet > T-MPLS > T-MPLS tunnels.


Result: The list window is shown.
...................................................................................................................................................................................................

2 Select one or more items in the list.


...................................................................................................................................................................................................

3 Select Action > T-MPLS tunnels > De-Implement.


...................................................................................................................................................................................................

4 Select one of the options in the confirmation box. Refer to the procedure “Confirm the
action” (p. 11-40).
Result: The user chooses a T-MPLS tunnel and requests its de-implementation then
working state is set to allocated and no traffic could be carried by it.
After de-implementation, the T-MPLS tunnel List is updated.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS 16-125
8DG42227DAAA 9.6
Issue 3 December 2012
T-MPLS Provisioning Management List the constraints of a T-MPLS tunnel
Managing T-MPLS tunnels
....................................................................................................................................................................................................................................

List the constraints of a T-MPLS tunnel


When to use
This function lists the T-MPLS sections acting as constraints for the selected T-MPLS
tunnel.

Related information
For information about T-MPLS tunnel, see: “T-MPLS tunnel description” (p. 16-97).

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Conditions
To get a positive result:
• The T-MPLS tunnel must be allocated.

Task
From MS-GUI main window:
...................................................................................................................................................................................................

1 Select Search > Packet > T-MPLS > T-MPLS tunnels.


Result: The list window is shown.
...................................................................................................................................................................................................

2 Select one item in the list.


...................................................................................................................................................................................................

3 Select: Search > Packet > T-MPLS tunnels > Constraints.


Result: The list window is displayed.
See the following topic in this document: “Description of the list of T-MPLS tunnel
Constraints” (p. 16-127)
Only routing constraints created by operator are displayed to the UI.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
16-126 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
T-MPLS Provisioning Management Description of the list of T-MPLS tunnel Constraints
Managing T-MPLS tunnels
....................................................................................................................................................................................................................................

Description of the list of T-MPLS tunnel Constraints


Attributes of a T-MPLS tunnel Constraint
The attributes displayed for each constraint are:
• User label.
• HOPLIST-ID.
• PATH-ID.
• HOP-ID.
• Hop-Ip-Address.
• Hop Port AID.
• Label in.
• Label out.
• Include mode.
• Explicit mode.
• Loose mode.
Note: Only routing constraints created by operator are displayed to the UI.

....................................................................................................................................................................................................................................
1350 OMS 16-127
8DG42227DAAA 9.6
Issue 3 December 2012
T-MPLS Provisioning Management View the details of the T-MPLS tunnel constraints
Managing T-MPLS tunnels
....................................................................................................................................................................................................................................

View the details of the T-MPLS tunnel constraints


When to use
This function gets information about a constraint of a T-MPLS tunnel.

Related information
For information about T-MPLS tunnel, see: “T-MPLS tunnel description” (p. 16-97).

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.

Task
From MS-GUI main window:
...................................................................................................................................................................................................

1 Select Search > Packet > T-MPLS > T-MPLS tunnels.


Result: The list window is shown.
...................................................................................................................................................................................................

2 Select one item in the list.


...................................................................................................................................................................................................

3 Select: Search > Packet > T-MPLS > T-MPLS tunnels > Constraints.
Result: The list window is shown.
...................................................................................................................................................................................................

4 Select one or more items in the list.


...................................................................................................................................................................................................

5 Select Search > T-MPLS tunnels > Properties.


Result: The property window is displayed.
See the following topic in this document: “Details of a T-MPLS tunnel Constraint”
(p. 16-129)
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
16-128 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
T-MPLS Provisioning Management Details of a T-MPLS tunnel Constraint
Managing T-MPLS tunnels
....................................................................................................................................................................................................................................

Details of a T-MPLS tunnel Constraint


Attributes of a T-MPLS tunnel Constraint
The attributes displayed for each constraint are:
• User label.
• HOPLIST-ID.
• PATH-ID.
• HOP-ID.
• Hop-Ip-Address.
• Hop Port AID.
• Label in.
• Label out.
• Include mode.
• Explicit mode.
• Loose mode.

....................................................................................................................................................................................................................................
1350 OMS 16-129
8DG42227DAAA 9.6
Issue 3 December 2012
T-MPLS Provisioning Management View the list of cross connections
Managing T-MPLS tunnels
....................................................................................................................................................................................................................................

View the list of cross connections


When to use
This function lists all cross connections of a T-MPLS tunnel.

Related information
For information about T-MPLS tunnel, see: “T-MPLS tunnel description” (p. 16-97).

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.

Task
From MS-GUI main window:
...................................................................................................................................................................................................

1 Select Search > Packet > T-MPLS > T-MPLS tunnels.


Result: The list window is shown.
...................................................................................................................................................................................................

2 Select one item in the list.


...................................................................................................................................................................................................

3 Select: Search > Packet > T-MPLS tunnels > Constraints.


Result: The list window is shown.
...................................................................................................................................................................................................

4 Select one or more items in the list.


...................................................................................................................................................................................................

5 Select Search > T-MPLS tunnels > Cross Connections.


Result: The list window is displayed.
See the following topic in this document: “Description of the list of T-MPLS tunnel
Cross Connections” (p. 16-131)
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
16-130 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
T-MPLS Provisioning Management Description of the list of T-MPLS tunnel Cross Connections
Managing T-MPLS tunnels
....................................................................................................................................................................................................................................

Description of the list of T-MPLS tunnel Cross Connections


Attributes of a Cross Connection
The attributes displayed for each cross connection are:
• NE User label used by the T-MPLS tunnel.
• cross connection type (LER for the extremity or LSR).
• Ingress Termination Identifier.
• Ingress T-MPLS Label.
• Egress Termination Identifier.
• Egress T-MPLS Label.

....................................................................................................................................................................................................................................
1350 OMS 16-131
8DG42227DAAA 9.6
Issue 3 December 2012
T-MPLS Provisioning Management View the T-MPLS tunnel extremities
Managing T-MPLS tunnels
....................................................................................................................................................................................................................................

View the T-MPLS tunnel extremities


When to use
This function gets information about extremities (origin and destination) of a T-MPLS
tunnel.

Related information
For information about T-MPLS tunnel, see: “T-MPLS tunnel description” (p. 16-97).

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.

Task
From MS-GUI main window:
...................................................................................................................................................................................................

1 Select Search > Packet > T-MPLS > T-MPLS tunnels.


Result: The list window is shown.
...................................................................................................................................................................................................

2 Select one item in the list.


...................................................................................................................................................................................................

3 Select Action > T-MPLS tunnels > Extremities.


Result: The list window is displayed.
See the following topic in this document: “Description of the list of T-MPLS tunnel
Extremities” (p. 16-133)
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
16-132 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
T-MPLS Provisioning Management Description of the list of T-MPLS tunnel Extremities
Managing T-MPLS tunnels
....................................................................................................................................................................................................................................

Description of the list of T-MPLS tunnel Extremities


Attributes of a T-MPLS tunnel Extremity
The attributes displayed are:
• User Label.
• NE User Label (A).
• Termination User Label (A).
• NE User Label (Z).
• Termination User Label (Z).

....................................................................................................................................................................................................................................
1350 OMS 16-133
8DG42227DAAA 9.6
Issue 3 December 2012
T-MPLS Provisioning Management View the section inventory from T-MPLS tunnel
Managing T-MPLS tunnels
....................................................................................................................................................................................................................................

View the section inventory from T-MPLS tunnel


When to use
This function gets information about each T-MPLS section (and their states) contained in
the previously selected T-MPLS tunnel.

Related information
For information about T-MPLS tunnel, see: “T-MPLS tunnel description” (p. 16-97).

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.

Task
From MS-GUI main window:
...................................................................................................................................................................................................

1 Select Search > Packet > T-MPLS > T-MPLS tunnels.


Result: The list window is shown.
...................................................................................................................................................................................................

2 Select one item in the list.


...................................................................................................................................................................................................

3 Select Search > Packet > T-MPLS > T-MPLS section Inventory.
choose one of the objects related to the tunnel:
• Pseudo Wires crossing the T-MPLS tunnel.
• Protection Groups involving the tunnel.
• Server T-MPLS sections.
• Routing constraints associated to the tunnel.
• Spare tunnel (working/protecting) in case of trail-1-to-1 protection.
Result: The list of the requested object is shown.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
16-134 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
T-MPLS Provisioning Management Description of the Inventory of sections
Managing T-MPLS tunnels
....................................................................................................................................................................................................................................

Description of the Inventory of sections


Attributes of a sections
Oone of the objects related to the section is shown:
• Pseudo Wires crossing the T-MPLS tunnel.
• Protection Groups involving the tunnel.
• Server T-MPLS sections.
• Routing constraints associated to the tunnel.
• Spare tunnel (working/protecting) in case of trail-1-to-1 protection.

....................................................................................................................................................................................................................................
1350 OMS 16-135
8DG42227DAAA 9.6
Issue 3 December 2012
T-MPLS Provisioning Management View the bandwidth load of T-MPLS tunnel
Managing T-MPLS tunnels
....................................................................................................................................................................................................................................

View the bandwidth load of T-MPLS tunnel


When to use
This function gets information about the bandwidth load of a T-MPLS tunnel.

Related information
For information about T-MPLS tunnel, see: “T-MPLS tunnel description” (p. 16-97).

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.

Task
From MS-GUI main window:
...................................................................................................................................................................................................

1 Select Search > Packet > T-MPLS sections.


Result: The list window is shown.
...................................................................................................................................................................................................

2 Select one item in the list.


...................................................................................................................................................................................................

3 Select Search > Packet > T-MPLS section inventory.


Result: The list window is shown.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
16-136 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
T-MPLS Provisioning Management View the route of T-MPLS tunnels
Managing T-MPLS tunnels
....................................................................................................................................................................................................................................

View the route of T-MPLS tunnels


When to use
This function presents graphically all Pseudo Wires used by the previously selected
T-MPLS tunnel.

Related information
For information about T-MPLS tunnel, see: “T-MPLS tunnel description” (p. 16-97).
commands on map
The following commands are available from the graphical view, depending on the
selected object and its position on the route:
• With no selection: Begin of Route and End of Route commands highlights the NE
used for the beginning or the end of the route.
• With a selected entity (NE, Pseudo Wire, ENE, Off page connector): Begin of Route
and End of Route commands are completed by other commands depending on the
selected entity.

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.

Task
From MS-GUI main window:
...................................................................................................................................................................................................

1 Select Search > Packet > T-MPLS > T-MPLS tunnels.


Result: The list window is shown.
...................................................................................................................................................................................................

2 Select one item in the list.


...................................................................................................................................................................................................

3 Select Search > Packet > T-MPLS > T-MPLS section Display Route.
Result: The Pseudo Wires used by the T-MPLS tunnel appears in blue.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS 16-137
8DG42227DAAA 9.6
Issue 3 December 2012
T-MPLS Provisioning Management View the Pseudo Wires crossing a T-MPLS tunnel
Managing T-MPLS tunnels
....................................................................................................................................................................................................................................

View the Pseudo Wires crossing a T-MPLS tunnel


When to use
This function consists in listing the Pseudo Wires related to a previously selected T-MPLS
tunnel.

Related information
For information about T-MPLS tunnel, see: “T-MPLS tunnel description” (p. 16-97).

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.

Task
From MS-GUI main window:
...................................................................................................................................................................................................

1 Select Search > Packet > T-MPLS > T-MPLS tunnels.


Result: The list window is shown.
...................................................................................................................................................................................................

2 Select one item in the list.


...................................................................................................................................................................................................

3 Select Search > Packet > List Pseudo Wires.


Result: The list window is displayed.
See the following topic in this document: “Description of the list of Pseudo Wires”
(p. 16-139)
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
16-138 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
T-MPLS Provisioning Management Description of the list of Pseudo Wires
Managing T-MPLS tunnels
....................................................................................................................................................................................................................................

Description of the list of Pseudo Wires


Attributes of a Pseudo Wire
The attributes displayed for each listed Pseudo Wire are:
• T-MPLS tunnel User Label.
• Pseudo Wire User Label.
• T-MPLS Label.

....................................................................................................................................................................................................................................
1350 OMS 16-139
8DG42227DAAA 9.6
Issue 3 December 2012
T-MPLS Provisioning Management Tunnel protection create
Tunnel protection
....................................................................................................................................................................................................................................

Tunnel protection

Tunnel protection create


When to use
The scope of this procedure is to create a protection for a T-MPLS Tunnel.

Related Information
All needed conditions are detailed along the procedure

Before you begin


Tunnels MAIN and SPARE have been created separately, with same origin/destination
and same values of transmission parameters.

....................................................................................................................................................................................................................................
16-140 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
T-MPLS Provisioning Management Tunnel protection create
Tunnel protection
....................................................................................................................................................................................................................................
Task
...................................................................................................................................................................................................

1 Select the Tunnel MAIN and issue Actions>T-MPLS Tunnel Protection Management

Figure 16-10 Tunnel MAIN: Actions>T-MPLS Tunnel Protection Management

...................................................................................................................................................................................................

2 The T-MPLS Tunnel Protection Management box is displayed. The working tunnel is
already selected. Select the protecting tunnel. Select hold-off time and reverting time.

....................................................................................................................................................................................................................................
1350 OMS 16-141
8DG42227DAAA 9.6
Issue 3 December 2012
T-MPLS Provisioning Management Tunnel protection create
Tunnel protection
....................................................................................................................................................................................................................................
Click on Apply.

Figure 16-11 T-MPLS Tunnel Protection Management

...................................................................................................................................................................................................

3 Display the tunnel list via command Search>Packet>T-MPLS>T-MPLS Tunnels


Note: the Protection Role of tunnel MAIN is now Working and the Protection Role of
tunnel SPARE is now Protecting.

....................................................................................................................................................................................................................................
16-142 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
T-MPLS Provisioning Management Tunnel protection create
Tunnel protection
....................................................................................................................................................................................................................................
The Protection State of tunnel SPARE is now Activeand the Protection State of tunnel
SPARE is now StandBy.

Figure 16-12 T-MPLS tunnel list

...................................................................................................................................................................................................

4 Select the MAIN or the Spare T-MPLS tunnel and issue Search>Routing display

Figure 16-13 T-MPLS tunnel: Search>Routing display

E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS 16-143
8DG42227DAAA 9.6
Issue 3 December 2012
T-MPLS Provisioning Management T-MPLS Routing display
Tunnel protection
....................................................................................................................................................................................................................................

T-MPLS Routing display


When to use
The scope of this procedure is to show the T-MPLS Tunnel Routing display

Related Information
All needed conditions are detailed along the procedure

Before you begin


All needed conditions are detailed along the procedure

Task
...................................................................................................................................................................................................

1 From the main menu bar select Search > Packet > T-MPLS > T-MPLS Tunnels.

Figure 16-14 Search>Packet>T-MPLS>T-MPLS>Tunnels

....................................................................................................................................................................................................................................
16-144 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
T-MPLS Provisioning Management T-MPLS Routing display
Tunnel protection
....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

2 Select a T-MPLS tunnel from the displayed list, with the right mouse button, display the
popup Actions menu

Figure 16-15 T-MPLS tunnel: Actions menu

....................................................................................................................................................................................................................................
1350 OMS 16-145
8DG42227DAAA 9.6
Issue 3 December 2012
T-MPLS Provisioning Management T-MPLS Routing display
Tunnel protection
....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

3 From the T-MPLS tunnel Action popup menu select : Search > Routing display

Figure 16-16 T-MPLS tunnel: Search>Routing display

E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
16-146 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
T-MPLS Provisioning Management Tunnel switch commands
Tunnel protection
....................................................................................................................................................................................................................................

Tunnel switch commands


When to use
The scope of this procedure is to manage Tunnel switch commands.

Related Information
All needed conditions are detailed along the procedure

Before you begin


All needed conditions are detailed along the procedure

Task
...................................................................................................................................................................................................

1 T-MPLS Protection Group Properties are shown below.

Figure 16-17 T-MPLS Protection Group

....................................................................................................................................................................................................................................
1350 OMS 16-147
8DG42227DAAA 9.6
Issue 3 December 2012
T-MPLS Provisioning Management Tunnel switch commands
Tunnel protection
....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

2 From the T-MPLS Protection Group (Tunnel Switch) you can open the Actions menu

Figure 16-18 Tunnel Switch: Actions

....................................................................................................................................................................................................................................
16-148 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
T-MPLS Provisioning Management Tunnel switch commands
Tunnel protection
....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

3 Select the protecting Tunnel and issue Actions > Remove Protection (keeping Main)

Figure 16-19 Tunnel:Actions>Remove Protection(keeping Main)

...................................................................................................................................................................................................

4 After the remove protection the routing display changes view accordingly.

Figure 16-20 Spare tunnel routing display

....................................................................................................................................................................................................................................
1350 OMS 16-149
8DG42227DAAA 9.6
Issue 3 December 2012
T-MPLS Provisioning Management Tunnel switch commands
Tunnel protection
....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

5 Both protection role and protection state of the two tunnels are don't care.

Figure 16-21 Don't care protection role and protection state

....................................................................................................................................................................................................................................
16-150 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
T-MPLS Provisioning Management Tunnel switch commands
Tunnel protection
....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

6 The Main tunnel routing display is shown below.

Figure 16-22 Main tunnel routing display

E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS 16-151
8DG42227DAAA 9.6
Issue 3 December 2012
T-MPLS Provisioning Management Other info on T-MPLS routing display
Tunnel protection
....................................................................................................................................................................................................................................

Other info on T-MPLS routing display


When to use
The scope of this procedure is to show other info on T-MPLS routing display

Related Information
All needed conditions are detailed along the procedure

Before you begin


All needed conditions are detailed along the procedure

Task
...................................................................................................................................................................................................

1 Select the T-MPLS Node PHB Profile and issue Properties.

Figure 16-23 T-MPLS Node PHB Profile

....................................................................................................................................................................................................................................
16-152 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
T-MPLS Provisioning Management Other info on T-MPLS routing display
Tunnel protection
....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

2 Select the T-MPLS Node Traffic Descriptor and issue Properties.

Figure 16-24 T-MPLS Node Traffic Descriptor

....................................................................................................................................................................................................................................
1350 OMS 16-153
8DG42227DAAA 9.6
Issue 3 December 2012
T-MPLS Provisioning Management Other info on T-MPLS routing display
Tunnel protection
....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

3 Select T-MPLS Segment and issue Properties.

Figure 16-25 T-MPLS Segment

....................................................................................................................................................................................................................................
16-154 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
T-MPLS Provisioning Management Other info on T-MPLS routing display
Tunnel protection
....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

4 select the T-MPLS Port and issue properties.

Figure 16-26 T-MPLS Port

E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS 16-155
8DG42227DAAA 9.6
Issue 3 December 2012
T-MPLS Provisioning Management Overview
MAC Flushing Protection
....................................................................................................................................................................................................................................

MAC Flushing Protection

Overview
Purpose
User is able to create, configure, and delete MAC flushing protection schemes in a
TMPLS domain.

Contents

MAC flushing protection description 16-157


MAC flushing protection creation 16-158
MAC flushing protection list 16-160
Attributes of MAC-flushing protection 16-161
Interconnection Scheme list 16-162
Attributes of Interconnection Schemes 16-163
TMPLS EVC: Force MAC flushing 16-164

....................................................................................................................................................................................................................................
16-156 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
T-MPLS Provisioning Management MAC flushing protection description
MAC Flushing Protection
....................................................................................................................................................................................................................................

MAC flushing protection description


Description
The MAC flushing protection operates at Ethernet layer
The NE types that can be selected for participating to MAC flushing protection are the
following:
• TSS320/160 since R3.2
• TSS100 since R4.0
Configuration of MAC flushing protection on TMPLS domain
PKT supports the MAC flushing topology configuration. The operator may add/remove
interconnection schemes from the MAC flushing protection. When removing one
interconnection scheme, PKT checks that the interconnection scheme is not used by any
EVC.

....................................................................................................................................................................................................................................
1350 OMS 16-157
8DG42227DAAA 9.6
Issue 3 December 2012
T-MPLS Provisioning Management MAC flushing protection creation
MAC Flushing Protection
....................................................................................................................................................................................................................................

MAC flushing protection creation


When to use
The function creates a MAC flushing protection PKT defining protection schemes in a
TMPLS domain.

Related Information
For more information, refer to:“MAC flushing protection description” (p. 16-157).

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.

Task
From the MS-GUI Main menu:
...................................................................................................................................................................................................

1 Select Action > Packet > Services > Ethernet over T-MPLS > Create MAC Flushing
Protection.
Result: The Create MAC Flushing Protection wizard is shown.
...................................................................................................................................................................................................

2 For each interconnection scheme, the user specifies:


• User Label
• Domain
• Interconnection Type. (SNI, DNI, DPI).
The Interconnection Type is SNI when only one port is involved; it is DNI when two
ports on two different nodes are involved; it is DPI when two ports on the same node
are involved.
• The involved T-MPLS Node
• For each Node, the involved Port(s). The Port can be UNI or NNI. A port can be
involved in only one interconnection scheme and in only one MAC flushing
protection.
• Click Add Schema
Result: The Protection Schemes window is updated.
...................................................................................................................................................................................................

3 At the end of Protection Schemes creation, Click OK.

....................................................................................................................................................................................................................................
16-158 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
T-MPLS Provisioning Management MAC flushing protection creation
MAC Flushing Protection
....................................................................................................................................................................................................................................
Result: If at least one interconnection scheme is created on the involved NEs, MAC
flushing protection is created. If not all the interconnection schemes are created, a
warning is issued.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS 16-159
8DG42227DAAA 9.6
Issue 3 December 2012
T-MPLS Provisioning Management MAC flushing protection list
MAC Flushing Protection
....................................................................................................................................................................................................................................

MAC flushing protection list


When to use
The function lists MAC flushing protections.

Related Information
If MAC flushing is enabled, the command issued from a T-MPLS EVC shows protections
associated to the selected EVC.
For more information, refer to: “MAC flushing protection description” (p. 16-157).

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.

Task
From the MS-GUI Main menu:
...................................................................................................................................................................................................

1 Select Search > Packet > Services > Ethernet over T-MPLS.
Result: The Ethernet over T-MPLS menu is shown.
...................................................................................................................................................................................................

2 Select MAC Flushing Protections.


Result: The MAC Flushing Protection list is shown. See: “Attributes of
MAC-flushing protection” (p. 16-161)
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
16-160 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
T-MPLS Provisioning Management Attributes of MAC-flushing protection
MAC Flushing Protection
....................................................................................................................................................................................................................................

Attributes of MAC-flushing protection


Attributes of a MAC-flushing protection
The attributes displayed for each MAC-flushing protection are:
• User Label.
• Domain (T-MPLS).

....................................................................................................................................................................................................................................
1350 OMS 16-161
8DG42227DAAA 9.6
Issue 3 December 2012
T-MPLS Provisioning Management Interconnection Scheme list
MAC Flushing Protection
....................................................................................................................................................................................................................................

Interconnection Scheme list


When to use
The function lists Interconnection Schemes of a MAC flushing protection.

Related Information
For more information, refer to: “MAC flushing protection description” (p. 16-157).

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.

Task
From the MS-GUI Main menu:
...................................................................................................................................................................................................

1 Select Search > Packet > Services > Ethernet over T-MPLS > MAC Flushing
Protection.
Result: The MAC Flushing Protection list is shown.
...................................................................................................................................................................................................

2 Select one item in the list


Select Search > Interconnection Schemes.
Result: The Interconnection Scheme list is shown. See: “Attributes of
Interconnection Schemes” (p. 16-163)
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
16-162 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
T-MPLS Provisioning Management Attributes of Interconnection Schemes
MAC Flushing Protection
....................................................................................................................................................................................................................................

Attributes of Interconnection Schemes


Attributes of a Interconnection Schemes
The attributes displayed for each Interconnection Scheme are:
• User Label.
• Interconnection Type. (SNI, DNI, DPI)
• Node A.
• Node B.
Select an item and expand hierarchical tree. (Click the item and click the +sign icon).
The sub-tree displays the objects belonging to the selected item:
• T-MPLS port User Label.
• Parent Node User Label

....................................................................................................................................................................................................................................
1350 OMS 16-163
8DG42227DAAA 9.6
Issue 3 December 2012
T-MPLS Provisioning Management TMPLS EVC: Force MAC flushing
MAC Flushing Protection
....................................................................................................................................................................................................................................

TMPLS EVC: Force MAC flushing


When to use
The function forces protections associated to an EVC.

Related Information
For more information, refer to: “MAC flushing protection description” (p. 16-157).

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Conditions
Ethernet over TMPLS EVC service type is EVPLAN, BTV, Broadcast.
MAC flushing is enabled on the selected Ethernet over TMPLS EVC.

Task
From the MS-GUI Main menu:
...................................................................................................................................................................................................

1 Select Search > Packet > Services > Ethernet over T-MPLS > T-MPLS EVC.
Result: The T-MPLS EVC list is shown.
...................................................................................................................................................................................................

2 Select one item in the list


Select Action > Force MAC Flushing.
Result: The command triggers the following behavior: PKT automatically selects one
target NE hosting the VSI and sends one SNMP SET request with MAC flushing
forced = true. Target NE flushes all learned entries in the MAC table. Target NE
generates R-APS message towards all other HUB nodes. Other HUB nodes, upon
detection of R-APS MAC flushing message, perform MAC@ table flushing for the
VSI instance associated to EVC.
The “force MAC flushing” state is not persisted by PKT, since after flushing, the
attribute is automatically reset to false by NE.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
16-164 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
T-MPLS Provisioning Management Overview

....................................................................................................................................................................................................................................

Tunnel Redundancy

Overview
Purpose
This section describes how to setup T-MPLS Tunnel Redundancy.

Contents

Description 16-166
Create one-to-one-open protection 16-173
Create Dual-point-to-point Protection 16-175
Create MAC Flushing Protection Schema 16-177
EVC setup 16-178

....................................................................................................................................................................................................................................
1350 OMS 16-165
8DG42227DAAA 9.6
Issue 3 December 2012
T-MPLS Provisioning Management Description
Tunnel Redundancy
....................................................................................................................................................................................................................................

Description
Reference network
This section describes a reference network that implements the Tunnel Redundancy.

Figure 16-27 Tunnel Redundancy Reference network

Redundancy creation types


PKT supports the creation of Tunnel Redundancy:
• Tunnel “1-to-1-open” protection “Tunnel one-to-one-open protection” (p. 16-166)
• “PW Dual-point-to-point protection” (p. 16-167)
Tunnel one-to-one-open protection
Tunnel one-to-one-open protection is set via GUI wizard.
The tunnel creation accomplishes the following functions:
• Selection of CPE working port and protecting port
• Allocation of DHOME protection block on CPE node
• Allocation of working tunnel termination on HUB working node
• Allocation of protecting tunnel termination on HUB protecting node
....................................................................................................................................................................................................................................
16-166 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
T-MPLS Provisioning Management Description
Tunnel Redundancy
....................................................................................................................................................................................................................................
• Enabling of signal degrade MAC flushing on HUB termination
• The working and protecting tunnel converge on the same CPE node on node side,
while on the other side they terminate on different HUB nodes
• For 1-to-1-open tunnel, by default, the GUI creation wizard proposes CV enabling =
true. PKT creates MEPs and enables CV-TX/Rx with the specified CV period value
on both working and protecting tunnels.
PW Dual-point-to-point protection
PW Dual-point-to-point protection is set via GUI wizard.
The PW creation accomplishes the following functions:
• If no tunnel is specified as constraint and if no suitable tunnel exists, creation of
Tunnel one-to-one-open protection
• Allocation of PW CPE termination over working tunnel CPE termination
• Allocation of PW HUB working termination over working tunnel HUB termination
• Allocation of PW HUB protecting termination over protecting tunnel HUB
termination

MAC Black Hole forwarding prevention


The NE behavior on CPE and HUB nodes coordinates to prevent the MAC black-hole for
downstream traffic generated by the remote HUB.
HUB node triggers MAC flushing and R-APS generation (towards other HUB nodes)
upon detection of one of the following conditions:
• Fault detected on a local port inserted into MAC flushing topology
• Fault detected on a 1:1 open protected tunnel (due to bidirectional fault)
• RDI packet received from CPE node (due to unidirectional fault detected by CPE
node)
• R-APS packet received from CPE node (triggered by manual command switch or
WTR elapsed)
• R-APS packet received from other HUB node

Interconnection types
Interconnection characteristics:
• The interconnection types:
– Single Node Interconnection (SNI): only one port is involved
– Dual Node Interconnection (DNI): two ports on two different nodes are involved
– Dual Point Interconnection (DPI): two ports on the same node are involved
• The same node can be involved in different interconnection schemes (with different
ports)
• MAC flushing protection can be composed of multiple interconnection schemes
• MAC flushing protection can be enabled or disabled also on implemented EVC

....................................................................................................................................................................................................................................
1350 OMS 16-167
8DG42227DAAA 9.6
Issue 3 December 2012
T-MPLS Provisioning Management Description
Tunnel Redundancy
....................................................................................................................................................................................................................................
Reference scenarios
Consider the following scenarios.
Legenda

Reference Scenario #1

Scenario #1
• 1 x “1:1 open” protected tunnel (CPE B -> NodeX & NodeY)
• 2 x “1:1 linear” protected tunnel (NodeY -> NodeZ & NodeX -> NodeZ)
• 1 x DP2P PW + 2 x P2P PW
• 2 x MAC Flushing Schema: DNI + SNI
• 1 x EVC (EVPLAN w/ 2 UNI)

....................................................................................................................................................................................................................................
16-168 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
T-MPLS Provisioning Management Description
Tunnel Redundancy
....................................................................................................................................................................................................................................
Reference Scenario #2

Scenario #2
• 1 x “1:1 open” protected tunnel (CPE B -> NodeX & NodeY)
• 2 x “1:1 linear” protected tunnel (NodeY -> NodeZ & NodeX -> NodeZ)
• 1 x DP2P PW + 2 x P2P PW
• 2 x MAC Flushing Schema: DNI + DPI
• 1 x EVC (EVPLAN w/ 3 UNI)
Reference Scenario #3

Scenario #3
• 1 x “1:1 open” protected tunnel (CPE B -> NodeX & NodeY)
• 4 x “1:1 linear” protected tunnel (NodeY -> NodeZ & NodeX -> NodeZ & NodeY ->
NodeW & NodeX -> NodeW)
• 1 x DP2P PW + 4 x P2P PW
• 2 x MAC Flushing Schema: DNI
• x EVC (EVPLAN w/ 3 UNI)
....................................................................................................................................................................................................................................
1350 OMS 16-169
8DG42227DAAA 9.6
Issue 3 December 2012
T-MPLS Provisioning Management Description
Tunnel Redundancy
....................................................................................................................................................................................................................................
Reference Scenario #4

Scenario #4
• 1 x “1:1 open” protected tunnel (CPE B -> NodeX & NodeY)
• 1 x DP2P PW
• 2 x MAC Flushing Schema: DNI + SNI
• 1 x EVC (EVPLAN w/ 2 UNI)
Reference Scenario #5

....................................................................................................................................................................................................................................
16-170 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
T-MPLS Provisioning Management Description
Tunnel Redundancy
....................................................................................................................................................................................................................................

Scenario #5
• 1 x “1:1 open” protected tunnel (CPE B -> NodeX & NodeY)
• 1 x DP2P PW
• 2 x MAC Flushing Schema: DNI + DPI
• 1 x EVC (EVPLAN w/ 3 UNI)
Reference Scenario #6

Scenario #6
• 1 x “1:1 open” protected tunnel (CPE B -> NodeX & NodeY)
• 1 x DP2P PW
• 2 x MAC Flushing Schema: DNI
• 1 x EVC (EVPLAN w/ 3 UNI)
Reference Scenario #7

....................................................................................................................................................................................................................................
1350 OMS 16-171
8DG42227DAAA 9.6
Issue 3 December 2012
T-MPLS Provisioning Management Description
Tunnel Redundancy
....................................................................................................................................................................................................................................
Scenario #7
• 2 x “1:1 open” protected tunnel (CPE B -> NodeX & NodeY + CPE E -> NodeZ &
NodeW)
• 4 x “1:1 linear” protected tunnel (NodeY -> NodeZ & NodeX -> NodeZ & NodeY ->
NodeW & NodeX -> NodeW)
• 2 x DP2P PW + 4 x P2P PW
• 2 x MAC Flushing Schema: DNI
• 1 x EVC (EVPLAN w/ 2 UNI)

....................................................................................................................................................................................................................................
16-172 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
T-MPLS Provisioning Management Create one-to-one-open protection
Tunnel Redundancy
....................................................................................................................................................................................................................................

Create one-to-one-open protection


When to use
The operator creates one-to-one-open protection.

Related Information
For more information, refer to “Tunnel one-to-one-open protection” (p. 16-166).

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.

Task
From the MS-GUI Main menu:
...................................................................................................................................................................................................

1 Select Action > Packet > MPLS-TP and T-MPLS > Create TMPLS Tunnel.
Result: The wizard is open.
...................................................................................................................................................................................................

2 Insert the following values:


• User Label: (user defined)
• Protection Level: 1 to 1 open
• Flow: Bidirectional
• Comment (optional)
• Bandwidth Extension Policy: Automatic (default)/Manual
• CIR: (user defined)
• PIR: (user defined)
• CBS: (user defined)
• PBS: (user defined)
• T-MPLS PHB Profiles: 5-Cos (default)/8-Cos
• Signal Degraded: Disable (default)/ Enable
• OAM Tx Operation Mode
• PM Granularity: none (default)
• T-MPLS PHB Profiles: “default” (default)
• Enable MEPs: true
• CV Enabling: CV (default)

....................................................................................................................................................................................................................................
1350 OMS 16-173
8DG42227DAAA 9.6
Issue 3 December 2012
T-MPLS Provisioning Management Create one-to-one-open protection
Tunnel Redundancy
....................................................................................................................................................................................................................................
• CV Direction: Both (default)
• CV Period: 3_33ms (default)
• CV/SLM PHB: EF (default)
...................................................................................................................................................................................................

3 In the 2.nd step, insert the following values:


• HUB Working Node (user defined)
• HUB Working Port (user defined, optional)
• HUB Protecting Node (user defined)
• HUB Protecting Port (user defined, optional)
• CPE Node (user defined)
• CPE Port (user defined, optional)
...................................................................................................................................................................................................

4 In the 3.rd step, insert the following values:


• Automatic implementation (optional)
• Routing Display Automatic (optional)
• Click OK
Result: Main Tunnel and Spare Tunnel are created.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
16-174 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
T-MPLS Provisioning Management Create Dual-point-to-point Protection
Tunnel Redundancy
....................................................................................................................................................................................................................................

Create Dual-point-to-point Protection


When to use
The operator creates create dual-point-to-point Protection.

Related Information
For more information, refer to “PW Dual-point-to-point protection” (p. 16-167).

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.

Task
From the MS-GUI Main menu:
...................................................................................................................................................................................................

1 Select Action > Packet > MPLS-TP and T-MPLS > Create T-MPLS Pseudo-Wire.
Result: The wizard is open.
...................................................................................................................................................................................................

2 Insert the following values:


• User Label: (user defined)
• Topology: Dual point to point
• Flow: Bidirectional
• Comment (optional)
• Supported Service: Ethernet
• CIR: (user defined)
• PIR: (user defined)
• CBS: (user defined)
• PBS: (user defined)
• T-MPLS PHB Profile: 5-Cos (default)/8-Cos
...................................................................................................................................................................................................

3 In the 2.nd step, insert the following values:


• HUB Node1 (user defined)
• HUB Port1 (user defined, optional)
• HUB Node2 (user defined)

....................................................................................................................................................................................................................................
1350 OMS 16-175
8DG42227DAAA 9.6
Issue 3 December 2012
T-MPLS Provisioning Management Create Dual-point-to-point Protection
Tunnel Redundancy
....................................................................................................................................................................................................................................
• HUB Port2 (user defined, optional)
• CPE Node (user defined)
Result: Pseudo-Wires Main and Spare are created.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
16-176 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
T-MPLS Provisioning Management Create MAC Flushing Protection Schema
Tunnel Redundancy
....................................................................................................................................................................................................................................

Create MAC Flushing Protection Schema


When to use
The operator creates MAC Flushing Protection Schema.

Related Information
For more information, refer to:
“Interconnection types” (p. 16-167).
“MAC Black Hole forwarding prevention” (p. 16-167).
“Reference scenarios” (p. 16-168).

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.

Task
From the MS-GUI Main menu:
...................................................................................................................................................................................................

1 The MAC flushing protection schema is characterized by the following attributes:


• User Label -> user defined
• Domain –> T-MPLS / MPLS-TP domain instance
For each interconnection scheme, the operator has to specify:
• Interconnection type : DNI, SNI, DPI
• Involved nodes
• Involved NNI or UNI ports (each port can be involved in only one interconnection
scheme)
The MAC flushing protection operates at Ethernet layer then ports involved in MAC
flushing protection can be:
• Ethernet UNI
• Link over T-MPLS (MPLS-TP) termination
For the detailed procedure, refer to:
“MAC flushing protection creation” (p. 16-158).
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS 16-177
8DG42227DAAA 9.6
Issue 3 December 2012
T-MPLS Provisioning Management EVC setup
Tunnel Redundancy
....................................................................................................................................................................................................................................

EVC setup
When to use
The operator creates MAC Flushing Protection Schema.

Related Information
For more information, refer to:
“Create EVC over T-MPLS wizard” (p. 17-27).

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.

Task
From the MS-GUI Main menu:
...................................................................................................................................................................................................

1 The EVC is characterized by the following attributes:


• User Label -> user defined
• Domain –> T-MPLS domain instance
• EVC must be defined as EVPLAN (even in case there’s just two UNI)
“MAC” tab in the creation step includes the following attributes:
• MAC flushing (new attribute) -> enabled
• MAC flush VLAN-ID: 4096 (untagged – fixed value)
• MAC flush VLAN-PRI: 7 (fixed value)
• MAC flush Drop-enable: false
• MAC flush MEL: 7
• MAC flush Version: v2 (fixed value)
dp2p PW (‘Y’ shaped PW) has to be associated to the CPE UNI:
• In ‘“Termination Setting”’ step and when configuring the CPE UNI the operator select
the ‘“Remote VSI port”’ tab
• Transport Link: dp2p PW
• Bind Type: Spoke
Refer to:
“Create EVC over T-MPLS wizard” (p. 17-27).
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
16-178 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
T-MPLS Provisioning Management EVC setup

....................................................................................................................................................................................................................................

....................................................................................................................................................................................................................................
1350 OMS 16-179
8DG42227DAAA 9.6
Issue 3 December 2012
T-MPLS Provisioning Management EVC setup

....................................................................................................................................................................................................................................

....................................................................................................................................................................................................................................
16-180 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
17 EVC over T-MPLS
17

Overview
Purpose
This chapter provides the conceptual information and the associated tasks for managing
Ethernet Virtual Connection over T-MPLS .

Contents

Create T-MPLS Structure 17-2


Create Link over Cable 17-2
T-MPLS tunnel create 17-14
T-MPLS-Create PW 17-21
EVC on T-MPLS 17-27
Create EVC over T-MPLS wizard 17-27
List the T-MPLS EVC 17-32
Description of the list of T-MPLS EVC 17-33
Create EVC over T-MPLS EVPL bottom up 17-34
Create EVC over T-MPLS EVPL top down 17-55
Create EVC over T-MPLS EVPLAN 17-72
Create EVC over T-MPLS BTV 17-86
Create EVC over T-MPLS HSI 17-90
Alarms EVC T-MPLS 17-94
Delete NE with EVC over T-MPLS 17-97
What to do deleting a NE 17-97
Delete NE detailed procedure 17-98
Verify create EVC over T-MPLS 17-114
Verify create EVC over T-MPLS 17-114

...................................................................................................................................................................................................................................
1350 OMS 17-1
8DG42227DAAA 9.6
Issue 3 December 2012
EVC over T-MPLS Create Link over Cable
Create T-MPLS Structure
....................................................................................................................................................................................................................................

Create T-MPLS Structure

Create Link over Cable


When to use
The scope of this procedure is to create the LoC

Related Information
This task does not have any related information.

Before you begin


All needed conditions are detailed along the procedure.

....................................................................................................................................................................................................................................
17-2 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
EVC over T-MPLS Create Link over Cable
Create T-MPLS Structure
....................................................................................................................................................................................................................................
Task
...................................................................................................................................................................................................

1 Figure which follows shows the reference map.

Figure 17-1 Physical map

....................................................................................................................................................................................................................................
1350 OMS 17-3
8DG42227DAAA 9.6
Issue 3 December 2012
EVC over T-MPLS Create Link over Cable
Create T-MPLS Structure
....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

2 From the main menu bar issue Search > Packet > Construction > Network Elements >
Defined NEs.

Figure 17-2 Search>Packet>Construction>Network Elements>Defined NEs

...................................................................................................................................................................................................

3 The list of the defined NEs is displayed. Select the relevant NE and issue Search >
Ethernet Physical Ports

Figure 17-3 NE: Search>Ethernet Physical Ports

...................................................................................................................................................................................................

4 The list of the Ethernet Physical Ports is displayed.

....................................................................................................................................................................................................................................
17-4 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
EVC over T-MPLS Create Link over Cable
Create T-MPLS Structure
....................................................................................................................................................................................................................................
There are idle ports which could be used to create the Link over Cable.

Figure 17-4 Ethernet Physical Ports

...................................................................................................................................................................................................

5 Via SDH menus, you can create an Ethernet Physical Connection.


Select Actions>Physical>Create Physical Connection.

....................................................................................................................................................................................................................................
1350 OMS 17-5
8DG42227DAAA 9.6
Issue 3 December 2012
EVC over T-MPLS Create Link over Cable
Create T-MPLS Structure
....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

6 Enter the physical connection name, select physcon type=Ethernet. Click on Next.

Figure 17-5 Create Physcon-basic

...................................................................................................................................................................................................

7 Select Physcon rate.


Select Physcon end points by means of the usual selection mechanism: select node and
port on both ends.

....................................................................................................................................................................................................................................
17-6 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
EVC over T-MPLS Create Link over Cable
Create T-MPLS Structure
....................................................................................................................................................................................................................................
Click on OK to confirm.

Figure 17-6 Create Physcon: End Points

....................................................................................................................................................................................................................................
1350 OMS 17-7
8DG42227DAAA 9.6
Issue 3 December 2012
EVC over T-MPLS Create Link over Cable
Create T-MPLS Structure
....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

8 The created physical connection is present in the Physical connection list.

Figure 17-7 Physcon list

...................................................................................................................................................................................................

9 Thorough a notification mechanism the created physical connection is present in the Link
over Cable list. To get the Link over Cable list, select Search > Packet > Construction >
Transport Links > Link over Cable

Figure 17-8 Search>Packet>Construction>Transport Links>Link over Cable

....................................................................................................................................................................................................................................
17-8 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
EVC over T-MPLS Create Link over Cable
Create T-MPLS Structure
....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

10 The Link over Cable list is displayed.

Figure 17-9 Link over Cable list

...................................................................................................................................................................................................

11 Alternatively, or if SDH is not installed, you can issue Actions > Packet > Construction
> Create Link over Cable

Figure 17-10 Actions>Packet>Construction>Create Link over Cable

...................................................................................................................................................................................................

12 Enter Link over Cable name.


Select end points by means of the usual selection mechanism: select node and port on
both ends.

....................................................................................................................................................................................................................................
1350 OMS 17-9
8DG42227DAAA 9.6
Issue 3 December 2012
EVC over T-MPLS Create Link over Cable
Create T-MPLS Structure
....................................................................................................................................................................................................................................
Click on Apply to confirm.

Figure 17-11 Create Link over Cable

....................................................................................................................................................................................................................................
17-10 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
EVC over T-MPLS Create Link over Cable
Create T-MPLS Structure
....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

13 The LoC is created and is present in the LoC list. Select the LoC and issue Actions >
Assign Resources to Domain.

Figure 17-12 Actions>Assign Resources to Domain

...................................................................................................................................................................................................

14 Click on button Domains. From the domain list select T-MPLS and click on the green V
to confirm.
The selection of the domain is present in the main window.

....................................................................................................................................................................................................................................
1350 OMS 17-11
8DG42227DAAA 9.6
Issue 3 December 2012
EVC over T-MPLS Create Link over Cable
Create T-MPLS Structure
....................................................................................................................................................................................................................................
Click on Apply to confirm.

Figure 17-13 Assign Resources to Domain box

...................................................................................................................................................................................................

15 A Loc, when assigned to T-MPLS domain, becomes a Section.

....................................................................................................................................................................................................................................
17-12 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
EVC over T-MPLS Create Link over Cable
Create T-MPLS Structure
....................................................................................................................................................................................................................................
From the main menu bar select Search > Packet > T-MPLS > T-MPLS Sections.

Figure 17-14 Search>Packet>T-MPLS>T-MPLS Sections

...................................................................................................................................................................................................

16 The T-MPLS Section list is displayed below.

Figure 17-15 T-MPLS Section list

E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS 17-13
8DG42227DAAA 9.6
Issue 3 December 2012
EVC over T-MPLS T-MPLS tunnel create
Create T-MPLS Structure
....................................................................................................................................................................................................................................

T-MPLS tunnel create


When to use
The scope of this procedure is to create a T-MPLS tunnel.

Related Information
All needed conditions are detailed along the procedure.

Before you begin


All needed conditions are detailed along the procedure.

Task
...................................................................................................................................................................................................

1 From the main menu bar select Actions > Packet > T-MPLS > Create T-MPLS tunnel.

Figure 17-16 Actions>Packet>T-MPLS>Create T-MPLS tunnel

...................................................................................................................................................................................................

2 In the Create T-MPLS tunnel box enter name, flow=bidirectional.


Select A and Z nodes.

....................................................................................................................................................................................................................................
17-14 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
EVC over T-MPLS T-MPLS tunnel create
Create T-MPLS Structure
....................................................................................................................................................................................................................................
Select as constraint the relevant T-MPLS Section. In this case the ports are automatically
selected.

Figure 17-17 Create T-MPLS tunnel:Constraints

...................................................................................................................................................................................................

3 Select folder Quality of Service.

....................................................................................................................................................................................................................................
1350 OMS 17-15
8DG42227DAAA 9.6
Issue 3 December 2012
EVC over T-MPLS T-MPLS tunnel create
Create T-MPLS Structure
....................................................................................................................................................................................................................................
Enter CIR, PIR, CBS, PBS and select T-MPLS PHB Profile.

Figure 17-18 Create T-MPLS tunnel: Quality of Service

...................................................................................................................................................................................................

4 Select folder OAM

....................................................................................................................................................................................................................................
17-16 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
EVC over T-MPLS T-MPLS tunnel create
Create T-MPLS Structure
....................................................................................................................................................................................................................................
Set fields Alarm Enable, CV (Connectivity Verification) Enable, CV Period, PM
granularity.

Figure 17-19 Create T-MPLS tunnel: OAM

....................................................................................................................................................................................................................................
1350 OMS 17-17
8DG42227DAAA 9.6
Issue 3 December 2012
EVC over T-MPLS T-MPLS tunnel create
Create T-MPLS Structure
....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

5 Select folder Protection. Click on OK to confirm.

Figure 17-20 Create T-MPLS tunnel: Protection

....................................................................................................................................................................................................................................
17-18 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
EVC over T-MPLS T-MPLS tunnel create
Create T-MPLS Structure
....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

6 The tunnel has been created. To verify the creation issue Search > Packet > T-MPLS >
T-MPLS Tunnels.

Figure 17-21 Search>Packet>T-MPLS>T-MPLS Tunnels

...................................................................................................................................................................................................

7 The tunnel is created with status defined. Select the created tunnel in the list and issue,
using the right mouse button, Actions > Allocate.

Figure 17-22 Tunnel list

....................................................................................................................................................................................................................................
1350 OMS 17-19
8DG42227DAAA 9.6
Issue 3 December 2012
EVC over T-MPLS T-MPLS tunnel create
Create T-MPLS Structure
....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

8 Implement the tunnel.

Figure 17-23 Actions>Implement T-MPLS Tunnel

...................................................................................................................................................................................................

9 The tunnel is now implemented.

Figure 17-24 The tunnel is implemented

E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
17-20 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
EVC over T-MPLS T-MPLS-Create PW
Create T-MPLS Structure
....................................................................................................................................................................................................................................

T-MPLS-Create PW
When to use
The scope of this procedure is to create a pseudo wire.

Related Information
All needed conditions are detailed along the procedure.

Before you begin


All needed conditions are detailed along the procedure.

Task
...................................................................................................................................................................................................

1 From the main bar select Actions > Packet > T-MPLS > Create T-MPLS Pseudo Wire.

Figure 17-25 Actions>Packet>T-MPLS>Create T-MPLS Pseudo Wire

...................................................................................................................................................................................................

2 In the Create T-MPLS Pseudo Wire box enter name, select flow=Bidirectional
Select end nodes

....................................................................................................................................................................................................................................
1350 OMS 17-21
8DG42227DAAA 9.6
Issue 3 December 2012
EVC over T-MPLS T-MPLS-Create PW
Create T-MPLS Structure
....................................................................................................................................................................................................................................
Select as constraint the relevant T-MPLS tunnel

Figure 17-26 Create T-MPLS Pseudo Wire: Constraints

...................................................................................................................................................................................................

3 Select folder Quality of Service


Enter CIR, PIR, CBS, PBS and select T-MPLS PHB Profile.

....................................................................................................................................................................................................................................
17-22 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
EVC over T-MPLS T-MPLS-Create PW
Create T-MPLS Structure
....................................................................................................................................................................................................................................
Note: these values must be consistent with those specified for the relevant tunnel

Figure 17-27 Create T-MPLS Pseudo Wire: Quality of Service

...................................................................................................................................................................................................

4 Select OAM values and click on Apply. The Pseudo Wire is created.

....................................................................................................................................................................................................................................
1350 OMS 17-23
8DG42227DAAA 9.6
Issue 3 December 2012
EVC over T-MPLS T-MPLS-Create PW
Create T-MPLS Structure
....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

5 Select Search>Packet>T-MPLS>T-MPLS Pseudo Wire

Figure 17-28 Search>Packet>T-MPLS>T-MPLS Pseudo Wire

...................................................................................................................................................................................................

6 The list of the T-MPLS pseudo wires is shown below. The PW just created is Allocated.

Figure 17-29 T-MPLS Pseudo Wires

....................................................................................................................................................................................................................................
17-24 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
EVC over T-MPLS T-MPLS-Create PW
Create T-MPLS Structure
....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

7 Select the relevant Pseudo Wire and issue Actions > Implement T-MPLS Pseudo wire.

Figure 17-30 PW Implementation

...................................................................................................................................................................................................

8 The T-MPLS Pseudo wire is now implemented.

Figure 17-31 T-MPLS Pseudo wire implemented

...................................................................................................................................................................................................

9 The Pseudo Wire is seen as a T-MPLS Transport Link in the area of the Services.

....................................................................................................................................................................................................................................
1350 OMS 17-25
8DG42227DAAA 9.6
Issue 3 December 2012
EVC over T-MPLS T-MPLS-Create PW
Create T-MPLS Structure
....................................................................................................................................................................................................................................
From the main menu bar issue Search > Packet > Services > T-MPLS > T-MPLS
Transport Links to list the Transport Links.

Figure 17-32 Search>Packet>Services>T-MPLS>T-MPLS Transport Links

...................................................................................................................................................................................................

10 The list of the T-MPLS Transport Links is displayed. It includes the Pseudo Wire just
created.

Figure 17-33 T-MPLS Transport Links

E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
17-26 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
EVC over T-MPLS Create EVC over T-MPLS wizard

....................................................................................................................................................................................................................................

EVC on T-MPLS

Create EVC over T-MPLS wizard


When to use
The scope of this procedure is to create an EVC over T-MPLS by the wizard.

Related Information
EVPL stands for Ethernet Virtual Private Line. In the bottom up process, the creation and
selection of the PW (pseudo wire) to associate is done by the user. See: “Create EVC over
T-MPLS EVPL bottom up” (p. 17-34). In the top down process, the creation and selection
of the PW (pseudo wire) to associate is done automatically. See: “Create EVC over
T-MPLS EVPL top down” (p. 17-55)
EVPLAN stands for Ethernet Virtual Private LAN. See: “Create EVC over T-MPLS
EVPLAN” (p. 17-72)
BTV stands for Broadcast Television. See: “Create EVC over T-MPLS BTV” (p. 17-86)
EVPLAN stands for High Speed Internet. See: “Create EVC over T-MPLS HSI”
(p. 17-90)

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.

Task
From the MS-GUI Main menu:
...................................................................................................................................................................................................

1 Select Actions > Packet > Services > T-MPLS > Create T-MPLS EVC
Result: The Create T-MPLS EVC window is shown.
...................................................................................................................................................................................................

2 Select the folder Specific.


• Enter the User Label.
• Select the Service Type. (EVPL, EVPLAN, BTV, HSI).
• Select the Ethernet service.
• Select the Domain . (T-MPLS)
• Select the Topology. (Point-to-Point, Point-to-Multipoint, Any-to-Any)
....................................................................................................................................................................................................................................
1350 OMS 17-27
8DG42227DAAA 9.6
Issue 3 December 2012
EVC over T-MPLS Create EVC over T-MPLS wizard
EVC on T-MPLS
....................................................................................................................................................................................................................................
• Select traffic Traffic Type. (Unicast, Multicast).
• Select Resource Sharing. It describes the resource reservation (UNI and link). (Full).
...................................................................................................................................................................................................

3 Select the folder Detail.


• VLAN Bundle
• Set Standard VLAN Type (8100). (True)
• If not standard, set VLAN Type.
• Unicast Service Frame Delivery. (Deliver Unconditionally).
• Multicast Service Frame Delivery. (Deliver Unconditionally).
• Broadcast Service Frame Delivery. (Deliver Unconditionally).
• IGMP Snooping State. (Not Meaningful).
Confirm Default values.
...................................................................................................................................................................................................

4 Select folder Info. Insert comments (Optional).


...................................................................................................................................................................................................

5 Select folder PM.


Select The following fields:
• Under PM. (True, False)
• Granularity. (24 hours, 15 min)
• Involved TPs. ( No Points, End Points, Intermediate Points, All Points,Not
Meaningful)
• CSV Reporting. (24 hours, No Report)
• Policy. ( Keep, Purge on Stop, Purge on Delete, Not Meaningful)
...................................................................................................................................................................................................

6 Select folder OAM.


Select the following fields:
• Enable OAM. (True, False)
• CCM Priority. (0..7)
• Maintenance Domain.
• Enable LPT. (True, False)
...................................................................................................................................................................................................

7 Select folder Miscellaneous.


Select the following fields:
• Service Level. (Premium, Gold,Silver,Bronze)
• CVLAN Preservation. (True, False)
• CVLAN COS Preservation. (True, False)

....................................................................................................................................................................................................................................
17-28 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
EVC over T-MPLS Create EVC over T-MPLS wizard
EVC on T-MPLS
....................................................................................................................................................................................................................................
• NAD.
• External Mark.
...................................................................................................................................................................................................

8 Select folder MAC.


• Pseudo-Wire Distribution. Full Mesh.
• MAC Address Limit.
• MAC Learning. Select or unselect the field.
• Discard Unknown Destinations. Select or unselect the field.
• MAC Aging. Select or unselect the field.
• MAC Flushing. Select or unselect the field.
• MAC Flush Vlan Id. 4096 (Untagged). (Fixed value)
• MAC Flush Vlan Priority. 7. (Fixed value)
• MAC Flush Drop Enable. Select or unselect the field.
• MAC Flush MEL. 0,...7.
• MAC Flush Version. V2. (Fixed value)
...................................................................................................................................................................................................

9 Click Next.
Result: The Termination Selection window is shown.
...................................................................................................................................................................................................

10 Select the A-node. Select the port.


Select the Z-node. Select the port.
Result: The selection of the two nodes and ports is completed.
...................................................................................................................................................................................................

11 Click Next.
Result: The Termination Setting window is shown.
...................................................................................................................................................................................................

12 Select a termination.
Select folder Ingress Flow.
In the folder Ingress Flow, select sub-older General.
Click Traffic Descriptor button. Select the Traffic Descriptor from the selection box and
Click V-sign to confirm.
Note: Traffic Descriptor values (CIR, PIR,....) must be contained in the
corresponding values of the PW being associated.
...................................................................................................................................................................................................

13 Select Policy mode. (Color Blind, Color Aware). If you choose Color Aware, you can
select Color Profile.
....................................................................................................................................................................................................................................
1350 OMS 17-29
8DG42227DAAA 9.6
Issue 3 December 2012
EVC over T-MPLS Create EVC over T-MPLS wizard
EVC on T-MPLS
....................................................................................................................................................................................................................................
Select Classification Mode.
Select VLAN POP Enabled. (True, False)
...................................................................................................................................................................................................

14 In the folder Ingress Flow, select sub-older Traffic Classifier.


...................................................................................................................................................................................................

15 In the folder Ingress Flow, select sub-older L2CP.


...................................................................................................................................................................................................

16 In the folder Ingress Flow, select sub-older Leaf Term. (set HSI).
...................................................................................................................................................................................................

17 In the folder Ingress Flow, select sub-older Reuse Flows to copy and reuse flow
characteristics.
...................................................................................................................................................................................................

18 ClickCreate Ingress Flow.


Result: The Ingress Flow is created and added in the window.
...................................................................................................................................................................................................

19 Select Egress Flow.


In the folder Egress Flow, select sub-older Push.
Select:
• Class of service (guaranteed,best effort, regulated).
• If you select Clear all fields, subsequent fields can be ignored.
• VLAN ID. It is an additional ID added to the stack.
• Priority Mode. (Color Aware, Color Blind).
• If Priority Mode is set to Color Aware, the fields Green Priority and Yellow Priority
are active.
...................................................................................................................................................................................................

20 In the folder Egress Flow, select sub-older Push.


...................................................................................................................................................................................................

21 Select Spoke.
Folder Spoke is significant only for BTV and HSI.
...................................................................................................................................................................................................

22 Click Create Egress Flow.


Result: The Egress Flow is created and added in the window.
...................................................................................................................................................................................................

23 Select the undefined termination.


All fields are already set with the selections made for the last defined port.
....................................................................................................................................................................................................................................
17-30 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
EVC over T-MPLS Create EVC over T-MPLS wizard
EVC on T-MPLS
....................................................................................................................................................................................................................................
Repeat steps from Step 12 to Step 22, then go to next step.
...................................................................................................................................................................................................

24 Click Next button.


Result: The Transport Link Selection window is shown.
...................................................................................................................................................................................................

25 Select Automatic Pseudowire[/Tunnel] creation.


If you do not select automatic, you will choose the transport link.
• Select the Pseudo Wire in the list and confirm clicking the V-sign.
...................................................................................................................................................................................................

26 Click Next button.


Result: The Allocate & implement window is shown.
...................................................................................................................................................................................................

27 Select EVC final state:


• Select Allocate EVC after creation
• Select Implement EVC after creation
...................................................................................................................................................................................................

28 Click OK to confirm EVC creation.


Result: The EVC is created.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS 17-31
8DG42227DAAA 9.6
Issue 3 December 2012
EVC over T-MPLS List the T-MPLS EVC
EVC on T-MPLS
....................................................................................................................................................................................................................................

List the T-MPLS EVC


When to use
The List window shows all the T-MPLS EVC and their attributes.

Related Information
No related information.

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.

Task
From the MS-GUI Main menu:
...................................................................................................................................................................................................

1 Select Search > Packet > Ethernet over T-MPLS >.


Result: The Ethernet over T-MPLS menu is shown.
...................................................................................................................................................................................................

2 Select T-MPLS EVCs.


Result: The list window is displayed.
See the following topic in this document: “Description of the list of T-MPLS EVC”
(p. 17-33).
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
17-32 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
EVC over T-MPLS Description of the list of T-MPLS EVC
EVC on T-MPLS
....................................................................................................................................................................................................................................

Description of the list of T-MPLS EVC


Attributes of a T-MPLS EVC
The attributes displayed for each T-MPLS EVC are:
• User Label.
• Topology. (Point-to-point, Point-to-multipoint, multipoint-to-multipoint)
• Service Type.(EVPL, EVPLAN, BTV, HSI)
• Traffic Type. (unicast, multicast)
• Working State
• Provisioning State
• Service State
• Availability Status (Normal, In Failure).
• Domain (T.MPLS).
• For Infrastructure. (true, false)
• LPT Indication. (Enabled, Disabled)
• LPT Provisioning State. (Enabled, Disabled)
• LPT Period
• LPT Priority
• MAC Flush Provisioning State

....................................................................................................................................................................................................................................
1350 OMS 17-33
8DG42227DAAA 9.6
Issue 3 December 2012
EVC over T-MPLS Create EVC over T-MPLS EVPL bottom up
EVC on T-MPLS
....................................................................................................................................................................................................................................

Create EVC over T-MPLS EVPL bottom up


When to use
The scope of this procedure is to create an EVC over T-MPLS, service type EVPL, modality
bottom up.

Related Information
EVPL stands for Ethernet Virtual Private Line.
In the bottom up process, the creation and selection of the PW (pseudo wire) to associate
is done by the user.

Before you begin


All needed conditions are detailed along the procedure

Task
...................................................................................................................................................................................................

1 From the main menu bar select Actions > Packet > Services > T-MPLS > Create T-MPLS
EVC

Figure 17-34 Actions>Packet>Services>T-MPLS>Create T-MPLS EVC

...................................................................................................................................................................................................

2 Folder Specific is already selected.


Enter name.
Select Service type=EVPL.

....................................................................................................................................................................................................................................
17-34 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
EVC over T-MPLS Create EVC over T-MPLS EVPL bottom up
EVC on T-MPLS
....................................................................................................................................................................................................................................
Ethernet Service and type are not meaningful.
Select Domain=T-MPLS.
Select Traffic Ttype=Unicast. For Service Type=BTV, Traffic Type=Multicast.

....................................................................................................................................................................................................................................
1350 OMS 17-35
8DG42227DAAA 9.6
Issue 3 December 2012
EVC over T-MPLS Create EVC over T-MPLS EVPL bottom up
EVC on T-MPLS
....................................................................................................................................................................................................................................
Select Resource Sharing= Full. It describes the resource reservation (UNI and link). We
select full sharing.

Figure 17-35 Create T-MPLS EVC: Specific

...................................................................................................................................................................................................

3 Select folder Detail.


....................................................................................................................................................................................................................................
17-36 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
EVC over T-MPLS Create EVC over T-MPLS EVPL bottom up
EVC on T-MPLS
....................................................................................................................................................................................................................................
Leave default values.

Figure 17-36 Create T-MPLS EVC: Detail

...................................................................................................................................................................................................

4 Select folder Info. This folder houses only textual comments.

....................................................................................................................................................................................................................................
1350 OMS 17-37
8DG42227DAAA 9.6
Issue 3 December 2012
EVC over T-MPLS Create EVC over T-MPLS EVPL bottom up
EVC on T-MPLS
....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

5 Select folder PM
Execute the suitable selections.

Figure 17-37 Create T-MPLS EVC: PM

....................................................................................................................................................................................................................................
17-38 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
EVC over T-MPLS Create EVC over T-MPLS EVPL bottom up
EVC on T-MPLS
....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

6 Select folder Miscellaneous.


Execute the suitable selections.
Click Next.
...................................................................................................................................................................................................

7 Select the node. Select the port.

Figure 17-38 Create T-MPLS EVC: Terminations Selection

....................................................................................................................................................................................................................................
1350 OMS 17-39
8DG42227DAAA 9.6
Issue 3 December 2012
EVC over T-MPLS Create EVC over T-MPLS EVPL bottom up
EVC on T-MPLS
....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

8 The selection of the two nodes and relevant ports is completed.

Figure 17-39 Terminations Selection

...................................................................................................................................................................................................

9 Termination Setting. It is the definition of the traffic flows.


....................................................................................................................................................................................................................................
17-40 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
EVC over T-MPLS Create EVC over T-MPLS EVPL bottom up
EVC on T-MPLS
....................................................................................................................................................................................................................................
Click Traffic Descriptor button. Select the traffic descriptor from the selection box and
click V-sign to confirm.
Note: Traffic Descriptor values (CIR, PIR,....) must be contained in the
corresponding values of the PW being associated.

....................................................................................................................................................................................................................................
1350 OMS 17-41
8DG42227DAAA 9.6
Issue 3 December 2012
EVC over T-MPLS Create EVC over T-MPLS EVPL bottom up
EVC on T-MPLS
....................................................................................................................................................................................................................................
See Transport link selection phase of the EVC over T-MPLS tunnel create (this
procedure).

Figure 17-40 Termination Settings

...................................................................................................................................................................................................

10 Select Policy Mode. If you select Color Aware, you will select Color Profile.
....................................................................................................................................................................................................................................
17-42 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
EVC over T-MPLS Create EVC over T-MPLS EVPL bottom up
EVC on T-MPLS
....................................................................................................................................................................................................................................
Select classification priority code = 0-7 and DSCP code = 0-63
Select VLAN POP disabled
...................................................................................................................................................................................................

11 Folder Traffic Classifier deals on VLAN id.


Folder Leaf Term deals on HSI.
Folder Reuse Flows allows to copy and reuse flow characteristics.

....................................................................................................................................................................................................................................
1350 OMS 17-43
8DG42227DAAA 9.6
Issue 3 December 2012
EVC over T-MPLS Create EVC over T-MPLS EVPL bottom up
EVC on T-MPLS
....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

12 Click Create.

Figure 17-41 Ingress flow create

....................................................................................................................................................................................................................................
17-44 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
EVC over T-MPLS Create EVC over T-MPLS EVPL bottom up
EVC on T-MPLS
....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

13 You can monitor that the Ingress flow has been created: after create the relevant traffic
descriptor is displayed in the bottom of the window

Figure 17-42 Ingress Flow: create monitoring

....................................................................................................................................................................................................................................
1350 OMS 17-45
8DG42227DAAA 9.6
Issue 3 December 2012
EVC over T-MPLS Create EVC over T-MPLS EVPL bottom up
EVC on T-MPLS
....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

14 Select button Egress Flow, folder Push. Select:


• Class of Service. (guaranteed, best effort, regulated)
• If you select Clear all fields, subsequent fields can be ignored.

....................................................................................................................................................................................................................................
17-46 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
EVC over T-MPLS Create EVC over T-MPLS EVPL bottom up
EVC on T-MPLS
....................................................................................................................................................................................................................................
• VLAN ID. It is an additional ID added to the stack.
• Priority Mode. If set to Color Aware fields Green Priority and Yellow Priority are
active.

Figure 17-43 Egress Flow: Push

...................................................................................................................................................................................................

15 Folder Spoke is significant only for BTV and HSI.


Click Create Egress.

....................................................................................................................................................................................................................................
1350 OMS 17-47
8DG42227DAAA 9.6
Issue 3 December 2012
EVC over T-MPLS Create EVC over T-MPLS EVPL bottom up
EVC on T-MPLS
....................................................................................................................................................................................................................................
You can monitor that the Egress flow has been created: after create the relevant traffic
descriptor is displayed in the bottom of the window

Figure 17-44 Create Egress monitoring

...................................................................................................................................................................................................

16 Select the other port (on TSS-A).


All fields are already set with the selections made for the first port.

....................................................................................................................................................................................................................................
17-48 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
EVC over T-MPLS Create EVC over T-MPLS EVPL bottom up
EVC on T-MPLS
....................................................................................................................................................................................................................................
Select Create Ingress.

Figure 17-45 Create Ingress node A

...................................................................................................................................................................................................

17 Select Crete Egress.

....................................................................................................................................................................................................................................
1350 OMS 17-49
8DG42227DAAA 9.6
Issue 3 December 2012
EVC over T-MPLS Create EVC over T-MPLS EVPL bottom up
EVC on T-MPLS
....................................................................................................................................................................................................................................
Click Next button.

Figure 17-46 Create Egress node A

...................................................................................................................................................................................................

18 If you do not select automatic (first row of the dialog), you will choose the transport link.

....................................................................................................................................................................................................................................
17-50 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
EVC over T-MPLS Create EVC over T-MPLS EVPL bottom up
EVC on T-MPLS
....................................................................................................................................................................................................................................
Click Transport Link Selection.

Figure 17-47 Transport Link selection

....................................................................................................................................................................................................................................
1350 OMS 17-51
8DG42227DAAA 9.6
Issue 3 December 2012
EVC over T-MPLS Create EVC over T-MPLS EVPL bottom up
EVC on T-MPLS
....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

19 Select the Pseudo Wire we had created and confirm clicking the V-sign.

Figure 17-48 Select the transport link

....................................................................................................................................................................................................................................
17-52 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
EVC over T-MPLS Create EVC over T-MPLS EVPL bottom up
EVC on T-MPLS
....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

20 The transport link has been selected.

Figure 17-49 Pseudo Wire selected

...................................................................................................................................................................................................

21 Select EVC state (implemented).

....................................................................................................................................................................................................................................
1350 OMS 17-53
8DG42227DAAA 9.6
Issue 3 December 2012
EVC over T-MPLS Create EVC over T-MPLS EVPL bottom up
EVC on T-MPLS
....................................................................................................................................................................................................................................
Click OK to confirm EVC creation.

Figure 17-50 T-MPLS EVC Allocate and Implement

E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
17-54 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
EVC over T-MPLS Create EVC over T-MPLS EVPL top down
EVC on T-MPLS
....................................................................................................................................................................................................................................

Create EVC over T-MPLS EVPL top down


When to use
The scope of this procedure is to create an EVC over T-MPLS, service type EVPL, modality
top down.

Related Information
EVPL stands for Ethernet Virtual Private Line
In the top down process, the creation and selection of the PW (Pseudo Wire) to associate
is done automatically.
The reference network is shown below.

Figure 17-51 EVPL reference network

Before you begin


All needed conditions are detailed along the procedure

....................................................................................................................................................................................................................................
1350 OMS 17-55
8DG42227DAAA 9.6
Issue 3 December 2012
EVC over T-MPLS Create EVC over T-MPLS EVPL top down
EVC on T-MPLS
....................................................................................................................................................................................................................................
Task
...................................................................................................................................................................................................

1 As a prerequisite, select Actions > Packet > Services > Create Traffic Descriptor. This
traffic descriptor will be dedicated to the new PW which will be created by the system.
This is not strictly necessary; anyway, in this context, it allows a better understanding of
the resource utilization.

Figure 17-52 Actions>Packet>Services>Create Traffic Descriptor

....................................................................................................................................................................................................................................
17-56 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
EVC over T-MPLS Create EVC over T-MPLS EVPL top down
EVC on T-MPLS
....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

2 In the Create Traffic Descriptor box enter User Label name, select Class Of Service,
CIR, PIR, PBS. Click Apply.

Figure 17-53 Create Traffic Descriptor

....................................................................................................................................................................................................................................
1350 OMS 17-57
8DG42227DAAA 9.6
Issue 3 December 2012
EVC over T-MPLS Create EVC over T-MPLS EVPL top down
EVC on T-MPLS
....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

3 From the main menu bar select Actions > Packet > Services > T-MPLS > Create T-MPLS
EVC

Figure 17-54 Actions>Packet>Services>T-MPLS>Create T-MPLS EVC

...................................................................................................................................................................................................

4 Folder Specific is already selected.


• Enter User Label name
• Select Service Type=EVPL
• Ethernet Service and type are not meaningful
• Select Domain=T-MPLS

....................................................................................................................................................................................................................................
17-58 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
EVC over T-MPLS Create EVC over T-MPLS EVPL top down
EVC on T-MPLS
....................................................................................................................................................................................................................................
• Select Traffic Type=Unicast. For Service Type=BTV, Traffic Type=Multicast
• Select Resource Sharing=Full. It describes the resource reservation (UNI and link).

Figure 17-55 Create T-MPLS EVC: Specific

...................................................................................................................................................................................................

5 Select folder Detail. Default values are OK.


....................................................................................................................................................................................................................................
1350 OMS 17-59
8DG42227DAAA 9.6
Issue 3 December 2012
EVC over T-MPLS Create EVC over T-MPLS EVPL top down
EVC on T-MPLS
....................................................................................................................................................................................................................................
Select folder Info. This folder houses only textual comments.
Select folder PM. Execute the suitable selections.
Select folder Miscellaneous. Execute the suitable selections.
Click Next.
...................................................................................................................................................................................................

6 Select the node. Select the port.

....................................................................................................................................................................................................................................
17-60 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
EVC over T-MPLS Create EVC over T-MPLS EVPL top down
EVC on T-MPLS
....................................................................................................................................................................................................................................
The selection of the two nodes and relevant ports is completed.

Figure 17-56 Terminations Selection

...................................................................................................................................................................................................

7 Termination Setting. It is the definition of the traffic flows.

....................................................................................................................................................................................................................................
1350 OMS 17-61
8DG42227DAAA 9.6
Issue 3 December 2012
EVC over T-MPLS Create EVC over T-MPLS EVPL top down
EVC on T-MPLS
....................................................................................................................................................................................................................................
Click Traffic Descriptor button. Select the Traffic Descriptor from the selection box and
click V-sign to confirm.
Note: Traffic Descriptor values (CIR, PIR,....) must be contained in the corresponding
values of the PW being associated..
See Transport link selection phase of the EVC over T-MPLS tunnel create (this
procedure)
...................................................................................................................................................................................................

8 Select Policy Mode. If you select Color Aware, you will select Color Profile.
Select classification priority-code = 0-7 and DSCP code = 0-63.
Select VLAN POP disabled.
...................................................................................................................................................................................................

9 Folder Traffic Classifier deals on VLAN id.


Folder Leaf Term deals on HSI.
Folder Reuse Flows allows to copy and reuse flow characteristics.
...................................................................................................................................................................................................

10 Click Create.

....................................................................................................................................................................................................................................
17-62 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
EVC over T-MPLS Create EVC over T-MPLS EVPL top down
EVC on T-MPLS
....................................................................................................................................................................................................................................
You can monitor that the Ingress flow has been created: after create the relevant traffic
descriptor is displayed in the bottom of the window.

Figure 17-57 Ingress Flow: create

....................................................................................................................................................................................................................................
1350 OMS 17-63
8DG42227DAAA 9.6
Issue 3 December 2012
EVC over T-MPLS Create EVC over T-MPLS EVPL top down
EVC on T-MPLS
....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

11 Select button Egress Flow, folder Push. Select:


• Class of Service (guaranteed, best effort, regulated.)
• If you select Clear all fields, subsequent fields can be ignored.

....................................................................................................................................................................................................................................
17-64 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
EVC over T-MPLS Create EVC over T-MPLS EVPL top down
EVC on T-MPLS
....................................................................................................................................................................................................................................
• VLAN ID. It is an additional ID added to the stack.
• Priority Mode. If set to Color Aware fields Green Priority and Yellow Priority are
active.

Figure 17-58 Egress Flow: Push

Folder Spoke is significant only for BTV and HSI.


....................................................................................................................................................................................................................................
1350 OMS 17-65
8DG42227DAAA 9.6
Issue 3 December 2012
EVC over T-MPLS Create EVC over T-MPLS EVPL top down
EVC on T-MPLS
....................................................................................................................................................................................................................................
Click Create Egress.
You can monitor that the Egress flow has been created: after create the relevant traffic
descriptor is displayed in the bottom of the window.
...................................................................................................................................................................................................

12 Select the other port (on TSS-B)


All fields are already set with the selections made for the first port.
Select Create Ingress.
Select Create Egress.
Click Next button.
...................................................................................................................................................................................................

13 The Transport Link Selection window opens.

....................................................................................................................................................................................................................................
17-66 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
EVC over T-MPLS Create EVC over T-MPLS EVPL top down
EVC on T-MPLS
....................................................................................................................................................................................................................................
Select automatic (first row of the dialog), the system will create the transport link.

Figure 17-59 Transport Link selection

....................................................................................................................................................................................................................................
1350 OMS 17-67
8DG42227DAAA 9.6
Issue 3 December 2012
EVC over T-MPLS Create EVC over T-MPLS EVPL top down
EVC on T-MPLS
....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

14 Issue Search > Packet > T-MPLS > T-MPLS Pseudo Wires.

Figure 17-60 Search>Packet>T-MPLS>T-MPLS Pseudo Wires

...................................................................................................................................................................................................

15 The PW list before EVC TD create is displayed.

Figure 17-61 PW list before EVC TD create

...................................................................................................................................................................................................

16 Select EVC state (implemented).

....................................................................................................................................................................................................................................
17-68 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
EVC over T-MPLS Create EVC over T-MPLS EVPL top down
EVC on T-MPLS
....................................................................................................................................................................................................................................
Click Apply to confirm EVC creation.

Figure 17-62 T-MPLS EVC Allocate and Implement

....................................................................................................................................................................................................................................
1350 OMS 17-69
8DG42227DAAA 9.6
Issue 3 December 2012
EVC over T-MPLS Create EVC over T-MPLS EVPL top down
EVC on T-MPLS
....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

17 The PW list after EVC TD create is displayed. It contains the new PW created by the
system.

Figure 17-63 PW list after EVC TD create

...................................................................................................................................................................................................

18 Select the list of T-MPLS EVCs to show the EVC which has just been created. Issue
Search > Packet > T-MPLS > T-MPLS EVCs

Figure 17-64 Search>Packet>T-MPLS>T-MPLS EVCs

...................................................................................................................................................................................................

19 In the list the EVPL EVC is defined.

....................................................................................................................................................................................................................................
17-70 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
EVC over T-MPLS Create EVC over T-MPLS EVPL top down
EVC on T-MPLS
....................................................................................................................................................................................................................................
Issue Actions > Allocate.

Figure 17-65 EVC list: EVPL EVC allocate

...................................................................................................................................................................................................

20 Implement the EVC. The EVC goes implemented.

Figure 17-66 EVC goes implemented

E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS 17-71
8DG42227DAAA 9.6
Issue 3 December 2012
EVC over T-MPLS Create EVC over T-MPLS EVPLAN
EVC on T-MPLS
....................................................................................................................................................................................................................................

Create EVC over T-MPLS EVPLAN


When to use
The scope of this procedure is to create an EVC over T-MPLS, service type EVPLAN

Related Information
EVPLAN stands for Ethernet Virtual Private LAN.
Figure which follow show the EVPLAN reference network (3-nodes).

Figure 17-67 EVPLAN reference network (3-nodes)

....................................................................................................................................................................................................................................
17-72 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
EVC over T-MPLS Create EVC over T-MPLS EVPLAN
EVC on T-MPLS
....................................................................................................................................................................................................................................
Figure which follow show an example of EVPLAN network (4-nodes)

Figure 17-68 EVPLAN network (4-nodes)

Before you begin


All needed conditions are detailed along the procedure

Task
...................................................................................................................................................................................................

1 From the main menu bar select Actions > Packet > Services > T-MPLS > Create T-MPLS
EVC
...................................................................................................................................................................................................

2 Folder specific is already selected.


Enter name
Select Service type=EVPLAN
Ethernet service and type are not meaningful

....................................................................................................................................................................................................................................
1350 OMS 17-73
8DG42227DAAA 9.6
Issue 3 December 2012
EVC over T-MPLS Create EVC over T-MPLS EVPLAN
EVC on T-MPLS
....................................................................................................................................................................................................................................
Select domain=T-MPLS
Select Topology= Any to Any
Select traffic type=unicast. For service type=BTV, traffic type=multicast

....................................................................................................................................................................................................................................
17-74 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
EVC over T-MPLS Create EVC over T-MPLS EVPLAN
EVC on T-MPLS
....................................................................................................................................................................................................................................
Select resource sharing=full. It describes the resource reservation (UNI and link).

Figure 17-69 Create T-MPLS EVC: Specific

...................................................................................................................................................................................................

3 Select folder Detail. Default values are OK.

....................................................................................................................................................................................................................................
1350 OMS 17-75
8DG42227DAAA 9.6
Issue 3 December 2012
EVC over T-MPLS Create EVC over T-MPLS EVPLAN
EVC on T-MPLS
....................................................................................................................................................................................................................................
Select folder Info. This folder houses only textual comments.
Select folder PM. Execute the suitable selections.
Select folder Miscellaneous. Execute the suitable selections.
Click Next.
...................................................................................................................................................................................................

4 Per each LAN termination, one at a time, select the node and select the port.

....................................................................................................................................................................................................................................
17-76 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
EVC over T-MPLS Create EVC over T-MPLS EVPLAN
EVC on T-MPLS
....................................................................................................................................................................................................................................
Click Next.

Figure 17-70 Terminations Selection

...................................................................................................................................................................................................

5 Termination Setting. It is the definition of the traffic flows.

....................................................................................................................................................................................................................................
1350 OMS 17-77
8DG42227DAAA 9.6
Issue 3 December 2012
EVC over T-MPLS Create EVC over T-MPLS EVPLAN
EVC on T-MPLS
....................................................................................................................................................................................................................................
Click traffic descriptor button. Select the traffic descriptor from the selection box and
Click V to confirm.
Note: traffic descriptor values (CIR, PIR,....) must be contained in the
corresponding values of the PW being associated..
See Transport link selection phase of the EVC over T-MPLS tunnel create (this
procedure)
...................................................................................................................................................................................................

6 Select Policy Mode. If you select Color Aware, you will select Color Profile.
Select classification Priority-Code=0-7 and DSCP code= 0-63.
Select VLAN POP disabled.
...................................................................................................................................................................................................

7 Folder Traffic Classifier deals on VLAN id.


Folder Leaf Term deals on HSI
Folder Reuse Flows allows to copy and reuse flow characteristics.
...................................................................................................................................................................................................

8 Click Create.

....................................................................................................................................................................................................................................
17-78 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
EVC over T-MPLS Create EVC over T-MPLS EVPLAN
EVC on T-MPLS
....................................................................................................................................................................................................................................
You can monitor that the Ingress flow has been created: after create the relevant traffic
descriptor is displayed in the bottom of the window

Figure 17-71 EVPLAN: Ingress Flow: create

...................................................................................................................................................................................................

9 Select button Egress Flow, folder Push.


....................................................................................................................................................................................................................................
1350 OMS 17-79
8DG42227DAAA 9.6
Issue 3 December 2012
EVC over T-MPLS Create EVC over T-MPLS EVPLAN
EVC on T-MPLS
....................................................................................................................................................................................................................................
Select:
• Class of service (guaranteed, best effort, regulated, ...)
• If you select clear all fields, subsequent fields can be ignored.
• VLAN ID. It is an additional ID added to the stack.

....................................................................................................................................................................................................................................
17-80 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
EVC over T-MPLS Create EVC over T-MPLS EVPLAN
EVC on T-MPLS
....................................................................................................................................................................................................................................
• Priority Mode. If set to Color Aware fields Green and Yellow are active.

Figure 17-72 EVPLAN:Egress Flow

Folder Spoke is significant only for BTV and HSI.


Click Create Egress.

....................................................................................................................................................................................................................................
1350 OMS 17-81
8DG42227DAAA 9.6
Issue 3 December 2012
EVC over T-MPLS Create EVC over T-MPLS EVPLAN
EVC on T-MPLS
....................................................................................................................................................................................................................................
You can monitor that the Egress flow has been created: after create the relevant traffic
descriptor is displayed in the bottom of the window
...................................................................................................................................................................................................

10 Select the other port (on TSS-B)


All fields are already set with the selections made for the first port.
Select Create Ingress.
Select Create Egress.
Click Next button.
...................................................................................................................................................................................................

11 The Transport Link selection window opens.

....................................................................................................................................................................................................................................
17-82 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
EVC over T-MPLS Create EVC over T-MPLS EVPLAN
EVC on T-MPLS
....................................................................................................................................................................................................................................
Select the 3 PWs.

Figure 17-73 Transport Link selection

...................................................................................................................................................................................................

12 Select EVC state.

....................................................................................................................................................................................................................................
1350 OMS 17-83
8DG42227DAAA 9.6
Issue 3 December 2012
EVC over T-MPLS Create EVC over T-MPLS EVPLAN
EVC on T-MPLS
....................................................................................................................................................................................................................................
Click Apply to confirm EVC creation.

Figure 17-74 T-MPLS EVC Allocate and Implement

....................................................................................................................................................................................................................................
17-84 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
EVC over T-MPLS Create EVC over T-MPLS EVPLAN
EVC on T-MPLS
....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

13 The PW list after EVC TD create is displayed. It contains the new PW created by the
system.

Figure 17-75 PW list after EVC TD create

...................................................................................................................................................................................................

14 Select the list of T-MPLS EVCs to show the EVC which has just been created. Issue
Search > Packet > T-MPLS > T-MPLS EVCs
...................................................................................................................................................................................................

15 In the EVC list the EVPL EVC is defined.


Issue Actions > Allocate.
...................................................................................................................................................................................................

16 Implement the EVC. The EVC goes implemented.

Figure 17-76 EVC goes implemented

E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS 17-85
8DG42227DAAA 9.6
Issue 3 December 2012
EVC over T-MPLS Create EVC over T-MPLS BTV
EVC on T-MPLS
....................................................................................................................................................................................................................................

Create EVC over T-MPLS BTV


When to use
The scope of this procedure is to create an EVC over T-MPLS, service type BTV

Related Information
BTV stands for Broadcast Television.
The figure which follows, shows the BTV reference network.

Figure 17-77 BTV reference network

Before you begin


All needed conditions are detailed along the procedure.

....................................................................................................................................................................................................................................
17-86 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
EVC over T-MPLS Create EVC over T-MPLS BTV
EVC on T-MPLS
....................................................................................................................................................................................................................................
Task
...................................................................................................................................................................................................

1 From the main menu bar select Actions > Packet > Services > T-MPLS > Create T-MPLS
EVC
...................................................................................................................................................................................................

2 Folder Specific is already selected.


• Enter name
• Select Service Type=BTV
• Ethernet Service and type are not meaningful in this context
• Select Domain=T-MPLS
• Select Topology= Multicast
• Select Resource Sharing=Full. It describes the resource reservation (UNI and link)
...................................................................................................................................................................................................

3 Select folder Detail. Default values are OK.


Select folder Info. This folder houses only textual comments.
Select folder PM. Execute the suitable selections.
Select folder Miscellaneous. Execute the suitable selections.
Click Next.
...................................................................................................................................................................................................

4 For each LAN termination, one at a time, select the node and select the port.
Click Next.
...................................................................................................................................................................................................

5 Termination Setting. It is the definition of the traffic flows.


Click Traffic Descriptor button. Select the Traffic Descriptor from the selection box and
Click V-sign to confirm.
Note: Traffic Descriptor values (CIR, PIR,....) must be contained in the corresponding
values of the PW being associated.
See Transport link selection phase of the EVC over T-MPLS tunnel create (this
procedure)
...................................................................................................................................................................................................

6 Select Policy Mode. If you select Color Aware, you will select Color Profile
Select classification priority-code = 0-7 and DSCP code = 0-63.
Select VLAN POP disabled
...................................................................................................................................................................................................

7 Folder Traffic Classifier deals on VLAN id.

....................................................................................................................................................................................................................................
1350 OMS 17-87
8DG42227DAAA 9.6
Issue 3 December 2012
EVC over T-MPLS Create EVC over T-MPLS BTV
EVC on T-MPLS
....................................................................................................................................................................................................................................
Folder Leaf Term deals on HSI.
Folder Reuse Flows allows to copy and reuse flow characteristics.
...................................................................................................................................................................................................

8 Click Create.
You can monitor that the Ingress flow has been created: after create the relevant traffic
descriptor is displayed in the bottom of the window
...................................................................................................................................................................................................

9 Select button Egress Flow, folder Push


Select:
• Class of Service (guaranteed/best effort/regulated,...)
• If you select Clear all fields, subsequent fields can be ignored.
• VLAN ID. It is an additional ID added to the stack.
• Priority Mode. If Priority Mode is set to Color Aware, fields Green Priority and
Yellow Priority are active.
• Folder Spoke is significant only for BTV and HSI.
• Click Create Egress.
You can monitor that the Egress flow has been created: after create the relevant traffic
descriptor is displayed in the bottom of the window.
...................................................................................................................................................................................................

10 Select the other port (on TSS-B).


All fields are already set with the selections made for the first port.
Select Create Ingress.
Select Create Egress.
Click Next button.
...................................................................................................................................................................................................

11 The Transport Link selection window opens.


...................................................................................................................................................................................................

12 Select EVC state after creation.


Click Apply to confirm EVC creation.
...................................................................................................................................................................................................

13 The PW list after EVC TD create is displayed. It contains the new PW created by the
system.
...................................................................................................................................................................................................

14 Select the list of T-MPLS EVCs to show the EVC which has just been created. Issue
Search > Packet > T-MPLS > T-MPLS EVCs

....................................................................................................................................................................................................................................
17-88 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
EVC over T-MPLS Create EVC over T-MPLS BTV
EVC on T-MPLS
....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

15 In the EVC list the EVPL EVC is defined.


Issue Actions > Allocate.
...................................................................................................................................................................................................

16 Implement the EVC. The EVC goes implemented.


E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS 17-89
8DG42227DAAA 9.6
Issue 3 December 2012
EVC over T-MPLS Create EVC over T-MPLS HSI
EVC on T-MPLS
....................................................................................................................................................................................................................................

Create EVC over T-MPLS HSI


When to use
The scope of this procedure is to create an EVC (Ethernet Virtual Call) over T-MPLS,
service type=HSI

Related Information
HSI=High Speed Internet
Figure which follow show the EVPLAN reference network (3-nodes).

Figure 17-78 HSI reference network

Before you begin


All needed conditions are detailed along the procedure

....................................................................................................................................................................................................................................
17-90 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
EVC over T-MPLS Create EVC over T-MPLS HSI
EVC on T-MPLS
....................................................................................................................................................................................................................................
Task
...................................................................................................................................................................................................

1 From the main menu bar select Actions > Packet > Services > T-MPLS > Create T-MPLS
EVC
...................................................................................................................................................................................................

2 Folder specific is already selected.


Enter name
Select Service type=HSI
Ethernet service and type are not meaningful
Select domain=T-MPLS
Select Topology=
Select resource sharing. It describes the resource reservation (UNI and link). We select
full sharing
...................................................................................................................................................................................................

3 Select folder Detail. Default values are OK.


Select folder Info. This folder houses only textual comments.
Select folder PM. Execute the suitable selections.
Select folder Miscellaneous. Execute the suitable selections.
Click on Next.
...................................................................................................................................................................................................

4 Per each LAN termination, one at a time, select the node and select the port.
Click on Next.
...................................................................................................................................................................................................

5 Termination Setting. It is the definition of the traffic flows.


Click on traffic descriptor button. Select the traffic descriptor from the selection box and
click on V to confirm.
Note: traffic descriptor values (CIR, PIR,....) must be contained in the
corresponding values of the PW being associated..
See Transport link selection phase of the EVC over T-MPLS tunnel create (this
procedure)
...................................................................................................................................................................................................

6 Select policy mode. If you select color aware, you will select color profile
Select classification priority-code0-7 / DSCP code 0-63
Select VLAN POP disabled

....................................................................................................................................................................................................................................
1350 OMS 17-91
8DG42227DAAA 9.6
Issue 3 December 2012
EVC over T-MPLS Create EVC over T-MPLS HSI
EVC on T-MPLS
....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

7 Folder traffic classifier deals on VLAN id ,....


Folder Leaf Term deals on HSI
Folder Reuse Flows allows to copy and reuse flow characteristics.
...................................................................................................................................................................................................

8 Click on Create.
You can monitor that the Ingress flow has been created: after create the relevant traffic
descriptor is displayed in the bottom of the window
...................................................................................................................................................................................................

9 Select button Egress Flow, folder Push.


Select:
• Class of service (guaranteed, best effort, regulated, ...)
• If you select clear all fields, subsequent fields can be ignored.
• VLAN ID. It is an additional ID added to the stack.
• Priority mode. If set to Color Aware, fields Green and Yellow are active.
Folder Spoke is significant only for BTV and HSI.
Click on Create Egress.
You can monitor that the Egress flow has been created: after create the relevant traffic
descriptor is displayed in the bottom of the window.
...................................................................................................................................................................................................

10 Select the other port (on TSS-B)


All fields are already set with the selections made for the first port.
Select Create Ingress.
Select Create Egress.
Click on Next button.
...................................................................................................................................................................................................

11 The Transport Link selection window opens.


...................................................................................................................................................................................................

12 Select EVC state.


Click on Apply to confirm EVC creation.
...................................................................................................................................................................................................

13 The PW list after EVC TD create is displayed. It contains the new PW created by the
system.

....................................................................................................................................................................................................................................
17-92 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
EVC over T-MPLS Create EVC over T-MPLS HSI
EVC on T-MPLS
....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

14 Select the list of T-MPLS EVCs to show the EVC which has just been created. Issue
Search>Packet>T-MPLS>T-MPLS EVCs
...................................................................................................................................................................................................

15 In the EVC list the EVPL EVC is defined.


Issue Actions>Allocate.
...................................................................................................................................................................................................

16 Implement the EVC. The EVC goes implemented.


E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS 17-93
8DG42227DAAA 9.6
Issue 3 December 2012
EVC over T-MPLS Alarms EVC T-MPLS
EVC on T-MPLS
....................................................................................................................................................................................................................................

Alarms EVC T-MPLS


When to use
The scope of this procedure is to detect a fault condition on a T-MPLS EVC.

Related Information
This task does not have any related information.

Before you begin


This task does not have any preconditions.

Task
...................................................................................................................................................................................................

1 From the T-MPLS EVC list attribute Availability is marked In Failure.

Figure 17-79 T-MPLS EVC list: Availability

....................................................................................................................................................................................................................................
17-94 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
EVC over T-MPLS Alarms EVC T-MPLS
EVC on T-MPLS
....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

2 From the T-MPLS EVC issue Search>Fault Localization

Figure 17-80 EVC: Search>Fault Localization

...................................................................................................................................................................................................

3 The Transport Section is In Failure.

Figure 17-81 Navigation to Transport Section

....................................................................................................................................................................................................................................
1350 OMS 17-95
8DG42227DAAA 9.6
Issue 3 December 2012
EVC over T-MPLS Alarms EVC T-MPLS
EVC on T-MPLS
....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

4 You can navigate to Link over Cable

Figure 17-82 Navigate to Link over Cable

E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
17-96 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
EVC over T-MPLS What to do deleting a NE
Delete NE with EVC over T-MPLS
....................................................................................................................................................................................................................................

Delete NE with EVC over T-MPLS

What to do deleting a NE
When to use
The scope of this procedure is to delete a NE with EVC over Tunnel

Related Information
This task does not have any related information.

Before you begin


This task does not have any preconditions.

Task
...................................................................................................................................................................................................

1 Delete EVC over T-MPLS


...................................................................................................................................................................................................

2 Remove T-MPLS tunnel protection group


...................................................................................................................................................................................................

3 Remove PW (Pseudo Wire)


...................................................................................................................................................................................................

4 Remove Tunnel(s)
...................................................................................................................................................................................................

5 Deassign Link over Cable from T-MPLS Domain.


T-MPLS section is automatically deleted.
...................................................................................................................................................................................................

6 Deassign UNI ports used by EVC-T-MPLS.


...................................................................................................................................................................................................

7 Delete Link over Cable


...................................................................................................................................................................................................

8 Delete Node.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS 17-97
8DG42227DAAA 9.6
Issue 3 December 2012
EVC over T-MPLS Delete NE detailed procedure
Delete NE with EVC over T-MPLS
....................................................................................................................................................................................................................................

Delete NE detailed procedure


When to use
The scope of this procedure is to delete a NE with EVC over Tunnel

Related Information
This task does not have any related information.

Before you begin


This task does not have any preconditions.

Task
...................................................................................................................................................................................................

1 From the bar select Search>Packet>Services>T-MPLS>T-MPLS EVCs

Figure 17-83 Search>Packet>Services>T-MPLS>T-MPLS EVCs

....................................................................................................................................................................................................................................
17-98 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
EVC over T-MPLS Delete NE detailed procedure
Delete NE with EVC over T-MPLS
....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

2 The EVC list is displayed. Select the relevant T-MPLS EVC and issue
Actions>Deimplement.

Figure 17-84 T-MPLS EVC:Actions>Deimplement

...................................................................................................................................................................................................

3 Select the T-MPLS EVC and issue Actions>Deallocate

Figure 17-85 T-MPLS EVC:Actions>Deallocate

....................................................................................................................................................................................................................................
1350 OMS 17-99
8DG42227DAAA 9.6
Issue 3 December 2012
EVC over T-MPLS Delete NE detailed procedure
Delete NE with EVC over T-MPLS
....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

4 Select the T-MPLS EVC and issue Search>T-MPLS Transport Links

Figure 17-86 T-MPLS EVC: Search>T-MPLS Transport Links

...................................................................................................................................................................................................

5 The T-MPLS Transport Links list is displayed. In the fact our T-MPLS EVC is carried by
the displayed PW.

Figure 17-87 T-MPLS Transport Links

....................................................................................................................................................................................................................................
17-100 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
EVC over T-MPLS Delete NE detailed procedure
Delete NE with EVC over T-MPLS
....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

6 Anyway the complete list of the Pseudo Wires can be obtained by selecting
Search>Packet>T-MPLS>T-MPLS Pseudo Wires

Figure 17-88 Search>Packet>T-MPLS>T-MPLS Pseudo Wires

....................................................................................................................................................................................................................................
1350 OMS 17-101
8DG42227DAAA 9.6
Issue 3 December 2012
EVC over T-MPLS Delete NE detailed procedure
Delete NE with EVC over T-MPLS
....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

7 Select the T-MPLS Pseudo Wire and issue Search>T-MPLS Tunnels

Figure 17-89 T-MPLS Pseudo Wire: Search>T-MPLS Tunnels

....................................................................................................................................................................................................................................
17-102 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
EVC over T-MPLS Delete NE detailed procedure
Delete NE with EVC over T-MPLS
....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

8 The involved T-MPLS Tunnel is displayed. Issue Search>T-MPLS Protection Involved


Tunnel.

Figure 17-90 T-MPLS Tunnel: Search>T-MPLS Protection Involved Tunnel

...................................................................................................................................................................................................

9 You can also issue the T-MPLS Tunnel Routing Display.

Figure 17-91 T-MPLS Tunnel Routing Display

....................................................................................................................................................................................................................................
1350 OMS 17-103
8DG42227DAAA 9.6
Issue 3 December 2012
EVC over T-MPLS Delete NE detailed procedure
Delete NE with EVC over T-MPLS
....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

10 Select the Tunnel spare and issue Actions>Remove Protection keeping Main

Figure 17-92 Tunnel spare: Actions>Remove Protection keeping Main

...................................................................................................................................................................................................

11 The Routing Display after Remove Protection is shown below.

Figure 17-93 Routing Display after Remove Protection

....................................................................................................................................................................................................................................
17-104 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
EVC over T-MPLS Delete NE detailed procedure
Delete NE with EVC over T-MPLS
....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

12 Select the Tunnel and issue Search>T-MPLS Pseudo Wires

Figure 17-94 Tunnel: Search>T-MPLS Pseudo Wires

...................................................................................................................................................................................................

13 Delete the T-MPLS EVC. It was defined.

Figure 17-95 T-MPLS EVC: Actions>Delete

....................................................................................................................................................................................................................................
1350 OMS 17-105
8DG42227DAAA 9.6
Issue 3 December 2012
EVC over T-MPLS Delete NE detailed procedure
Delete NE with EVC over T-MPLS
....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

14 The deleted EVC is no longer present in the list.

Figure 17-96 EVC deletion evidence

...................................................................................................................................................................................................

15 Deimplement the involved Pseudo Wires

Figure 17-97 Pseudo Wires: Actions>Deimplement

....................................................................................................................................................................................................................................
17-106 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
EVC over T-MPLS Delete NE detailed procedure
Delete NE with EVC over T-MPLS
....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

16 Delete the Pseudo Wires via Actions>Delete

Figure 17-98 Pseudo Wires: Actions>Delete

...................................................................................................................................................................................................

17 Deimplement tunnels MAIN and SPARE


...................................................................................................................................................................................................

18 Delete Tunnel SPARE

Figure 17-99 Delete Tunnel SPARE

....................................................................................................................................................................................................................................
1350 OMS 17-107
8DG42227DAAA 9.6
Issue 3 December 2012
EVC over T-MPLS Delete NE detailed procedure
Delete NE with EVC over T-MPLS
....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

19 From the Tunnel issue Search>T-MPLS Section List

Figure 17-100 Tunnel: Search>T-MPLS Section List

...................................................................................................................................................................................................

20 The Tunnel related Section is shown.

Figure 17-101 Tunnel related Section

....................................................................................................................................................................................................................................
17-108 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
EVC over T-MPLS Delete NE detailed procedure
Delete NE with EVC over T-MPLS
....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

21 Delete the T-MPLS tunnel

Figure 17-102 Delete T-MPLS tunnel

...................................................................................................................................................................................................

22 The involved tunnel is no longer present in the Tunnel list.

Figure 17-103 Tunnel deletion evidence

...................................................................................................................................................................................................

23 The Link over Cable has the same name as the Section

....................................................................................................................................................................................................................................
1350 OMS 17-109
8DG42227DAAA 9.6
Issue 3 December 2012
EVC over T-MPLS Delete NE detailed procedure
Delete NE with EVC over T-MPLS
....................................................................................................................................................................................................................................
Deassign the LoC from the Domain.

Figure 17-104 Deassign LoC from Domain

...................................................................................................................................................................................................

24 Field Domain is deleted from the involved LoC.

Figure 17-105 Field Domain is deleted

....................................................................................................................................................................................................................................
17-110 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
EVC over T-MPLS Delete NE detailed procedure
Delete NE with EVC over T-MPLS
....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

25 The associated Section is automatically deleted.

Figure 17-106 The associated Section is automatically deleted

...................................................................................................................................................................................................

26 From the defined Node select Search>Ethernet Physical Ports

Figure 17-107 Defined Node: Search>Ethernet Physical Ports

....................................................................................................................................................................................................................................
1350 OMS 17-111
8DG42227DAAA 9.6
Issue 3 December 2012
EVC over T-MPLS Delete NE detailed procedure
Delete NE with EVC over T-MPLS
....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

27 Deassign the UNI port from the domain.

Figure 17-108 Deassign UNI port from the domain

...................................................................................................................................................................................................

28 The relevant field domain is empty.

Figure 17-109 Field domain is empty

....................................................................................................................................................................................................................................
17-112 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
EVC over T-MPLS Delete NE detailed procedure
Delete NE with EVC over T-MPLS
....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

29 Delete the NE.

Figure 17-110 Delete the NE

E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS 17-113
8DG42227DAAA 9.6
Issue 3 December 2012
EVC over T-MPLS Overview
Verify create EVC over T-MPLS
....................................................................................................................................................................................................................................

Verify create EVC over T-MPLS

Verify create EVC over T-MPLS


When to use
The scope of this procedure is to verify create EVC over T-MPLS.

Related Information
This task does not have any related information.

Before you begin


This task does not have any preconditions.

Task
...................................................................................................................................................................................................

1 From the main menu bar select Search > Packet > Services > T-MPLS > T-MPLS EVCs.

Figure 17-111 Search>Packet>Services>T-MPLS>T-MPLS EVCs

....................................................................................................................................................................................................................................
17-114 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
EVC over T-MPLS Verify create EVC over T-MPLS
Verify create EVC over T-MPLS
....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

2 The list of the T-MPLS EVCs is displayed.

Figure 17-112 T-MPLS EVCs

...................................................................................................................................................................................................

3 Allocate the EVC

Figure 17-113 Allocate the EVC

....................................................................................................................................................................................................................................
1350 OMS 17-115
8DG42227DAAA 9.6
Issue 3 December 2012
EVC over T-MPLS Verify create EVC over T-MPLS
Verify create EVC over T-MPLS
....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

4 Implement the EVC

Figure 17-114 Implement the EVC

E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
17-116 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
18 18 to End Ethernet
End
Provisioning Management

Overview
Purpose
This chapter describes how to provision and monitor the Ethernet data.

Contents

IP DSCP/TOS and EtherType 18-6


Classification of the frames 18-6
Managing Customer 18-8
Overview about Customer 18-8
Display the Customer List 18-9
Description of the list of Customers 18-10
Create a Customer 18-11
Modify a Customer 18-12
Delete a Customer 18-14
Get Details of the Customer 18-15
Details of a Customer 18-16
Managing Ethernet Services 18-17
Overview about Ethernet Services 18-17
Display the Service List 18-20
Description of the list of Services 18-21
Create a Service 18-22
Service Setup 18-24
Modify a Service 18-30
Delete a Service 18-32
Get details of the Service 18-33
Details of a Service 18-35

...................................................................................................................................................................................................................................
1350 OMS 18-1
8DG42227DAAA 9.6
Issue 3 December 2012
End to End Ethernet Provisioning Management Overview

....................................................................................................................................................................................................................................

Display the Services of a Customer 18-36


Managing ETS Ethernet Virtual Connections (EVC) 18-37
Overview about ETS Ethernet Virtual Connections 18-37
Resource Reservation for Private Services 18-39
Display the list of Connection Oriented EVC 18-42
Description of the list of EVCs 18-43
Create a Connection Oriented EVC 18-44
Modify an ETS EVC 18-47
Delete an ETS EVC 18-49
Get the EVC properties 18-51
Details of a EVC 18-53
Allocate ETS EVC 18-54
Deallocate ETS EVC 18-55
Implement ETS EVC 18-56
Deimplement ETS EVC 18-57
Commission ETS EVC 18-58
Decommission ETS EVC 18-59
List the EVC terminations 18-60
Description of the list of terminations 18-61
Delete an EVC Termination 18-62
Get the EVC termination properties 18-63
Details of a Termination 18-65
Add an EVC termination 18-66
EVC Fault Localization 18-68
Description of the list of Fault Localization 18-69
Description of the list of Alarms 18-70
Start PM on an EVC 18-71
Stop PM on an EVC 18-72
Synchronize PM on an EVC 18-73
Show PM on an EVC 18-74
View the Routing Display on an EVC 18-75
Managing End-to-End Ethernet Virtual Connections (E2E EVC) 18-76
Overview about E2E Ethernet Virtual Connections 18-76
Display the list of E2E EVC 18-78
Description of the list of EVCs 18-79

....................................................................................................................................................................................................................................
18-2 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
End to End Ethernet Provisioning Management Overview

....................................................................................................................................................................................................................................

Create an E2E EVC 18-80


Create a full E2E EVC 18-84
Create a raw E2E EVC 18-86
Modify a full E2E EVC 18-87
Join E2E EVC 18-89
Managing an E2E EVC 18-91
EVC over SDH 18-93
Structure for EVC over SDH 18-93
Assign ports to domain 18-102
EVC over SDH 18-106
Alarms EVC T-MPLS 18-118
Full EVC Takeover 18-121
Overview about Full EVC Takeover procedure 18-121
Full EVC Takeover Procedure 18-122
T-MPLS Takeover 18-130
T-MPLS Takeover description 18-130
Takeover procedure for T-MPLS 18-131
Managing Color Profiles 18-133
Overview about Color Profiles 18-133
Display the Color Profile list 18-134
Create a Color Profile 18-135
Modify a Color Profile 18-136
Delete a Color Profile 18-139
Get the Color Profile Properties 18-140
Managing Traffic Descriptors 18-142
Overview about Traffic Descriptor 18-142
Display the Traffic Descriptor list 18-144
Description of the list of Traffic Descriptors 18-145
Create a Traffic Descriptor 18-146
Modify a Traffic Descriptor 18-149
Delete a Traffic Descriptor 18-152
Get the Traffic Descriptor Properties 18-153
Details of a Traffic Descriptor 18-155
Managing Traffic Classifiers 18-156
Overview about Traffic Classifiers 18-156

....................................................................................................................................................................................................................................
1350 OMS 18-3
8DG42227DAAA 9.6
Issue 3 December 2012
End to End Ethernet Provisioning Management Overview

....................................................................................................................................................................................................................................

Display the Traffic Classifier list 18-158


Description of the list of Traffic Classifiers 18-159
Create a Traffic Classifier 18-160
Modify a Traffic Classifier 18-162
Delete a Traffic Classifier 18-164
Get the Traffic Classifier Properties 18-165
Details of a Traffic Classifier 18-167
Managing Ethernet ETS Edge Physical Ports 18-168
Overview about Ethernet edge physical ports 18-168
Display the ETS edge port list 18-169
Modify an edge port 18-170
Configure an ETS Edge Port 18-172
Get the ETS Edge Port Properties 18-175
Display the traffic parameter list 18-177
Description of the list of Traffic Parameters 18-178
Details of Traffic Parameters 18-179
Navigation to equipment 18-180
Show PM on an Edge Port 18-182
Show External Termination Point 18-183
Managing Ethernet Transport Links 18-184
Overview about Ethernet Transport Links 18-184
Display the Ethernet ETS Transport Link list 18-186
Description of the list of ETS Transport Links 18-187
Configure an ETS Transport Link 18-188
Get the Transport Link extremities 18-190
Get the Transport Link properties 18-193
Details of ETS Transport Links 18-195
Display the Transport Link bandwidth load 18-196
Managing Ethernet Segments 18-197
Overview about Ethernet Segments 18-197
Display the Ethernet Segment list 18-199
Description of the list of Ethernet Segments 18-200
Create an Ethernet Segment 18-202
Modify an Ethernet Segment 18-205
Delete an Ethernet Segment 18-208

....................................................................................................................................................................................................................................
18-4 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
End to End Ethernet Provisioning Management Overview

....................................................................................................................................................................................................................................

Associate a Traffic Classifier to an Ethernet Segment 18-209


Disassociate a Traffic Classifier to an Ethernet Segment 18-211
Add a constraint to an Ethernet Segment 18-213
List the constraints related to an Ethernet Segment 18-216
Description of the list of Constraints 18-217
Delete an Ethernet Segment Constraint 18-218
Get the Ethernet Segment Constraint Properties 18-219
Details of an Ethernet Segment Constraint 18-221
Modify a Constraint 18-222
VLAN Push/Pop at ETS NNI Interface 18-225
Allocate an Ethernet Segment 18-226
Deallocate an Ethernet Segment 18-227
Implement an Ethernet Segment 18-229
Deimplement an Ethernet Segment 18-231
Configure an Ethernet Segment 18-233
Get the Ethernet Segment extremities 18-235
Description of the list of Ethernet Segment Extremities 18-239
Get the Ethernet Segment properties 18-240
Details of an Ethernet Segment 18-241
Display the route of an Ethernet Segment 18-242
Display the connectivity view of an Ethernet Segment 18-244
Managing VLAN types 18-246
Overview about VLAN types 18-246
Display the VLAN type list 18-247
Create a VLAN type 18-248
Modify a VLAN type 18-251
Delete a VLAN type 18-253

....................................................................................................................................................................................................................................
1350 OMS 18-5
8DG42227DAAA 9.6
Issue 3 December 2012
End to End Ethernet Provisioning Management Classification of the frames
IP DSCP/TOS and EtherType
....................................................................................................................................................................................................................................

IP DSCP/TOS and EtherType

Classification of the frames


Additional criteria
The Vlan and Priority based Classification is extended with the following criteria:
• IP DSCP/TOS Classification.
• Ether Type Classification.
These new Classifications live together with existing Vlan and Priority based
Classification. So the global way to manage incoming Ethernet Frames allows the
definition of more Classification combinations.

Application context
The new classification management is applicable in following contexts:
• At Flow Level for Ethernet Connection Oriented Domains (ETS).
• At Flow Level for Provider Bridge Edge Terminations (ETS_P).
The Feature is not applicable to MAC and Virtual (ETB) contexts.
The customer equipments (CE) at the border of the provider network are often IP routers
in charge of managing the frontier between IP and Ethernet. These routers translate the IP
Diff-Service Code Point (DSCP) field (and/or the IP Precedence field) into Ethernet
priority bits (PRI bits). Since not all the routers perform that translation, the NE
functionalities have been extended to IP DSCP management.
The user managing an Ethernet network offers differentiated services also when IP routers
are not able to write the PRI bits of the transmitted Ethernet frames. In fact, the NE
inspects the code-point of the IPv4 header, representing PHB (CoS + Dropping
Precedence). Then NE pushes at the NNI a VLAN tag whose PRI bits value encodes that
PHB information.

Classification management summary


The classification management is summarized in following table

Classification Type. ETS Flow Specific Classifier Prio. VlanId. EtherType. IP.
Criteria. TOS.
DSCP.

DEFAULT. Default Classifier Criteria. Do not 4097. Do not care. 65.


care.

Untagged. Untagged Classifier Criteria. 8. 4096. Do not care. 65.

Untagged+EtherType. Untagged Classifier Criteria + 8. 4096. EtherType. 65.


EthType.

Untagged+ NO IP. Untagged Non IP Classifier Criteria. Do not 4096. Do not care. 64.
care.

....................................................................................................................................................................................................................................
18-6 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
End to End Ethernet Provisioning Management Classification of the frames
IP DSCP/TOS and EtherType
....................................................................................................................................................................................................................................

Classification Type. ETS Flow Specific Classifier Prio. VlanId. EtherType. IP.
Criteria. TOS.
DSCP.

Untagged+ NO Untagged Non IP Classifier Criteria Do not 4096. EthType. 64.


IP+EtherType. + EthType. care.

Untagged+DSCP+IP. Untagged Specific DSCP Classifier Do not 4096. IP(0x0800). 0.


Criteria + EthType. care.

VLAN. Specific Classifier Criteria. PRIO. VID. Do not care. 65.

Mixed (VLAN Range) Classifier PRIO. Range. Do not care. 65.


Criteria.
Mixed (PRI Range) Classifier Range. VID. Do not care. 65.
Criteria.
Range Classifier Criteria. Range. Range. Do not care. 65.

VLAN+EtherType. Specific Classifier Criteria + Prio. VID. EthType. 65.


EthType.

Mixed (VLAN Range) Classifier Prio. Range. EthType. 65.


Criteria + EthType.

Mixed (PRI Range) Classifier Range. VID. EthType. 65.


Criteria + EthType.
Range Classifier Criteria + EthType. Range. Range. EthType. 65.
VLAN+NO IP. Specific VLAN Classifier Criteria. Do not VID. Do not care. 64.
care.

VLAN Range Classifier Criteria. Do not Range. Do not care. 64.


care.

Tagged Non IP Classifier Criteria. Do not Full Do not care. 64.


care. Range.
VLAN+NO Specific VLAN Classifier Criteria + Do not VID. EtherType IP. 64.
IP+EtherType. EthType. care.

VLAN Range Classifier Criteria + Do not Range. EtherType IP. 64.


EthType. care.

Tagged Non IP Classifier Criteria + Do not Full EtherType IP. 64.


EthType. care. Range.

VLAN+DSCP+EtherType. Specific Classifier Criteria + Do not VID. IP(0x0800). DSCP.


EthType. care.

Mixed (VLAN Range) Classifier Do not Range. IP(0x0800). Range.


Criteria + EthType. care.

Mixed (DSCP Range) Classifier Do not VID. IP(0x0800). Range.


Criteria + EthType. care.

Range Classifier Criteria + EthType. Do not Full IP(0x0800). DSCP.


care. Range.

Tagged DSCP Range Classifier Do not Full IP(0x0800). Range.


Criteria + EthType. care. Range.

....................................................................................................................................................................................................................................
1350 OMS 18-7
8DG42227DAAA 9.6
Issue 3 December 2012
End to End Ethernet Provisioning Management Overview about Customer
Managing Customer
....................................................................................................................................................................................................................................

Managing Customer

Overview about Customer


Customer description
A customer is the owner of one or more Customer Edges (equipment).
The customer is the final user of the Ethernet services defined across the boundaries of
the managed network.
A customer encompasses a series of Ethernet Services provided by the Service Provider.
User Label is the identifier of a given customer. The user label is used or displayed when
defining or displaying the other entities (that is EVC). The EVC defines the Ethernet
services for the customer.

....................................................................................................................................................................................................................................
18-8 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
End to End Ethernet Provisioning Management Display the Customer List
Managing Customer
....................................................................................................................................................................................................................................

Display the Customer List


When to use
The Customer List window presents all the customers and their attributes.

Related Information
For more information, refer to “Customer description” (p. 18-8).

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.

Task
From the MS-GUI Main menu:
...................................................................................................................................................................................................

1 Select Search > Packet > Services.


Result: The menu of the Services is shown.
...................................................................................................................................................................................................

2 Select Customer.
Result: The list window is displayed.
See the following topic in this document: “Description of the list of Customers”
(p. 18-10)
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS 18-9
8DG42227DAAA 9.6
Issue 3 December 2012
End to End Ethernet Provisioning Management Description of the list of Customers
Managing Customer
....................................................................................................................................................................................................................................

Description of the list of Customers


Attributes of a Customer
The attributes displayed for each customer are:
• User Label.
• Address.
• Company.
• Comment.

....................................................................................................................................................................................................................................
18-10 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
End to End Ethernet Provisioning Management Create a Customer
Managing Customer
....................................................................................................................................................................................................................................

Create a Customer
When to use
This function allows the user to define the characteristics of the customer.

Related Information
For more information, refer to “Customer description” (p. 18-8).
The definition of a customer allows the usage of services defined across the boundaries of
the managed network.

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Conditions
To get a positive result:
• The maximum number of customers must not be reached.
• The User Label must be different from the existing ones.

Task
From the MS-GUI Main menu:
...................................................................................................................................................................................................

1 Select Action > Packet > Services > Create Customer.


...................................................................................................................................................................................................

2 On the Create Customer Window.


To create a customer:
• Enter a User Label.
• Enter a Company (optional).
• Enter an Address (optional).
• Enter a Comment (optional).
...................................................................................................................................................................................................

3 Click Ok.
Result: The customer is created.
The tree area and the Customer list are updated.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS 18-11
8DG42227DAAA 9.6
Issue 3 December 2012
End to End Ethernet Provisioning Management Modify a Customer
Managing Customer
....................................................................................................................................................................................................................................

Modify a Customer
When to use
The function modifies Customer characteristics.

Related Information
For more information, refer to “Customer description” (p. 18-8).
The customer modification function gives the possibility to modify the:
• User Label.
• Company.
• Address.
• Comment.

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Conditions
To get a positive result:
• If modified, the new User Label must be different from the existing ones.

Task
From the MS-GUI Main menu:
...................................................................................................................................................................................................

1 Select Search > Packet > Services > Customers.


...................................................................................................................................................................................................

2 On the Customer List Window, select the Customer to modify. Click the right mouse
button and select Modify on the popup menu.
...................................................................................................................................................................................................

3 The Modify Customer window is displayed.


For the selected customer, you can modify:
• Enter a new User Label (optional).
• Modify the Company (optional).
• Modify the Address (optional).
• Modify the Comment (optional).

....................................................................................................................................................................................................................................
18-12 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
End to End Ethernet Provisioning Management Modify a Customer
Managing Customer
....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

4 Click Ok.
Result: The customer is modified.
The tree area and the Customer list are updated.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS 18-13
8DG42227DAAA 9.6
Issue 3 December 2012
End to End Ethernet Provisioning Management Delete a Customer
Managing Customer
....................................................................................................................................................................................................................................

Delete a Customer
When to use
This function consists in deleting a customer from the 1350 OMS PKT supervision.

Related Information
For more information, refer to “Customer description” (p. 18-8).

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Conditions
To get a positive result:
• No more service is related to the customer to be deleted.

Task
From the MS-GUI Main menu:
...................................................................................................................................................................................................

1 Select Search > Packet > Services > Customers.


...................................................................................................................................................................................................

2 On the Customer List Window, select the Customer to delete. Select Action > Customer
> Delete from the Action menu.
...................................................................................................................................................................................................

3 Select one of the options in the confirmation box. Refer to the procedure “Confirm the
action” (p. 11-40).
Result: The customer is deleted.
After confirmation, the customers are removed.
The Customer List and the tree area are updated.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
18-14 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
End to End Ethernet Provisioning Management Get Details of the Customer
Managing Customer
....................................................................................................................................................................................................................................

Get Details of the Customer


When to use
This function gets information about a customer.

Related Information
For more information, refer to “Customer description” (p. 18-8).

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.

Task
From the MS-GUI Main menu:
...................................................................................................................................................................................................

1 Select Search > Packet > Services > Customers.


...................................................................................................................................................................................................

2 On the Customer List Window, select a Customer. Select Action from Customer >
Properties from the popup menu.
Result: The property window is displayed.
See the following topic in this document: “Details of a Customer” (p. 18-16)
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS 18-15
8DG42227DAAA 9.6
Issue 3 December 2012
End to End Ethernet Provisioning Management Details of a Customer
Managing Customer
....................................................................................................................................................................................................................................

Details of a Customer
Attributes of a Customer
For the selected customer, the properties are:
• User Label the customer name.
• Company the Customer Company name (optional).
• Address the Customer Company address (optional).
• Comment (optional).

....................................................................................................................................................................................................................................
18-16 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
End to End Ethernet Provisioning Management Overview about Ethernet Services
Managing Ethernet Services
....................................................................................................................................................................................................................................

Managing Ethernet Services

Overview about Ethernet Services


Ethernet Service description
There are two ways to define a Service:
• by means of a user action. In this way, the user defines all characteristics of the new
Ethernet service.
• automatically after an EVC creation. In this case, all characteristics of the service
must be derived as much as possible from the EVC characteristics. This action is
automatically performed by 1350 OMS PKT).

Ethernet service classification


The Ethernet service is a concept useful to define the way in which end-to-end Ethernet
connections are organized:
• Ethernet Line (E-Line): for point-to-point connectivity. E-line services are used to
create Ethernet private line services, Ethernet-based Internet access services, and
point-to-point Ethernet VPNs.
• Ethernet LAN (E-LAN): for multipoint-to-multipoint (any-to-any) connectivity.
E-LAN Services are designed for multipoint Ethernet VPNs and native Ethernet
Transparent LAN services.

Ethernet service types


Following types of Ethernet services can be defined for each customer:
• “EPL (Ethernet Private Line Service)” (p. 18-17).
• “EVPL (Ethernet Virtual Private Line Service)” (p. 18-18).
• “EVPLAN (Ethernet Virtual Private LAN Service)” (p. 18-18).
• “Extended EVPLAN (Extended Ethernet Virtual Private LAN Service)” (p. 18-18).
• “HSI (High Speed Internet)” (p. 18-19).
• “Broadcast” (p. 18-19).

EPL (Ethernet Private Line Service)


This service consists of a point-to-point EVC that uses dedicated bandwidth. Bandwidth
can be virtual concatenated Sonet/SDH channels or reserved packet bandwidth in a packet
switched network. The bottom line is that the Ethernet frames of the customer stay strictly
separated from others' at the Ethernet layer. The customer always has available the
committed or contracted bandwidth rate also known as CIR (committed information rate).
The Ethernet Private Line is much like today TDM-based private lines. It offers the
benefit of a native Ethernet interface to the customer and to the network user edge
equipment. In a Private Service, no resource is sharing and no UNI Multiplexing. The
network resources used by one Service cannot be used by other Services.
....................................................................................................................................................................................................................................
1350 OMS 18-17
8DG42227DAAA 9.6
Issue 3 December 2012
End to End Ethernet Provisioning Management Overview about Ethernet Services
Managing Ethernet Services
....................................................................................................................................................................................................................................
EVPL (Ethernet Virtual Private Line Service)
For the Ethernet Virtual Private Line, the rules are slightly different. In this service, the
customer still gets point-to-point connectivity, but over shared bandwidth instead of
dedicated. The shared bandwidth can be a TDM channel in the transport network or the
switch fabric bandwidth of switches and routers in the packet network. Features such as
committed information rates (CIR) and excess information rates (EIR) can be offered by
the service provider. They have service performance metrics to support true SLAs. This
service is therefore similar to Frame Relay and its model of creating networks using
PVCs (permanent virtual circuits). The MEF defines the Ethernet Virtual Private Line
service as a point-to-point Ethernet Virtual Connection (EVC) between two UNIs
(subscribers). The EVPL supports a service multiplexed UNI. It means that multiple
EVCs can share a single UNI. This characteristic is useful when creating hub-and-spoke
architectures in which multiple remote offices all require access to a headquarters.
Multiple customers all require access to a POP (point of presence) of the ISP. The user
can mix connectivity services and managed services.

EVPLAN (Ethernet Virtual Private LAN Service)


EVPLAN allows any edge node to send/receive information to/from others edge nodes. It
supports every Network topology (Point to point, Point to multipoint, Multipoint to
multipoint). It can be based on Connection Oriented or on Connection Less networks
based on 802.1Q (Virtual Bridge) and/or on 802.1ad (Provider Bridge). EVPLANis a
Virtual Service as network resources used by one Service can be used by other Services.
Resource sharing and UNI Multiplexing are allowed. The Ethernet Virtual Private LAN
(EVPLAN) has gone by different names over the past two years. From Virtual Private
LAN Service (VPLS) to Transparent LAN Service (TLS), to Virtual Private Switched
Network (VPSN). Regardless of how EVPLAN is termed, the EVPLan is a network
service providing Layer-2 multipoint connectivity between Ethernet edge devices.
Customer separation is accomplished through encapsulation or Ethernet virtual
connections. The EVPLan is designed as the most cost-effective service for the carrier, as
it can leverage shared transmission bandwidth in the network. As a multipoint service, it
can be complex to administer. Customer service separation by Provider VLAN tags is not
likely to be sufficient because of the limited address space of Provider VLAN IDs (only
4096). Hence other service delivery technologies providing customer frame encapsulation
must be used such as MPLS, MAC-in-MAC, and RPR. The user must also decide how to
implement protection, bandwidth profiles, congestion management, buffering, and so on.
These properties are much more complex to be implement compared to point-to-point
services.

Extended EVPLAN (Extended Ethernet Virtual Private LAN Service)


Extended EVPLAN allows any edge node to send/receive information to/from others
edge nodes. It supports every Network topology (Point to point, Point to multipoint,
Multipoint to multipoint). It can be based on Connection Oriented or on Connection Less
network based on 802.1D (MAC Bridge) or on 802.1Q (Virtual Bridge). This service is a
Private Service as network resources used by one Service cannot be used by other
Services. No resource is sharing and no UNI is Multiplexing.
....................................................................................................................................................................................................................................
18-18 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
End to End Ethernet Provisioning Management Overview about Ethernet Services
Managing Ethernet Services
....................................................................................................................................................................................................................................
HSI (High Speed Internet)
HSI is an Internet Access service. The advertised throughput reaches, or which
consistently achieves, speeds over narrowband (128 Kbit/s). Throughput is considered
between the end-user equipment and the first Internet router reached outside the IP
network managed by the Internet provider.

Broadcast
A broadcast is the transmission of a single message to all hosts on the network
simultaneously. Broadcasting is supported on most local area networks (LANs).
Broadcast is also a useful feature in e-mail systems. Multicasting differs from
broadcasting in that it sends the message just to a select list of recipients rather than to
every host on the network. Unicasting is sending a message to a single host. A broadcast
address is a special type of networking address that is used for broadcasting. A broadcast
domain is a logical area in a network that is reachable by a broadcast. The word broadcast
originally meant scattering seed or fertilizer over a broad area rather than placing it in
rows.

Ethernet service containment tree


In the definition of Ethernet service, the used terminations are not specified, they are
defined in the Ethernet Virtual Connection (EVC) definition.

Figure 18-1 Ethernet service containment tree

customer

EthService

EVC_1 EVC_2 ........

EthSegm_1
........ EthSegm_n
........

Depending on Service Type, an Ethernet service can include one or more EVCs.

....................................................................................................................................................................................................................................
1350 OMS 18-19
8DG42227DAAA 9.6
Issue 3 December 2012
End to End Ethernet Provisioning Management Display the Service List
Managing Ethernet Services
....................................................................................................................................................................................................................................

Display the Service List


When to use
The Ethernet Service List window presents all the Ethernet services and their attributes.

Related Information
The list can be required in different manners:
• If the list is required from Main Menu, all the Ethernet Services are displayed.
• If the list is required from the Customer List, only the Ethernet services associated to
the selected customer are displayed.
• If the list is required from Ethernet Transport Link List, only the Ethernet services
associated to the selected Ethernet Transport Links are displayed.
For more information about Services, refer to “Ethernet Service description” (p. 18-17).

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.

Task
From the MS-GUI Main menu:
...................................................................................................................................................................................................

1 Select Search > Packet > Services.


Result: The menu of the Services is shown.
...................................................................................................................................................................................................

2 Select Service.
Result: The list window is displayed.
See the following topic in this document: “Description of the list of Services”
(p. 18-21)
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
18-20 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
End to End Ethernet Provisioning Management Description of the list of Services
Managing Ethernet Services
....................................................................................................................................................................................................................................

Description of the list of Services


Attributes of a Service
The attributes displayed for each service are:
• User Label.
• Customer User Label.
• Type (EPL, EVPL, EVPLAN, Extended EVPL, Extended EVPLAN, HSI, Broadcast,
BTV).
• Working State (Normal, Configuring, Removing).
• Service State (Not in service, In service, Upgrading).
• Availability Status (Normal, Degraded, In Failure, Not Meaningful).

....................................................................................................................................................................................................................................
1350 OMS 18-21
8DG42227DAAA 9.6
Issue 3 December 2012
End to End Ethernet Provisioning Management Create a Service
Managing Ethernet Services
....................................................................................................................................................................................................................................

Create a Service
When to use
This function allows creating an Ethernet Service.

Related Information
If this creation window is required from the Customer List, the Customer field of the
creation window is automatically filled with the selected value.
For more information about Services, refer to “Ethernet Service description” (p. 18-17).

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Conditions
To get a positive result:
• At least, one customer must previously be defined.
• The User Label must be different from the existing ones.

Task
From the MS-GUI Main menu:
...................................................................................................................................................................................................

1 Select Action > Packet > Services > Create Ethernet Service.
...................................................................................................................................................................................................

2 On the Create Service Window.


To create a service define following data:
• Enter a Service User label.
• Choose the Customer from the list (this field is automatically filled if this window is
required from the Customer List).
• Select a Service Type (EVPL, EPTL, EPL, EVPLAN, Extended EVPL, Extended
EVPLAN, HSI, BTV, or Broadcast).
• Enter the Reference SLA(string optional).
• Enter a Comment (optional).
...................................................................................................................................................................................................

3 Click Ok.

....................................................................................................................................................................................................................................
18-22 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
End to End Ethernet Provisioning Management Create a Service
Managing Ethernet Services
....................................................................................................................................................................................................................................
Result: The service is created.
A correlation with the selected customer is created.
Then, the tree area and the Ethernet Service List are updated.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS 18-23
8DG42227DAAA 9.6
Issue 3 December 2012
End to End Ethernet Provisioning Management Service Setup
Managing Ethernet Services
....................................................................................................................................................................................................................................

Service Setup
When to use
The wizard creates and configure at once: Service, EVC, and Ethernet Segment.

Related Information
For more information about Services, refer to “Ethernet Service description” (p. 18-17).
wizard results
For EVPL, EPTL, EPL, and Extended EVPL connectivity only an Automatic Setup function
can be chosen.
The wizard creates at once:
• a new service.
• a Point-to-Point Bi-directional EVC (named "<Service User Label > _EVC_<Id > "),.
• two Ethernet Segments (named "<Service User Label > _ESG_A_Z_<Id > " and
"<Service User Label > _ESG_Z_A_<Id > ").
• associate a Traffic Descriptor and a Traffic Classifier to Ethernet Segments.
Service states
The Ethernet service is created into the 1350 OMS PKT with the following state:
• Working State: Normal.
• Service State: Not In Service.
• Availability Status: depending on the availability status of created EVC.
A correlation with the selected customer is created. Then, the tree area and the Ethernet
Service List are updated.
EVC states
One EVC is created into the 1350 OMS PKT with the following attributes:
• User Label: <Service User Label > _EVC_<progressive_number >.
• Type: Point to Point.
• Traffic type: Unicast.
• Directionality: Bidir.
• Service Level: Gold.
• Provisioning State: Defined.
• Working State: Normal.
A correlation with the Service is created.
Then, the EVC is allocated and then, implemented (Provisioning State set to
Implemented). At the end, the tree area and the EVC List are updated.

....................................................................................................................................................................................................................................
18-24 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
End to End Ethernet Provisioning Management Service Setup
Managing Ethernet Services
....................................................................................................................................................................................................................................
Ethernet Segment states
Two Ethernet Segments are created into the 1350 OMS PKT with the following attributes:
• User Label: <Service User Label > _ESG_A_Z_<progressive_number > and
<Service User Label > _ESG__Z_A_<progressive_number >.
• Subnetwork: NE Subnetwork.
• Provisioning State: Defined.
• Working State: Normal.
• Traffic type: Unicast.
• Policy Mode: Color Blind.
• Color Profile: "No associated Color Profile".
Final settings
If the Transport Link is chosen by the user (case NE are not E/FE/GE), that Transport
Link is used as a constraint.
If the Transport Link is not chosen by the user, the Transport Link must be derived by one
of the two ports. Then, the retrieved Transport Link is used as constraint.
A correlation with the EVC is created.
Then, the two Ethernet Segments are allocated and then, implemented Provisioning State
set to Implemented).
At the end, the tree area and the Ethernet Segment List are updated.
A correlation with the default Traffic Descriptor is created. Correlation is based on
bandwidth parameter.
At the end, the Service State of the Ethernet service is set to 'In Service'.
Recovery consideration in case of error
In case of error, no global rollback is provided.
The execution is immediately stopped at the last useful step (and a message is returned to
the user to describe the occurred problem. The function can be split in term of other sub
functions (create Service, create EVC, ….) and consider each sub function as atomic. so
when a sub function fails, the operation fails but for all previous sub functions and no
rollback is possible.
In case of any negative result, the user has two possibilities:
• Continue manually supplying all missing operations proceeding step by step.
• Invoke a manual deletion of the partially built tree starting from the Ethernet Service.

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
....................................................................................................................................................................................................................................
1350 OMS 18-25
8DG42227DAAA 9.6
Issue 3 December 2012
End to End Ethernet Provisioning Management Service Setup
Managing Ethernet Services
....................................................................................................................................................................................................................................
Conditions
To get a positive result:
• No more service is related to the customer to be deleted.

Task
From the MS-GUI Main menu:
...................................................................................................................................................................................................

1 Select Action > Packet > Services > Create Ethernet Service.
Result: The wizard EVPL/EPTL/EPL/Extended EVPL Automatic Setup is shown.

Figure 18-2 EVPL/EPTL/EPL/Extended EVPL service creation wizard

...................................................................................................................................................................................................

2 In the panel insert:


• Enter a Service User label.
• Choose the Customer by using the sensitive help (this field is automatically filled if
this window is required from the Customer List).
• Select the Service Type (EPTL, EVPL, EPL, or Extended EVPL). If you insert EVPL or
Extended EVPL Service Type. Refer to: “Task for EVPL or Extended EVPL”
(p. 18-28).
....................................................................................................................................................................................................................................
18-26 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
End to End Ethernet Provisioning Management Service Setup
Managing Ethernet Services
....................................................................................................................................................................................................................................
• Select a NAD Value from the list.
• Enter the Reference SLA (a string) (optional).
• The Class of Service is Guaranteed.
• Enter a Comment (optional).
• Click Next.
Result: The wizard goes to the next step.

...................................................................................................................................................................................................

3 Fill the following fields:


• Select Resources section (by using the sensitive help and menu).
• Select a NE or ENE for the "A" end by using sensitive help.
• Select an Edge Port A by using sensitive help.
....................................................................................................................................................................................................................................
1350 OMS 18-27
8DG42227DAAA 9.6
Issue 3 December 2012
End to End Ethernet Provisioning Management Service Setup
Managing Ethernet Services
....................................................................................................................................................................................................................................
• Select a NE or ENE for the "Z" end by using sensitive help.
• Select an Edge Port Z by using sensitive help.
• Select if free Transport Link (by checking the box).
• Select the Transport Link (by using the sensitive help; in the case of E/FE/GE NE, the
Transport Link is automatically determined by the 1350 OMS PKT).
• Click Next.
• On the next panel click the Finish button.
Result: The wizard creates and configure at once: Service, EVC, and Ethernet
Segment.
E...................................................................................................................................................................................................
N D O F S T E P S

Task for EVPL or Extended EVPL


...................................................................................................................................................................................................

1 If you insert EVPL or Extended EVPL Service Type, the following panel is displayed:
• Enter a Service User label.
• Choose the Customer by using the sensitive help (this field is automatically filled if
this window is required from the Customer List).
• Select the Service Type (EVPL, Extended EVPL).
• Enter the Reference SLA (a string) (optional).
• Enter a Comment (optional).
• In the Traffic Descriptor tab:
The Traffic Descriptor can be selected from the already created list, or checking the
box Create, insert the Traffic Descriptor characteristics:
– Class of Service: Guaranteed, Regulated, Best Effort.
– CIR, PIR, CES, PBS values.
• In the Traffic Classifier tab:
The Traffic Classifier can be selected from the already created list, or checking the
box Create, insert the Traffic Classifier characteristics:
– Vlan Id.
– Priority Id.
– Priority Max.
– Vlan Max.
• Click Next.
Result: The wizard goes to the next step.
...................................................................................................................................................................................................

2 Fill Resources section (by using the sensitive help and menu): this panel has the same
layout as the EPLINE Service panel.
On the panel click the Finish button.
....................................................................................................................................................................................................................................
18-28 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
End to End Ethernet Provisioning Management Service Setup
Managing Ethernet Services
....................................................................................................................................................................................................................................
Result: The wizard creates and configure at once: Service, EVC, and Ethernet
Segment.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS 18-29
8DG42227DAAA 9.6
Issue 3 December 2012
End to End Ethernet Provisioning Management Modify a Service
Managing Ethernet Services
....................................................................................................................................................................................................................................

Modify a Service
When to use
The function modifies Service characteristics.

Related Information
For more information about Services, refer to “Ethernet Service description” (p. 18-17).
The service modification gives the possibility to modify one or all the following
parameters:
• Service User Label.
• Service Type (only if no EVCs are currently associated to the Ethernet service).
• Reference SLA.
• Comment.

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Conditions
To get a positive result:
• No operation is pending on the Ethernet service.
• If modified, the new User Label must be different from the existing ones.

Task
From the MS-GUI Main menu:
...................................................................................................................................................................................................

1 Select Search > Packet > Services > Services.


...................................................................................................................................................................................................

2 On the Service List Window, select the Service to modify. Click the right mouse button
and select Modify on the popup menu.
...................................................................................................................................................................................................

3 The Modify Service window is displayed.


To modify an Ethernet service:
• Enter a new User Label (optional).
• Modify the Service Type (optional).

....................................................................................................................................................................................................................................
18-30 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
End to End Ethernet Provisioning Management Modify a Service
Managing Ethernet Services
....................................................................................................................................................................................................................................
• Modify the Reference SLA (optional).
• Modify the Comment (optional).
...................................................................................................................................................................................................

4 Click Ok.
Result: The service is modified.
If the Service User Label is modified, after confirmation of the modification: the tree
area (in customer section) and the Service List are updated.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS 18-31
8DG42227DAAA 9.6
Issue 3 December 2012
End to End Ethernet Provisioning Management Delete a Service
Managing Ethernet Services
....................................................................................................................................................................................................................................

Delete a Service
When to use
This function consists in deleting an Ethernet service from the 1350 OMS PKT
supervision.

Related Information
For more information about Services, refer to “Ethernet Service description” (p. 18-17).

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Conditions
To get a positive result:
• No more EVC related to the Service to be deleted.

Task
From the MS-GUI Main menu:
...................................................................................................................................................................................................

1 Select Search > Packet > Services > Services.


...................................................................................................................................................................................................

2 On the Service List Window, select the service to delete. Select Action > Service >
Delete from the Action menu.
...................................................................................................................................................................................................

3 Select one of the options in the confirmation box. Refer to the procedure “Confirm the
action” (p. 11-40).
Result: The service is deleted.
After confirmation, the services are removed.
The Service List is updated.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
18-32 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
End to End Ethernet Provisioning Management Get details of the Service
Managing Ethernet Services
....................................................................................................................................................................................................................................

Get details of the Service


When to use
This function gets information about an Ethernet service.

Related Information
For more information about Services, refer to “Ethernet Service description” (p. 18-17).

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.

Task
From the MS-GUI Main menu:
...................................................................................................................................................................................................

1 Select Search > Packet > Services > Services.


...................................................................................................................................................................................................

2 On the Service List Window, select a Service. Select Properties from the popup menu
activated using the mouse right button.

....................................................................................................................................................................................................................................
1350 OMS 18-33
8DG42227DAAA 9.6
Issue 3 December 2012
End to End Ethernet Provisioning Management Get details of the Service
Managing Ethernet Services
....................................................................................................................................................................................................................................
Result: The Properties window is displayed.
See the following topic in this document: “Details of a Service” (p. 18-35)

Figure 18-3 Ethernet Service Properties window

E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
18-34 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
End to End Ethernet Provisioning Management Details of a Service
Managing Ethernet Services
....................................................................................................................................................................................................................................

Details of a Service
Attributes of a Service
The attributes displayed for each service are:
• Id
• User Label.
• Customer Id label User Label.
• Customer User Label.
• Service Type (EPL, EVPL, EVPLAN, Extended EVPL, Extended EVPLAN, HSI,
Broadcast, BTV).
• Reference SLA
• Comment
• Action Type
• Action Date
• Working State (Normal, Configuring, Removing).
• Service State (Not in service, In service, Upgrading).
• Availability Status (Normal, Degraded, In Failure, Not Meaningful).
• ETS ID label
• ETS LABEL label

....................................................................................................................................................................................................................................
1350 OMS 18-35
8DG42227DAAA 9.6
Issue 3 December 2012
End to End Ethernet Provisioning Management Display the Services of a Customer
Managing Ethernet Services
....................................................................................................................................................................................................................................

Display the Services of a Customer


When to use
The function lists all the Ethernet services belonging to a Customer.

Related Information
The list can be required in different manners:
• If the list is required from Main Menu, all the Ethernet Services are displayed.
• If the list is required from the Customer List, only the Ethernet services associated to
the selected customer are displayed.
• If the list is required from Ethernet Transport Link List, only the Ethernet services
associated to the selected Ethernet Transport Links are displayed.
For more information about Services, refer to “Ethernet Service description” (p. 18-17).

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.

Task
From the MS-GUI Main menu:
...................................................................................................................................................................................................

1 Select Search > Packet > Services.


Result: The menu of the Services is shown.
...................................................................................................................................................................................................

2 Select Service.
Result: The list window is displayed.
See the following topic in this document: “Description of the list of Services”
(p. 18-21)
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
18-36 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
End to End Ethernet Provisioning Management Overview about ETS Ethernet Virtual Connections
Managing ETS Ethernet Virtual Connections (EVC)
....................................................................................................................................................................................................................................

Managing ETS Ethernet Virtual Connections (EVC)

Overview about ETS Ethernet Virtual Connections


EVC description
The Ethernet Virtual Connection (EVC) specifies the connectivity among two or more
Ethernet Edge Terminations (UNIs). If they belong to the same Metro Ethernet Network,
the association of Ethernet Edge Termination is implicitly specified, too.
The following main rules govern the EVC:
The EVC is common to Connection Oriented and Connection Less management
• a frame sent in the EVC can be delivered to one or more egress EVC Termination
(Ethernet Edge Termination).
• a frame sent in the EVC cannot be delivered back to the ingress EVC Termination.
• a frame sent in the EVC cannot be delivered to another EVC.
Every EVC is terminated by Edge Ports.
The same Edge Port can be used by different EVCs.

EVC topologies
The EVC can be used in different topologies and can have different properties. In
particular, the EVC can be:
• Point-to-point (PtoP): It connects exactly two points (that is, two Ethernet Edge
Ports). It can be unidirectional or bidirectional. It supports only Unicast traffic.
• Rooted-multipoint (RMP): A multipoint EVC in which each UNI is designated as
either a Root or a Leaf. Ingress Service Frames at a Root UNI can be delivered to one
or more of any of the other UNIs in the EVC. Ingress Service Frames at a Leaf UNI
can only be delivered to one or more Root UNIs in the EVC.
• Multipoint-to-multipoint (MPtoMP): It connects two or more points. It can be
unidirectional or bidirectional. It supports only traffic Unicast.

The Role of Edge Port


Depending on the EVC topology, every Edge Port used by a given EVC assumes a
specific Role.
• In PtoP topology, the two ports assume the "both" role (that is, root + leaf).
• In PtoMP topology, one port assumes the "root" role while all the others assume the
"leaf" role.
• In MPtoMP topology, all ports assume the "both" role (that is, root + leaf).

....................................................................................................................................................................................................................................
1350 OMS 18-37
8DG42227DAAA 9.6
Issue 3 December 2012
End to End Ethernet Provisioning Management Overview about ETS Ethernet Virtual Connections
Managing ETS Ethernet Virtual Connections (EVC)
....................................................................................................................................................................................................................................
The following figure summarizes the role assumed by Edge Port for different EVCs.

Figure 18-4 EVCs and Edge Ports relationships

....................................................................................................................................................................................................................................
18-38 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
End to End Ethernet Provisioning Management Resource Reservation for Private Services
Managing ETS Ethernet Virtual Connections (EVC)
....................................................................................................................................................................................................................................

Resource Reservation for Private Services


Overview
When the user defines a new Service Type, an important aspect is to define the expected
usage of physical resources. In particular, the management of Resource Sharing attribute
introduced at EVC level. This parameter defines the global policy, in terms of
privacy/sharing of UNI (Edge Ports) and Transport Links.
To manage the issue related to Shared or Dedicated Transport Link usage, the Resource
Sharing attribute at EVC Level can assume following values.
• Full: the EVC Service under definition can use every resource without any restriction.
• Private UNI: the EVC Service under definition must use Private UNI, that is UNI
uniquely used by that EVC Service.
• Private Link: The EVC Service under definition must use Private Links, that is
Transport Links uniquely used by that EVC Service.
• Private UNI and LINK: The EVC Service under definition must use Private UNI and
Private Links, that is chosen Transport Links and UNIs are uniquely used by that EVC
Service.

Resource Sharing
The following table reports the possible choices of Resource Sharing respect to Service
Type and respect to crossed technological domain.

Service Type. Resource Sharing.


Full. Private UNI. Private Link. Private UNI and Link.
UNKNOWN.
EVPL. ETS.
Provider Bridge.
EPTL. ETS.
EPL. ETS.
Provider
Bridge.
EVPLAN. ETS. ETS.
Provider Bridge. Provider
Bridge.
Extended EVPL. ETS. ETS. ETS. ETS.
Provider Bridge. Provider Provider Provider Bridge.
Bridge. Bridge.
Extended ETS. ETS. ETS. ETS.
EVPLAN. Provider Bridge. Provider Provider Provider Bridge.
Bridge. Bridge.

....................................................................................................................................................................................................................................
1350 OMS 18-39
8DG42227DAAA 9.6
Issue 3 December 2012
End to End Ethernet Provisioning Management Resource Reservation for Private Services
Managing ETS Ethernet Virtual Connections (EVC)
....................................................................................................................................................................................................................................

Service Type. Resource Sharing.


HSI. ETS.
Provider Bridge.
BTV. ETS.
Provider Bridge.
BROADCAST. ETS. ETS.

Connection Oriented Service Type relations

Table 18-1 Connection Oriented Service Type relations

Service Type. Type. Traffic Type. Resource Sharing.


EVPL. Point-to-Point. Unicast. Full.
EPTL. Point-to-Point. Unicast. Private UNI and Link.
EPL. Point-to-Point. Unicast. Private UNI.
EVPLAN. Any-to-Any. Unicast. Full.
Private UNI.
Private UNI and Link.
1
.
Extended EVPL. Point-to-Point. Unicast. Full.
Private UNI.
Private UNI and Link.
1
.
Extended Any-to-Any. Unicast. Full.
EVPLAN. Rooted Multicast. Private UNI.
Multipoint. Private UNI and Link.
1
. 1
.
HSI. Rooted Unicast. Full.
Multipoint. Multicast.
1
.
BTV. Rooted Unicast. Full.
Multipoint. Multicast.
1
.
Broadcast. Rooted Unicast. Full.
Multipoint. Private UNI.
Private UNI and Link.
1
.

....................................................................................................................................................................................................................................
18-40 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
End to End Ethernet Provisioning Management Resource Reservation for Private Services
Managing ETS Ethernet Virtual Connections (EVC)
....................................................................................................................................................................................................................................
Notes:
1. This case allows a selection of the parameters.

Frame delivery
Frame delivery types are the following:
• Unicast Service Frame Delivery: MAC ACL configuration on Edge Ports can
influence the behavior. It verifies if the MAC ACL can be used to filter all unicast
address. For Connection Oriented EVCs transporting Unicast frames, the default
value is assumed always equal to Deliver Unconditionally. For Connection Less
EVCs, the default value is Deliver Conditionally (depending on filtering set on UNI).
The default value is modifiable and it does not affect real traffic due to the fact that
MAC ACL is not known to 1350 OMS PKT. The MAC ACL is managed through
Navigation, The full compliancy is in the user hands.
• Multicast Service Frame Delivery: MAC ACL configuration on Edge Ports can
influence the behavior. It must be verified if the MAC ACL can be used to filter all
multicast address. For Connection Oriented EVCs transporting Multicast Frames, the
default value is assumed always equal to Deliver Unconditionally. For Connection
Less EVCs or when IGMP is used, the default value is Deliver Conditionally
(depending on filtering set on UNI). The MAC ACL is managed through Navigation.
The full compliancy is in the user hands.
• Broadcast Service Frame Delivery: MAC ACL configuration on Edge Ports can
influence the behavior. It must be verified if the MAC ACL can be used to filter all
broadcast address. For Connection Oriented EVCs, the default value is assumed
always equal to Deliver Unconditionally. For Connection Less EVCs, the default
value is Conditional (depending on filtering set on UNI). The MAC ACL is managed
through Navigation. The full compliancy is in the user hands.

C-VLAN and CoS Preservation


C-VLAN and CoS Preservation:
• C-VLAN Preservation ensures that each packet exiting the EVC has the same VLAN
Id information that it had when it entered the EVC.
The following relation is respected: VLAN Id Egress UNI = VLAN IdIngress UNI.
C-VLAN Preservation attribute must be defined at EVC definition and is modifiable
before EVC allocation.
• C-VLAN CoS Preservation ensures that each packet exiting the EVC has the same
Priority Bits information that it had when it entered the EVC.
The following relation is respected: Priority Bit at ingress = Priority Bit at egress .

....................................................................................................................................................................................................................................
1350 OMS 18-41
8DG42227DAAA 9.6
Issue 3 December 2012
End to End Ethernet Provisioning Management Display the list of Connection Oriented EVC
Managing ETS Ethernet Virtual Connections (EVC)
....................................................................................................................................................................................................................................

Display the list of Connection Oriented EVC


When to use
The Ethernet Virtual Connection List window presents all the EVCs and their attributes.

Related Information
This list can be required also from the Ethernet Service List, from the Ethernet Segment
List, or from the Ethernet Transport Link List. In These cases, only the EVCs associated
to the selected object are displayed.
For more information about EVC, refer to “EVC description” (p. 18-37).

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.

Task
From the MS-GUIMain view:
...................................................................................................................................................................................................

1 Select Search > Packet > Services.


Result: The menu of the Services is shown.
...................................................................................................................................................................................................

2 Select ConnectionOriented > ETS EVCs.


Result: The list window is displayed.
See the following topic in this document: “Description of the list of EVCs” (p. 18-43)
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
18-42 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
End to End Ethernet Provisioning Management Description of the list of EVCs
Managing ETS Ethernet Virtual Connections (EVC)
....................................................................................................................................................................................................................................

Description of the list of EVCs


Attributes of a EVC
The attributes displayed for each EVC are:
• User Label.
• Ethernet Service User Label.
• Type (Point to point, Routed multi-point, Any to any).
• Traffic Type (Unicast, Multicast).
• Working State (Normal, Configuring, Allocating, De-allocating, Implementing,
De-implementing, Commissioning, De-commissioning, Termination adding,
Termination removing, Constraint adding, Constraint removing, removing).
• Provisioning State (Defined, Partially allocated, Allocated, Partially implemented,
Implemented, Commissioned).
• Service State (Not in Service, In Service).
• Availability Status (Normal, Degraded, In Failure, Not Meaningful).

....................................................................................................................................................................................................................................
1350 OMS 18-43
8DG42227DAAA 9.6
Issue 3 December 2012
End to End Ethernet Provisioning Management Create a Connection Oriented EVC
Managing ETS Ethernet Virtual Connections (EVC)
....................................................................................................................................................................................................................................

Create a Connection Oriented EVC


When to use
This function allows creating a Connection Oriented Ethernet Virtual Connection.

Related Information
For more information about EVC, refer to “EVC description” (p. 18-37).
If the EVC Creation window is required from the Service List, the Ethernet Service field
is filled with the selected value.
When no Ethernet Service reference is supplied a dummy service is created.

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Conditions
To get a positive result:
• The User Label must be not in use.
• Only one Root termination is authorized.
• The EVC Type must be compatible with the service type of the associated Ethernet
Service.
• The EVC Type must be compatible with the selected Traffic Type.
• The role of each EVC termination must be compatible with the EVC Type.

Task
From the MS-GUI Main menu:
...................................................................................................................................................................................................

1 Select Action > Packet > Services > ConnectionOriented > Create EVC.
Result: The EVC Creation window is displayed.
...................................................................................................................................................................................................

2 On the General Panel insert following data:


• Enter an EVC User Label.
• Insert the Ethernet Service.

....................................................................................................................................................................................................................................
18-44 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
End to End Ethernet Provisioning Management Create a Connection Oriented EVC
Managing ETS Ethernet Virtual Connections (EVC)
....................................................................................................................................................................................................................................
Two different choices are possible:
– Choose an already created Ethernet Service selecting it from the available list.
The list is displayed clicking in the field. If this window is required from the
Service List, this field is automatically filled.
– Choose a Service Type (EVPL, EPTL, EPL, EVPLAN, Extended EVPL, Extended
EVPLAN, HSI, BTV, Broadcast).
• The parameters: Type, Traffic Type, and Resource Sharing are assigned according to
the chosen Service Type as indicated in: Table 18-1, “Connection Oriented Service
Type relations ” (p. 18-40).
Execute the following steps:
– Select a Service Level (Premium, Gold, Silver, Bronze).
– Resource Sharing: (Full, Private UNI, Private Link, Private UNI and LINK).
See: “Overview” (p. 18-39).
• C-VLAN Preservation: check it to keep the VLAN Id through the EVC.
(see: “C-VLAN and CoS Preservation” (p. 18-41)).
• C-VLAN CoS Preservation: check it to keep the Priority Bits through the EVC.
(see: “C-VLAN and CoS Preservation” (p. 18-41)).
• Enter a NAD value for the EVC.
• Enter a Comment (optional).
• Enter an External Mark (optional). It can be used to identify external systems having
relations with the EVC (for example an ownership).
...................................................................................................................................................................................................

3 On the Detail Panel.


Set the Frame Delivery:
• Select the Frame Delivery parameters (see “Frame delivery” (p. 18-41))
– Unicast Service Frame Delivery.
– Multicast Service Frame Delivery.
– Broadcast Service Frame Delivery.
• Select the standard Vlan Type (8100).
...................................................................................................................................................................................................

4 On PM Panel.
Select the following parameters
• Under PM: select True if the Performance Monitoring is applied on the EVC, if true is
selected the following parameters are activated.
• Granularity: select the required type of granularity (15 min, 1 h, 24 h, Not
Meaningful).
• Report Output Type: select the desired output type (No Report, CSV Delta, CSV Raw,
Performance Counter Tabular, Performance Counter Graphical, Delta Counter
Tabular, Delta Counter Graphical, Not Meaningful).

....................................................................................................................................................................................................................................
1350 OMS 18-45
8DG42227DAAA 9.6
Issue 3 December 2012
End to End Ethernet Provisioning Management Create a Connection Oriented EVC
Managing ETS Ethernet Virtual Connections (EVC)
....................................................................................................................................................................................................................................
• Report Output Frequency: select the desired frequency for the output report (15
min, 1 h, 24 h, 1 Week, 1 Month, 1 Year, Not Meaningful).
• Report Output Name: type a significant name for the output report.
• Policy: select the policy for the output report management (Keep, Purge on Stop,
Purge on Delete, Not Meaningful).

E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
18-46 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
End to End Ethernet Provisioning Management Modify an ETS EVC
Managing ETS Ethernet Virtual Connections (EVC)
....................................................................................................................................................................................................................................

Modify an ETS EVC


When to use
The function modifies EVC characteristics.

Related Information
For more information about EVC, refer to “EVC description” (p. 18-37).
The EVC modification function allow the user to modify:
• EVC User Label.
• C-VLAN Preservation (Yes/No).
• C-VLAN CoS Preservation (Yes/No).
• NAD Value.
• Comment.
• External Mark.

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Conditions
To get a positive result:
• If the User Label is modified, the new User Label must be different from other
already used by another EVC.

Task
From the MS-GUI Main menu:
...................................................................................................................................................................................................

1 Select Search > Packet > Services > Connection Oriented (ETS) > ETS EVCs.
...................................................................................................................................................................................................

2 Select the EVC to modify in the list.


...................................................................................................................................................................................................

3 Click the right mouse button and select from the popup menu Modify.

....................................................................................................................................................................................................................................
1350 OMS 18-47
8DG42227DAAA 9.6
Issue 3 December 2012
End to End Ethernet Provisioning Management Modify an ETS EVC
Managing ETS Ethernet Virtual Connections (EVC)
....................................................................................................................................................................................................................................
Result: The EVC modification window is displayed.

Figure 18-5 EVC Modification window

...................................................................................................................................................................................................

4 On the modification window to modify an EVC.


Following parameters can be modified:
• Enter a new User Label (optional).
• C-VLAN Preservation: check it to keep the VLAN Id through the EVC.
(see: “C-VLAN and CoS Preservation” (p. 18-41)).
• C-VLAN CoS Preservation: check it to keep the Priority Bits through the EVC.
(see: “C-VLAN and CoS Preservation” (p. 18-41)).
• Modify the NAD Value.
• Modify the Comment (optional).
• Modify the External Mark (optional).
Then, the EVC list, and the opened graphical views are updated.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
18-48 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
End to End Ethernet Provisioning Management Delete an ETS EVC
Managing ETS Ethernet Virtual Connections (EVC)
....................................................................................................................................................................................................................................

Delete an ETS EVC


When to use
This function allows deleting an ETS EVC from the 1350 OMS PKT supervision.

Related Information
For more information about EVC, refer to “EVC description” (p. 18-37).

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Conditions
To get a positive result:
• The provisioning state of the EVC must be defined.
• No operation is pending on the EVC.
• No Ethernet Segment is referring the EVC.

Task
From the MS-GUI Main menu:
...................................................................................................................................................................................................

1 Select Search > Packet > Services > Connection Oriented (ETS) > ETS EVCs.
...................................................................................................................................................................................................

2 Select the element to delete in the list.


...................................................................................................................................................................................................

3 Click the right mouse button and select from the popup menu Action from ETS EVC >
Delete.
Result: A confirmation box is displayed.
...................................................................................................................................................................................................

4 Confirm the deletion operation.


After confirmation:
• the 1350 OMS PKT checks that no Ethernet Segment is referring the EVCs.
• the EVCs are dissociated from the related service (if no more EVC are associated to
the service, the service is also removed).
• the EVCs are removed.

....................................................................................................................................................................................................................................
1350 OMS 18-49
8DG42227DAAA 9.6
Issue 3 December 2012
End to End Ethernet Provisioning Management Delete an ETS EVC
Managing ETS Ethernet Virtual Connections (EVC)
....................................................................................................................................................................................................................................
The EVC list, and the opened graphical views are updated.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
18-50 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
End to End Ethernet Provisioning Management Get the EVC properties
Managing ETS Ethernet Virtual Connections (EVC)
....................................................................................................................................................................................................................................

Get the EVC properties


When to use
This function gets information about an Ethernet Virtual Connection.

Related Information
For more information about EVC, refer to “EVC description” (p. 18-37).

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.

Task
From the MS-GUI Main menu:
...................................................................................................................................................................................................

1 Select Search > Packet > Services > Connection Oriented (ETS) > ETS EVCs.
...................................................................................................................................................................................................

2 Select an element in the list.


...................................................................................................................................................................................................

3 Click the right mouse button and select from the popup menu Properties.

....................................................................................................................................................................................................................................
1350 OMS 18-51
8DG42227DAAA 9.6
Issue 3 December 2012
End to End Ethernet Provisioning Management Get the EVC properties
Managing ETS Ethernet Virtual Connections (EVC)
....................................................................................................................................................................................................................................
Result: The EVC properties window is displayed.
See the following topic in this document: “Details of a EVC” (p. 18-53)

Figure 18-6 EVC Properties window

E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
18-52 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
End to End Ethernet Provisioning Management Details of a EVC
Managing ETS Ethernet Virtual Connections (EVC)
....................................................................................................................................................................................................................................

Details of a EVC
Attributes of an EVC
The attributes displayed for each EVC are:
• Id.
• User Label.
• Service Id Label.
• Ethernet Service User Label.
• Type (Point to point, Routed multi-point, Any to any).
• Traffic Type (Unicast, Multicast).
• Directionality.
• Service Level.
• Comment.
• External Mark.
• Action Type.
• Action Date.
• Working State (Normal, Configuring, Allocating, De-allocating, Implementing,
De-implementing, Commissioning, De-commissioning, Termination adding,
Termination removing, Constraint adding, Constraint removing, removing).
• Provisioning State (Defined, Partially allocated, Allocated, Partially implemented,
Implemented, Commissioned).
• Service State (Not in Service, In Service).
• Availability Status (Normal, Degraded, In Failure, Not Meaningful).
• ETS Id Label.
• ETS LABEL label.
• Vlan Type.
• Resource sharing.
• Domain Id.
• Domain.
• VLAN distribution.
• S-VLAN Id.

....................................................................................................................................................................................................................................
1350 OMS 18-53
8DG42227DAAA 9.6
Issue 3 December 2012
End to End Ethernet Provisioning Management Allocate ETS EVC
Managing ETS Ethernet Virtual Connections (EVC)
....................................................................................................................................................................................................................................

Allocate ETS EVC


When to use
This function allocates a Connection Oriented EVC.

Related Information
For more information about EVC, refer to “EVC description” (p. 18-37).

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.

Task
From the MS-GUI Main view:
...................................................................................................................................................................................................

1 Follow the menu path Search > Packet > Services > Connection Oriented (ETS) > ETS
EVCs.
Result: The ETS EVC list is displayed.
...................................................................................................................................................................................................

2 Select the EVC in the list and follow the path Action > ETS EVC > Allocate.
Result: The confirmation box is displayed.
...................................................................................................................................................................................................

3 Select one of the options in the confirmation box. Refer to the procedure “Confirm the
action” (p. 11-40).
Result: The EVC is allocated.
The EVC list, the tree area, and the opened graphical views are updated.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
18-54 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
End to End Ethernet Provisioning Management Deallocate ETS EVC
Managing ETS Ethernet Virtual Connections (EVC)
....................................................................................................................................................................................................................................

Deallocate ETS EVC


When to use
This function deallocates a Connection Oriented EVC.

Related Information
For more information about EVC, refer to “EVC description” (p. 18-37).

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.

Task
From the MS-GUI Main view:
...................................................................................................................................................................................................

1 Follow the menu path Search > Packet > Services > Connection Oriented (ETS) > ETS
EVCs.
Result: The ETS EVC list is displayed.
...................................................................................................................................................................................................

2 Select the EVC in the list and follow the path Action > ETS EVC > Deallocate.
Result: The confirmation window is displayed.
...................................................................................................................................................................................................

3 Select one of the options in the confirmation box. Refer to the procedure “Confirm the
action” (p. 11-40).
Result: The EVC is deallocated.
The EVC list, the tree area, and the opened graphical views are updated.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS 18-55
8DG42227DAAA 9.6
Issue 3 December 2012
End to End Ethernet Provisioning Management Implement ETS EVC
Managing ETS Ethernet Virtual Connections (EVC)
....................................................................................................................................................................................................................................

Implement ETS EVC


When to use
This function implements a Connection Oriented EVC.

Related Information
For more information about EVC, refer to “EVC description” (p. 18-37).

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.

Task
From the MS-GUI Main view:
...................................................................................................................................................................................................

1 Follow the menu path Search > Packet > Services > Connection Oriented (ETS) > ETS
EVCs.
Result: The ETS EVC list is displayed.
...................................................................................................................................................................................................

2 Select the EVC in the list and follow the path Action > ETS EVC > Implement.
Result: The confirmation box is displayed.
...................................................................................................................................................................................................

3 Select one of the options in the confirmation box. Refer to the procedure “Confirm the
action” (p. 11-40).
Result: The EVC is Implemented.
The EVC list, the tree area, and the opened graphical views are updated.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
18-56 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
End to End Ethernet Provisioning Management Deimplement ETS EVC
Managing ETS Ethernet Virtual Connections (EVC)
....................................................................................................................................................................................................................................

Deimplement ETS EVC


When to use
This function deimplements a Connection Oriented EVC.

Related Information
For more information about EVC, refer to “EVC description” (p. 18-37).

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.

Task
From the MS-GUI Main view:
...................................................................................................................................................................................................

1 Follow the menu path Search > Packet > Services > Connection Oriented (ETS) > ETS
EVCs.
Result: The ETS EVC list is displayed.
...................................................................................................................................................................................................

2 Select the EVC in the list and follow the path Action > ETS EVC > Deimplement.
Result: The confirmation window is displayed.
...................................................................................................................................................................................................

3 Select one of the options in the confirmation box. Refer to the procedure “Confirm the
action” (p. 11-40).
Result: The EVC is deallocated.
The EVC list, the tree area, and the opened graphical views are updated.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS 18-57
8DG42227DAAA 9.6
Issue 3 December 2012
End to End Ethernet Provisioning Management Commission ETS EVC
Managing ETS Ethernet Virtual Connections (EVC)
....................................................................................................................................................................................................................................

Commission ETS EVC


When to use
This function commissions a Connection Oriented EVC.

Related Information
For more information about EVC, refer to “EVC description” (p. 18-37).

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.

Task
From the MS-GUI Main view:
...................................................................................................................................................................................................

1 Follow the menu path Search > Packet > Services > Connection Oriented (ETS) > ETS
EVCs.
Result: The ETS EVC list is displayed.
...................................................................................................................................................................................................

2 Select the EVC in the list and follow the path Action > ETS EVC > Commission.
Result: The confirmation box is displayed.
...................................................................................................................................................................................................

3 Select one of the options in the confirmation box. Refer to the procedure “Confirm the
action” (p. 11-40).
Result: The EVC is commissioned.
The EVC list, the tree area, and the opened graphical views are updated.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
18-58 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
End to End Ethernet Provisioning Management Decommission ETS EVC
Managing ETS Ethernet Virtual Connections (EVC)
....................................................................................................................................................................................................................................

Decommission ETS EVC


When to use
This function decommissions a Connection Oriented EVC.

Related Information
For more information about EVC, refer to “EVC description” (p. 18-37).

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.

Task
From the MS-GUI Main view:
...................................................................................................................................................................................................

1 Follow the menu path Search > Packet > Services > Connection Oriented (ETS) > ETS
EVCs.
Result: The ETS EVC list is displayed.
...................................................................................................................................................................................................

2 Select the EVC in the list and follow the path Action > ETS EVC > Decommission.
Result: The confirmation window is displayed.
...................................................................................................................................................................................................

3 Select one of the options in the confirmation box. Refer to the procedure “Confirm the
action” (p. 11-40).
Result: The EVC is decommissioned.
The EVC list, the tree area, and the opened graphical views are updated.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS 18-59
8DG42227DAAA 9.6
Issue 3 December 2012
End to End Ethernet Provisioning Management List the EVC terminations
Managing ETS Ethernet Virtual Connections (EVC)
....................................................................................................................................................................................................................................

List the EVC terminations


When to use
The EVC Termination List window presents all the terminations of the selected EVC and
their attributes.

Related Information
If this list is required from the Ethernet Service List or from the EVC List, only the EVC
terminations associated to the selected item are displayed.
For more information about EVC, refer to “EVC description” (p. 18-37).

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.

Task
From the MS-GUI Main menu:
...................................................................................................................................................................................................

1 Select Search > Packet > Services > Connection Oriented (ETS) > ETS EVCs.
...................................................................................................................................................................................................

2 Select the EVC to modify in the list.


...................................................................................................................................................................................................

3 Select Search > Inventory from ETS EVC > List EVC Terminations.
Result: The list of the EVC terminations is displayed.
See the following topic in this document: “Description of the list of terminations”
(p. 18-61)
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
18-60 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
End to End Ethernet Provisioning Management Description of the list of terminations
Managing ETS Ethernet Virtual Connections (EVC)
....................................................................................................................................................................................................................................

Description of the list of terminations


Attributes of a termination
The attributes displayed for each EVC termination are:
• EVC Termination User Label.
• Rate.
• Network Element.
• EVC User Label.
• Role (Root, Leaf, Both).
• Usage State.
• Ethernet Service.
• VLAN Type.

....................................................................................................................................................................................................................................
1350 OMS 18-61
8DG42227DAAA 9.6
Issue 3 December 2012
End to End Ethernet Provisioning Management Delete an EVC Termination
Managing ETS Ethernet Virtual Connections (EVC)
....................................................................................................................................................................................................................................

Delete an EVC Termination


When to use
This function allows deleting an ETS EVC termination from the 1350 OMS PKT
supervision.

Related Information
For more information about EVC, refer to “EVC description” (p. 18-37).

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Conditions
To get a positive result:
• The specified EVC termination is not used as Ethernet Segment extremity.
• No operation is pending on the selected EVC termination.

Task
From the MS-GUI Main menu:
...................................................................................................................................................................................................

1 Select Search > Packet > Services > Connection Oriented (ETS) > ETS EVCs.
...................................................................................................................................................................................................

2 Select the element to delete in the list.


...................................................................................................................................................................................................

3 Click the right mouse button and select from the popup menu Action from ETS EVC
Termination > Delete.
Result: A confirmation box is displayed.
...................................................................................................................................................................................................

4 Confirm the deletion operation.


After confirmation:
• the EVC terminations are dissociated from the related EVC.
• the EVC terminations are removed.
The EVC Termination list is updated.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
18-62 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
End to End Ethernet Provisioning Management Get the EVC termination properties
Managing ETS Ethernet Virtual Connections (EVC)
....................................................................................................................................................................................................................................

Get the EVC termination properties


When to use
This function shows all the termination attributes.

Related Information
For more information about EVC, refer to “EVC description” (p. 18-37).

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.

Task
From the MS-GUI Main menu:
...................................................................................................................................................................................................

1 Select Search > Packet > Services > Connection Oriented (ETS) > ETS EVCs.
...................................................................................................................................................................................................

2 Select the EVC in the list.


...................................................................................................................................................................................................

3 Follow the menu path Search > Inventory from ETS EVC > List EVC Terminations.
...................................................................................................................................................................................................

4 Select the termination in the list.


...................................................................................................................................................................................................

5 Click the right mouse button and select from the popup menu Properties.

....................................................................................................................................................................................................................................
1350 OMS 18-63
8DG42227DAAA 9.6
Issue 3 December 2012
End to End Ethernet Provisioning Management Get the EVC termination properties
Managing ETS Ethernet Virtual Connections (EVC)
....................................................................................................................................................................................................................................
Result: The properties window is displayed.
See the following topic in this document: “Details of a Termination” (p. 18-65)

Figure 18-7 EVC Termination Properties window

E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
18-64 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
End to End Ethernet Provisioning Management Details of a Termination
Managing ETS Ethernet Virtual Connections (EVC)
....................................................................................................................................................................................................................................

Details of a Termination
Attributes of a Termination
The attributes displayed for each EVC termination are:
• EVC Termination User Label.
• Rate.
• Network Element.
• EVC User Label.
• Role (Root, Leaf, Both).
• Usage State.
• Ethernet Service.
• VLAN Type.

....................................................................................................................................................................................................................................
1350 OMS 18-65
8DG42227DAAA 9.6
Issue 3 December 2012
End to End Ethernet Provisioning Management Add an EVC termination
Managing ETS Ethernet Virtual Connections (EVC)
....................................................................................................................................................................................................................................

Add an EVC termination


When to use
This function add a termination to an EVC.

Related Information
In case of Connection Oriented EVCs, the bandwidth profiles defined for each EVC
termination have to be intended in the following way:
• It represents the bandwidth profile for the traffic at "ingress" of that UNI (Profile is
immediately checked).
• It must be reflected to the corresponding Ethernet Segments (that is to the Ethernet
Segment starting from that UNI).
The affects along the Ethernet Segment route is evaluated at Ethernet Segment allocation.
This function consists in adding a new termination to an existing EVC.
For more information about EVC, refer to “EVC description” (p. 18-37).

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Conditions
To get a positive result:
• No operation is pending on the selected EVC.
• The EVC provisioning state must be set to Defined.
• EVC Termination Role must be congruent with the EVC topology.
• Only one termination can have "Root" role.

Task
From the MS-GUI Main menu:
...................................................................................................................................................................................................

1 Select Search > Packet > Services > Connection Oriented (ETS) > ETS EVCs.
...................................................................................................................................................................................................

2 Select the EVC in the list.


...................................................................................................................................................................................................

3 Follow the menu path Action > ETS EVC > Add Connection Oriented EVC Termination.

....................................................................................................................................................................................................................................
18-66 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
End to End Ethernet Provisioning Management Add an EVC termination
Managing ETS Ethernet Virtual Connections (EVC)
....................................................................................................................................................................................................................................
Result: The add termination window is displayed.

Figure 18-8 Add EVC Termination window

...................................................................................................................................................................................................

4 To add a termination:
• Select a NE or ENE by using sensitive help.
• Select an Edge Port by using sensitive help.
• Select the termination Role (Root, Leaf, Both).
...................................................................................................................................................................................................

5 Click Ok button.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS 18-67
8DG42227DAAA 9.6
Issue 3 December 2012
End to End Ethernet Provisioning Management EVC Fault Localization
Managing ETS Ethernet Virtual Connections (EVC)
....................................................................................................................................................................................................................................

EVC Fault Localization


When to use
This function displays the localization of the fault present for the selected EVC.

Related Information
This function is active when EVC or Ethernet Segment associated are implemented.
For more information about EVC, refer to “EVC description” (p. 18-37).
For details about Fault Localization, see: “Fault Localization” (p. 11-69).

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.

Task
From the MS-GUI Main menu:
...................................................................................................................................................................................................

1 Select Search > Packet > Services > Connection Oriented (ETS) > ETS EVCs.
...................................................................................................................................................................................................

2 Select the EVC and issue Search > Fault Localization.


Result: The list window is displayed.
See the following topic in this document: “Description of the list of Fault
Localization” (p. 18-69)
The list is not refreshed automatically, click Actualize button to refresh it.
...................................................................................................................................................................................................

3 Selecting an item in the Fault Localization list, using the popup menu the user visualize
the alarm list of the selected item.
Select one EVC in the list and click Search > External Navigation to > AS .
Result: The Fault Management window is displayed with selected EVC alarm list.
See the following topic in this document: “Description of the list of Alarms”
(p. 18-70)
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
18-68 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
End to End Ethernet Provisioning Management Description of the list of Fault Localization
Managing ETS Ethernet Virtual Connections (EVC)
....................................................................................................................................................................................................................................

Description of the list of Fault Localization


Attributes of a Fault Localization
The Fault Localization window displays:
• The User Label of the alarmed entity.
• The Entity Type of the alarmed entity.
• The Network Element (if any) of the alarmed entity.
• The Alarm Status.
• The Event Date.
• The Operator Label (if any).
Note: The list is not refreshed automatically, click Actualize button to refresh it.

....................................................................................................................................................................................................................................
1350 OMS 18-69
8DG42227DAAA 9.6
Issue 3 December 2012
End to End Ethernet Provisioning Management Description of the list of Alarms
Managing ETS Ethernet Virtual Connections (EVC)
....................................................................................................................................................................................................................................

Description of the list of Alarms


Attributes of an Alarm
The alarm list window displays:
• The Perceived Severity.
• The Event Date & Time.
• The Friendly Name.
• The Alarm Type.
• The Probable Cause.

....................................................................................................................................................................................................................................
18-70 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
End to End Ethernet Provisioning Management Start PM on an EVC
Managing ETS Ethernet Virtual Connections (EVC)
....................................................................................................................................................................................................................................

Start PM on an EVC
When to use
This function starts Performance Monitoring (PM) on a Connection Oriented EVC or
Connection Less EVC.

Related Information
For more information about EVC, refer to “EVC description” (p. 18-37).
For more information about PM, refer to “Quality of service: PM management ”
(p. 11-69).

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.

Task
From the MS-GUI Main view:
...................................................................................................................................................................................................

1 Select Search > Packet > Services.


Result: The Service menu is shown.
...................................................................................................................................................................................................

2 Select Connection Oriented (ETS) > ETS EVCs or Connection Less (Bridge) > Bridge
EVCs.
Result: The EVC list is displayed.
...................................................................................................................................................................................................

3 Select the EVC in the list and follow the path Action > EVC > Start PM.
Result: The PM is started on the EVC.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS 18-71
8DG42227DAAA 9.6
Issue 3 December 2012
End to End Ethernet Provisioning Management Stop PM on an EVC
Managing ETS Ethernet Virtual Connections (EVC)
....................................................................................................................................................................................................................................

Stop PM on an EVC
When to use
This function Stops Performance Monitoring (PM) on a Connection Oriented EVC or
Connection Less EVC.

Related Information
For more information about EVC, refer to “EVC description” (p. 18-37).
For more information about PM, refer to “Quality of service: PM management ”
(p. 11-69).

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.

Task
From the MS-GUI Main view:
...................................................................................................................................................................................................

1 Select Search > Packet > Services.


Result: The Service menu is shown.
...................................................................................................................................................................................................

2 Select Connection Oriented (ETS) > ETS EVCs or Connection Less (Bridge) > Bridge
EVCs.
Result: The EVC list is displayed.
...................................................................................................................................................................................................

3 Select the EVC in the list and follow the path Action > EVC > Stop PM.
Result: The PM is Stopped on the EVC.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
18-72 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
End to End Ethernet Provisioning Management Synchronize PM on an EVC
Managing ETS Ethernet Virtual Connections (EVC)
....................................................................................................................................................................................................................................

Synchronize PM on an EVC
When to use
This function Synchronizes Performance Monitoring (PM) on a Connection Oriented
EVC or Connection Less EVC.

Related Information
For more information about EVC, refer to “EVC description” (p. 18-37).
For more information about PM, refer to “Quality of service: PM management ”
(p. 11-69).

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.

Task
From the MS-GUI Main view:
...................................................................................................................................................................................................

1 Select Search > Packet > Services.


Result: The Service menu is shown.
...................................................................................................................................................................................................

2 Select Connection Oriented (ETS) > ETS EVCs or Connection Less (Bridge) > Bridge
EVCs.
Result: The EVC list is displayed.
...................................................................................................................................................................................................

3 Select the EVC in the list and follow the path Action > EVC > Synchronize PM.
Result: The PM is Synchronized on the EVC.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS 18-73
8DG42227DAAA 9.6
Issue 3 December 2012
End to End Ethernet Provisioning Management Show PM on an EVC
Managing ETS Ethernet Virtual Connections (EVC)
....................................................................................................................................................................................................................................

Show PM on an EVC
When to use
This function Shows Performance Monitoring (PM) on a Connection Oriented EVC or
Connection Less EVC.

Related Information
For more information about EVC, refer to “EVC description” (p. 18-37).
For more information about PM, refer to “Quality of service: PM management ”
(p. 11-69).

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.

Task
From the MS-GUI Main view:
...................................................................................................................................................................................................

1 Select Search > Packet > Services.


Result: The Service menu is shown.
...................................................................................................................................................................................................

2 Select Connection Oriented (ETS) > ETS EVCs or Connection Less (Bridge) > Bridge
EVCs.
Result: The EVC list is displayed.
...................................................................................................................................................................................................

3 Select the EVC in the list and follow the path Search > EVC > Show > PM.
Result: The PM related to the EVC is shown.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
18-74 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
End to End Ethernet Provisioning Management View the Routing Display on an EVC
Managing ETS Ethernet Virtual Connections (EVC)
....................................................................................................................................................................................................................................

View the Routing Display on an EVC


When to use
This function starts Routing Display on a Connection Oriented EVC or Connection Less
EVC.

Related Information
For more information about EVC, refer to “EVC description” (p. 18-37).

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.

Task
From the MS-GUI Main view:
...................................................................................................................................................................................................

1 Select Search > Packet > Services.


Result: The Service menu is shown.
...................................................................................................................................................................................................

2 Select Connection Oriented (ETS) > ETS EVCs or Connection Less (Bridge) > Bridge
EVCs.
Result: The EVC list is displayed.
...................................................................................................................................................................................................

3 Select the EVC in the list and follow the path Search > EVC > Routing Display.
Result: The Routing Display is started on the EVC.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS 18-75
8DG42227DAAA 9.6
Issue 3 December 2012
End to End Ethernet Provisioning Management Overview about E2E Ethernet Virtual Connections
Managing End-to-End Ethernet Virtual Connections (E2E
EVC)
....................................................................................................................................................................................................................................

Managing End-to-End Ethernet Virtual Connections


(E2E EVC)

Overview about E2E Ethernet Virtual Connections


Introduction to End to End EVC connection
The following two modalities can be used in creating an End to End EVC connection:
• bottom-up. This modality requires the separate creation of the EVCs within their
domains, then the user will join the different EVCs.
• top-down. This modality is completely automatic. The user creates the full EVC over
different domains and all relevant commands are forwarded to the subordinate
network.

Managing Extended Ethernet Virtual Connection


Ethernet Virtual Connections (EVC) span over only one domain, ETB or ETS, at a time.
It is possible to create an End-To-End EVC (E2E EVC), crossing one ETB domain and
one ETS domain, which are connected by Inter-Domain-Links.

E2E EVC Categories


The categories of E2E EVCs are:
• “Full E2E EVC ” (p. 18-76)
• “Raw E2E EVC ” (p. 18-76)
Full E2E EVC
Full E2E EVC is a E2E EVC that is created in the top-down way, it is defined by end
points and other EVC parameters, and the fragment EVCs are created then accordingly.
Full E2E EVC must be consistent, its fragment EVCs must match each other and the E2E
EVC itself. If, for any reason, the consistency is not kept, it becomes a raw E2E EVC.
Raw E2E EVC
Raw E2E EVC is an E2E EVC that is created in the bottom-up way, there are fragment
EVCs, which are joined to create the raw E2E EVC. It is used mainly in the Takeover,
having in the network already existing groups of EVCs, which can be joined into E2E
EVCs. Raw E2E EVC does not have to be consistent with its fragment EVCs. Raw E2E
EVC can be created also from a full E2E EVC, which is not consistent any more. If a raw
E2E EVC reaches a level of full consistency, it can become a full E2E EVC.

....................................................................................................................................................................................................................................
18-76 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
End to End Ethernet Provisioning Management Overview about E2E Ethernet Virtual Connections
Managing End-to-End Ethernet Virtual Connections (E2E
EVC)
....................................................................................................................................................................................................................................
EVC Prevented Actions
When an EVC is a part of a Full E2E EVC, any direct modification of its attributes may
affect the E2E EVC it belongs to, and also other fragment EVCs that belong to the same
E2E EVC. Therefore only the EVC attributes User Label, Comment and External Mark
can be modified. The EVC cannot be deleted.
In order to do any of these actions, directly to the EVC, the parent E2E EVC must be
changed to be a Raw E2E EVC, and then all the actions are allowed.

....................................................................................................................................................................................................................................
1350 OMS 18-77
8DG42227DAAA 9.6
Issue 3 December 2012
End to End Ethernet Provisioning Management Display the list of E2E EVC
Managing End-to-End Ethernet Virtual Connections (E2E
EVC)
....................................................................................................................................................................................................................................

Display the list of E2E EVC


When to use
The Ethernet Virtual Connection List window presents all the EVCs and their attributes.

Related Information
This list can be required also from the Ethernet Service List, from the Ethernet Segment
List, or from the Ethernet Transport Link List. In These cases, only the EVCs associated
to the selected object are displayed.
For more information about EVC, refer to “EVC description” (p. 18-37).

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.

Task
From the MS-GUIMain view:
...................................................................................................................................................................................................

1 Select Search > Packet > Services.


Result: The menu of the Services is shown.
...................................................................................................................................................................................................

2 Select E2E EVCs.


Result: The list window is displayed.
See the following topic in this document: “Description of the list of EVCs” (p. 18-79)
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
18-78 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
End to End Ethernet Provisioning Management Description of the list of EVCs
Managing End-to-End Ethernet Virtual Connections (E2E
EVC)
....................................................................................................................................................................................................................................

Description of the list of EVCs


Attributes of an EVC
The attributes displayed for each EVC are:
• User Label.
• Ethernet Service User Label.
• Type (Point to point, Routed multi-point, Any to any).
• Traffic Type (Unicast, Multicast).
• Working State (Normal, Configuring, Allocating, De-allocating, Implementing,
De-implementing, Commissioning, De-commissioning, Termination adding,
Termination removing, Constraint adding, Constraint removing, Removing).
• Provisioning State (Defined, Partially allocated, Allocated, Partially implemented,
Implemented, Commissioned).
• Service State (Not in Service, In Service).
• Availability Status (Normal, Degraded, In Failure, Not Meaningful).

....................................................................................................................................................................................................................................
1350 OMS 18-79
8DG42227DAAA 9.6
Issue 3 December 2012
End to End Ethernet Provisioning Management Create an E2E EVC
Managing End-to-End Ethernet Virtual Connections (E2E
EVC)
....................................................................................................................................................................................................................................

Create an E2E EVC


When to use
This function create an Ethernet Virtual Connection in an end to end way.

Related Information
Related information can be found in “EVC description” (p. 18-37).

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.

Task
From the Multi Service GUI Main view:
...................................................................................................................................................................................................

1 Select Action > Packet > Services > Create E2E EVC.
Result: The Create E2E EVC window is displayed.
...................................................................................................................................................................................................

2 Select the General panel.


Fill the following data:
• Enter an EVC User Label.
• Set the Service associated to the EVC:
To set the service the user can do one of the following steps:
– Choose an existing Ethernet Service by using the sensitive help. If this window
is required from the Service List, this field is automatically filled.
– Choose a Service Type (EVPL, EPTL, EPL, EVPLAN, Extended EVPL, Extended
EVPLAN, HSI, BTV, Broadcast).
According to the choice, Type, Traffic Type, and Resource Sharing are assigned as
indicated in Table 18-1, “Connection Oriented Service Type relations ” (p. 18-40).
• Select a Type (Point to Point, Routed Multipoint, Any to Any (also called Multipoint
to multipoint)). if allowed.
• Select a Traffic Type (Unicast, Multicast), the selection of the parameter depends on
the selected type.
• Select a Resource Sharing (Full, Private UNI, Private Link, Private UNI and LINK).
See “Overview” (p. 18-39).
• Select a Domain Label by using the sensitive help.
....................................................................................................................................................................................................................................
18-80 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
End to End Ethernet Provisioning Management Create an E2E EVC
Managing End-to-End Ethernet Virtual Connections (E2E
EVC)
....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

3 Select the Detail panel.


Fill the following data:
• Enter Vlan Distribution (Full mesh, Not full mesh).
• Enter a Vlan Bundle in the range of the local Vlan.
• Enter s-Vlan Id the range of the VLAN over SDH path, an equal value can go on the
same domain.
• Select the Standard Vlan Type (8100).
• Select the Frame Delivery parameters (see “Frame delivery” (p. 18-41))
– Unicast Service Frame Delivery.
– Multicast Service Frame Delivery.
– Broadcast Service Frame Delivery.
• Select the standard Vlan Type (8100).
• Define IGMP Snooping State (Not Meaningful, Enabled, Disabled).
This option is enabled only for EVPLAN, Extended EVPLAN and BTV EVC types
and can optionally be defined.
The possible values are:
– Enabled: to remind that the IGMP snooping protocol is not used on top of the
created EVC:
enable the IGMP snooping immediately after having implemented the EVC.
disable the IGMP snooping immediately before de-implemented the EVC.
– Disabled: to remind that the IGMP snooping protocol is not used on the created
EVC.
...................................................................................................................................................................................................

4 Select the Layer-2 Control Protocol panel.


Fill the following data:
• To set all the fields in the form with the same value at once:
Select Put entire set to and choose one of the following values:
– Default: all the set is put to Tunnel.
– Not Meaningful: all the set is put to Not Meaningful.
– Free: every value can be different.
• Set the Data Frames.
• Set the Customer BPDU.
• Set the Provider BPDU.
• Set the Slow Protocols.
• Set the 802.1X PAE.
• Set the Provider GVRP.
• Set the Bridge Management.
....................................................................................................................................................................................................................................
1350 OMS 18-81
8DG42227DAAA 9.6
Issue 3 December 2012
End to End Ethernet Provisioning Management Create an E2E EVC
Managing End-to-End Ethernet Virtual Connections (E2E
EVC)
....................................................................................................................................................................................................................................
• Set the Customer GMRP.
• Set the Customer GVRP.
User chooses which control Protocol must be tunneled or discarded. The
configuration is propagated to all EVC terminations to ensure that all EVC
terminations use the same Tunneling criteria. A check is needed also toward Layer-2
Control Protocol Processing defined at UNI level. This check allows a congruent
management of Control protocols crossing the EVC.
The single L2 protocol can have different values. User can select a value for each
protocol between Tunnel, Not Meaningful and Discard.
...................................................................................................................................................................................................

5 Select the PM panel.


Fill the following data:
• Select Under PM (True, False).
• Choose the Granularity.
• Choose the Report Output Type.
• Choose the Report Output Frequency.
• Set the Report Output Name.
• Choose the Policy.
...................................................................................................................................................................................................

6 Select the Miscellaneous panel.


Fill the following data:
• Select a Service Level (Premium, Gold, Silver, Bronze).
• C-VLAN Preservation: check it to keep the VLAN Id through the EVC.
(see: “C-VLAN and CoS Preservation” (p. 18-41)).
• C-VLAN CoS Preservation: check it to keep the Priority Bits through the EVC.
(see: “C-VLAN and CoS Preservation” (p. 18-41)).
• NAD: select a NAD value from the list.
• Enter an External Mark (optional). It can be used to identify external systems having
relations with the EVC (for example an ownership).
• Enter Comment (optional).
...................................................................................................................................................................................................

7 Click Next to set the EVC terminations.


...................................................................................................................................................................................................

8 Click Next to define the EVC.


...................................................................................................................................................................................................

9 Click Ok.

....................................................................................................................................................................................................................................
18-82 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
End to End Ethernet Provisioning Management Create an E2E EVC
Managing End-to-End Ethernet Virtual Connections (E2E
EVC)
....................................................................................................................................................................................................................................
Result: A check is performed. If the check succeeded, the EVC is created.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS 18-83
8DG42227DAAA 9.6
Issue 3 December 2012
End to End Ethernet Provisioning Management Create a full E2E EVC
Managing End-to-End Ethernet Virtual Connections (E2E
EVC)
....................................................................................................................................................................................................................................

Create a full E2E EVC


When to use
This function consists in creating a full end to end Ethernet Virtual Connection.

Related Information
Related information can be found in “EVC description” (p. 18-37).

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.

Task
From the Multi Service GUI Main view:
...................................................................................................................................................................................................

1 Select Action > Packet > Services > Create Full E2E EVC.
Result: The E2E EVC Full Creation window is displayed.
...................................................................................................................................................................................................

2 Select the General panel.


Fill the following data:
• Enter an EVC User Label.
• Set the Service Type associated to the EVC:
To set the service the user can do one of the following steps:
– Choose an existing Ethernet Service by using the sensitive help. If this window
is required from the Service List, this field is automatically filled.
– Choose a Service Type (EVPL, EPTL, EPL, EVPLAN, Extended EVPL, Extended
EVPLAN, HSI, BTV, Broadcast).
According to the choice, Type, Traffic Type, and Resource Sharing are assigned as
indicated in Table 18-1, “Connection Oriented Service Type relations ” (p. 18-40).
• Select a Type (Point to Point, Routed Multipoint, Any to Any (also called Multipoint
to multipoint)). if allowed.
• Select a Traffic Type (Unicast, Multicast), the selection of the parameter depends on
the selected type.
• Select a Service Level (Premium, Gold, Silver, Bronze).
• Select a Resource Sharing (Full, Private UNI, Private Link, Private UNI and LINK).
See “Overview” (p. 18-39).
....................................................................................................................................................................................................................................
18-84 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
End to End Ethernet Provisioning Management Create a full E2E EVC
Managing End-to-End Ethernet Virtual Connections (E2E
EVC)
....................................................................................................................................................................................................................................
• Select a C-VLAN Preservation to keep the VLAN Id through the EVC.
(see: “C-VLAN and CoS Preservation” (p. 18-41)).
• Select a C-VLAN CoS Preservation to keep the Priority Bits through the EVC.
(see: “C-VLAN and CoS Preservation” (p. 18-41)).
• Select a NAD value from the list.
• Enter an External Mark (optional). It can be used to identify external systems having
relations with the EVC (for example an ownership).
• Enter Comment (optional).
...................................................................................................................................................................................................

3 Select the Detail panel.


Fill the following data:
• Enter the Directionality (Unidirectional, Bidirectional).
• Define the IGMP Snooping State (Not Meaningful, Enabled, Disabled).
• Select the Standard Vlan Type (8100).
• Enter a value for the VLAN Bundle or a range for the parameter.
...................................................................................................................................................................................................

4 Select the Termination panel.


Fill the following data:
• Select the Domain Label by using the sensitive help.
• Select the NE or the ENE user label by using the sensitive help. (The NEs belonging to
the selected domain are listed).
• Select an Edge Port user label by using the sensitive help.
• Select the Role of the termination (Root, Leaf, Both).
• Enter a list of EVC terminations by using Add EVC Termination button.
...................................................................................................................................................................................................

5 Click Ok.
Result: A check is performed. If the check succeeded, the EVC is created. The tree
area and the EVC List are updated.
The EVC is created with the following states: Provisioning State set to Defined,
Working State set to Normal.
A correlation with the Service is created.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS 18-85
8DG42227DAAA 9.6
Issue 3 December 2012
End to End Ethernet Provisioning Management Create a raw E2E EVC
Managing End-to-End Ethernet Virtual Connections (E2E
EVC)
....................................................................................................................................................................................................................................

Create a raw E2E EVC


When to use
This function consists in creating a raw end to end Ethernet Virtual Connection.

Related Information
Related information can be found in “EVC description” (p. 18-37).

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.

Task
From the Multi Service GUI Main view:
...................................................................................................................................................................................................

1 Select Action > Packet > Services > Create Raw E2E EVC.
Result: The E2E EVC Raw Creation window is displayed.
...................................................................................................................................................................................................

2 Fill the following data:


• Enter the EVC User Label.
• Enter Comment (optional).
• Enter an External Mark (optional). It can be used to identify external systems having
relations with the EVC (for example an ownership).
• Enter a list of EVC terminations by using Add EVC Termination button. The EVC can
be Connection Oriented or Connection Less. To remove an EVC from the list, use the
Remove EVC button.
...................................................................................................................................................................................................

3 Click Ok.
Result: A check is performed. If the check succeeded, the EVC is created. The tree
area and the EVC List are updated.
The EVC is created with the following states: Provisioning State set to Defined,
Working State set to Normal.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
18-86 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
End to End Ethernet Provisioning Management Modify a full E2E EVC
Managing End-to-End Ethernet Virtual Connections (E2E
EVC)
....................................................................................................................................................................................................................................

Modify a full E2E EVC


When to use
The function allows the user to modify EVC characteristics.

Related Information
Related information can be found in “EVC description” (p. 18-37).

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Conditions
To get a positive result:
• If the User Label is modified, the new User Label must be different from other
already used by another EVC.

Task
From the Multi Service GUI Main view:
...................................................................................................................................................................................................

1 Select Search > Packet > Services > E2E EVCs.


Result: The list window is displayed.
...................................................................................................................................................................................................

2 Select the EVC to modify in the list.


...................................................................................................................................................................................................

3 Click the right mouse button and select from the popup menu Modify.
Result: The EVC modification window is displayed.
...................................................................................................................................................................................................

4 To modify an EVC, modify one or more of the following items:


• Modify the EVC User Label.
• Modify the C-VLAN Preservation.
• Modify the C-VLAN CoS Preservation.
• Modify the NAD Value.
• Modify the Comment.
• Modify the External Mark.

....................................................................................................................................................................................................................................
1350 OMS 18-87
8DG42227DAAA 9.6
Issue 3 December 2012
End to End Ethernet Provisioning Management Modify a full E2E EVC
Managing End-to-End Ethernet Virtual Connections (E2E
EVC)
....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

5 Click Ok.
Result: The EVC list, the tree area, and the opened graphical views are updated.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
18-88 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
End to End Ethernet Provisioning Management Join E2E EVC
Managing End-to-End Ethernet Virtual Connections (E2E
EVC)
....................................................................................................................................................................................................................................

Join E2E EVC


When to use
This function joins two or more Ethernet Virtual Connections.

Related Information
Related Information can be found in “EVC description” (p. 18-37).

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.

Task
...................................................................................................................................................................................................

1 From the Multi Service GUI Main view, follow the path Action > Packet > Services >
Join E2E EVC.
Result: The Join E2E EVC window is displayed.
...................................................................................................................................................................................................

2 To join two or more EVCs:


• Enter a User Label.
• Enter the Comment (optional).
• Enter the External Mark (optional).
• Select the EVCs to be joined.
Select an EVC domain (Connection Oriented, Connection Less, T-MPLS, eOMS)
– Click the EVC List icon to list all the EVCs defined into the domain.
– Select the one or more EVCs in the list.
– Click the confirmation icon.
Note: The EVCs can be added to or removed from the list by the icons under EVC List
menu.
Note: Repeat this step for all the needed EVC.
Result: Selected EVCs are listed in the Join E2E EVC window.
...................................................................................................................................................................................................

3 Click Ok.

....................................................................................................................................................................................................................................
1350 OMS 18-89
8DG42227DAAA 9.6
Issue 3 December 2012
End to End Ethernet Provisioning Management Join E2E EVC
Managing End-to-End Ethernet Virtual Connections (E2E
EVC)
....................................................................................................................................................................................................................................
Result: A check is performed. If the check succeeded, the join is accomplished.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
18-90 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
End to End Ethernet Provisioning Management Managing an E2E EVC
Managing End-to-End Ethernet Virtual Connections (E2E
EVC)
....................................................................................................................................................................................................................................

Managing an E2E EVC


When to use
The scope of this procedure is to create an End to End EVC connection. With reference to
the below schema.

Figure 18-9 Network schema for E2E connection

Related Information
This task does not have any related information.

Before you begin


This task does not have any preconditions.

Task
...................................................................................................................................................................................................

1 Create LoC between NE-B and NE-C


...................................................................................................................................................................................................

2 Assign port B1 to Domain ETS


...................................................................................................................................................................................................

3 Assign port C1 to Domain T-MPLS


...................................................................................................................................................................................................

4 After the assignment of port B1 to Domain ETS and port C1 to Domain T-MPLS,
• the Loc between NE-B and NE-C becomes IWI (it was generic)
• ports B1 and port C1 become UNI (Edge port in their domains)

....................................................................................................................................................................................................................................
1350 OMS 18-91
8DG42227DAAA 9.6
Issue 3 December 2012
End to End Ethernet Provisioning Management Managing an E2E EVC
Managing End-to-End Ethernet Virtual Connections (E2E
EVC)
....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

5 Assign port B2 to Domain ETS


...................................................................................................................................................................................................

6 Create EVC ETS (from B1 to B2)


...................................................................................................................................................................................................

7 Create EVC T-MPLS (from C1 to C2)


...................................................................................................................................................................................................

8 From the main bar select Actions>Packet>Service>Join E2E EVC


...................................................................................................................................................................................................

9 Select domain C.O.


Select EVC
Select domain T-MPLS
Select EVC
Click on OK to confirm.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
18-92 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
End to End Ethernet Provisioning Management Structure for EVC over SDH
EVC over SDH
....................................................................................................................................................................................................................................

EVC over SDH

Structure for EVC over SDH


When to use
The scope of this procedure is

Related Information
This task does not have any related information.

Before you begin


All needed conditions are detailed along the procedure.

Task
...................................................................................................................................................................................................

1 From the main menu bar select Search > Packet > Construction > Transport Links >
Links over TDM(Sdh/Sonet)

Figure 18-10 Search>Packet>Construction>Transport Links>Links over


TDM(Sdh/Sonet)

...................................................................................................................................................................................................

2 The list of Links over TDM(Sdh/Sonet) is displayed.

....................................................................................................................................................................................................................................
1350 OMS 18-93
8DG42227DAAA 9.6
Issue 3 December 2012
End to End Ethernet Provisioning Management Structure for EVC over SDH
EVC over SDH
....................................................................................................................................................................................................................................
This list contains an Ethernet path, created on SDH, which will be used

Figure 18-11 Links over TDM(Sdh/Sonet)

...................................................................................................................................................................................................

3 From the bar select Search>Packet>Construction>Network Elements>Defined NEs

Figure 18-12 Search>Packet>Construction>Network Elements>Defined NEs

...................................................................................................................................................................................................

4 The list of the Defined NEs is displayed.

....................................................................................................................................................................................................................................
18-94 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
End to End Ethernet Provisioning Management Structure for EVC over SDH
EVC over SDH
....................................................................................................................................................................................................................................
Select the relevant NE and issue Search > Ethernet Physical Ports

Figure 18-13 Defined NE:Search>Ethernet Physical Ports

...................................................................................................................................................................................................

5 Select the Ethernet port and issue Actions > Assign Resource to Domain

Figure 18-14 Port:Actions>Assign Resource to Domain

....................................................................................................................................................................................................................................
1350 OMS 18-95
8DG42227DAAA 9.6
Issue 3 December 2012
End to End Ethernet Provisioning Management Structure for EVC over SDH
EVC over SDH
....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

6 Click on button Domains. From the domain list select the ETS Domain and click on V.

Figure 18-15 ETS Domain selection

....................................................................................................................................................................................................................................
18-96 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
End to End Ethernet Provisioning Management Structure for EVC over SDH
EVC over SDH
....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

7 Click on OK to assign the port to ETS domain.

Figure 18-16 Assign port to ETS domain

...................................................................................................................................................................................................

8 Execute the assignment for the far end port on TSS-B. (Port:Actions>Assign Resource to
Domain)
...................................................................................................................................................................................................

9 From the main menu bar select Search>Packet>Construction>Transport Links>Links


over TDM(Sdh/Sonet)

....................................................................................................................................................................................................................................
1350 OMS 18-97
8DG42227DAAA 9.6
Issue 3 December 2012
End to End Ethernet Provisioning Management Structure for EVC over SDH
EVC over SDH
....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

10 Select the relevant Link over TDM (path) and issue Actions>Assign Resources to Domain

Figure 18-17 Link over TDM (path): Actions>Assign Resources to Domain

...................................................................................................................................................................................................

11 Select ETS domain.

Figure 18-18 Select ETS domain

....................................................................................................................................................................................................................................
18-98 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
End to End Ethernet Provisioning Management Structure for EVC over SDH
EVC over SDH
....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

12 Click on OK to confirm the assignment.

Figure 18-19 Confirm the assignment

...................................................................................................................................................................................................

13 From the bar select Search>Packet>Services>Connection Oriented>ETS Transport Link

....................................................................................................................................................................................................................................
1350 OMS 18-99
8DG42227DAAA 9.6
Issue 3 December 2012
End to End Ethernet Provisioning Management Structure for EVC over SDH
EVC over SDH
....................................................................................................................................................................................................................................
The path, when assigned, is now an ETS Transport Link

Figure 18-20 Search>Packet>Services>Connection Oriented>ETS Transport Link

...................................................................................................................................................................................................

14 Since we do not find the path in the list of ETS Transport Links, this is due to the fact that
we forgive to commission the path.

Figure 18-21 Path commissioning

....................................................................................................................................................................................................................................
18-100 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
End to End Ethernet Provisioning Management Structure for EVC over SDH
EVC over SDH
....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

15 After path commissioning the path is included in the Links over TDM list.

Figure 18-22 Path included in the Links over TDM

...................................................................................................................................................................................................

16 And in the Transport Links, accordingly.

Figure 18-23 Transport Links

E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS 18-101
8DG42227DAAA 9.6
Issue 3 December 2012
End to End Ethernet Provisioning Management Assign ports to domain
EVC over SDH
....................................................................................................................................................................................................................................

Assign ports to domain


When to use
The scope of this procedure is to assign ports to domain

Related Information
This task does not have any related information.

Before you begin


This task does not have any preconditions.

Task
...................................................................................................................................................................................................

1 From the main menu bar select Search > Packet > Construction > Network Elements >
Defined NEs
...................................................................................................................................................................................................

2 Select a Defined Network Element from the list and using the right mouse button, select
from the popup menu, Search > Ethernet Physical Ports

....................................................................................................................................................................................................................................
18-102 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
End to End Ethernet Provisioning Management Assign ports to domain
EVC over SDH
....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

3 Port: Assign resources to Domain

Figure 18-24 Port: Assign resources to Domain

....................................................................................................................................................................................................................................
1350 OMS 18-103
8DG42227DAAA 9.6
Issue 3 December 2012
End to End Ethernet Provisioning Management Assign ports to domain
EVC over SDH
....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

4 Assign resources to Domain. Click on Apply.

Figure 18-25 Assign resources to Domain

....................................................................................................................................................................................................................................
18-104 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
End to End Ethernet Provisioning Management Assign ports to domain
EVC over SDH
....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

5 From the main menu bar select Search > Packet > Services > T-MPLS > T-MPLS Edge
Ports.

Figure 18-26 Search>Packet>Services>T-MPLS>T-MPLS Edge Ports

...................................................................................................................................................................................................

6 The list of the edge ports is displayed.

Figure 18-27 UNI ports became edge ports

...................................................................................................................................................................................................

7 Assign the other UNI port.


E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS 18-105
8DG42227DAAA 9.6
Issue 3 December 2012
End to End Ethernet Provisioning Management EVC over SDH
EVC over SDH
....................................................................................................................................................................................................................................

EVC over SDH


When to use
The scope of this procedure is to Create EVC over SDH.

Related Information
This task does not have any related information.

Before you begin


All needed coditions are detailed along the procedure.

Task
...................................................................................................................................................................................................

1 From the main bar select Actions > Packet > Services > Connection Oriented(ETS) >
Create EVC.

Figure 18-28 Actions>Packet>Services>Connection Oriented(ETS)>Create EVC

...................................................................................................................................................................................................

2 Complete following data on the Create EVC window :


• name
• service type=EVPL
• ethernet service:automatically selected
• select the domain: ETS
• type=point to point automatically selected
....................................................................................................................................................................................................................................
18-106 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
End to End Ethernet Provisioning Management EVC over SDH
EVC over SDH
....................................................................................................................................................................................................................................
• traffic type=unicast
• resource sharing=unicast
Select the NE
Select the Edge Port

Figure 18-29 EVC over SDH: EVC definition

....................................................................................................................................................................................................................................
1350 OMS 18-107
8DG42227DAAA 9.6
Issue 3 December 2012
End to End Ethernet Provisioning Management EVC over SDH
EVC over SDH
....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

3 Select the far end edge port.


Click on Next.

Figure 18-30 Far end edge port selection

...................................................................................................................................................................................................

4 Select the traffic descriptor to associate.

....................................................................................................................................................................................................................................
18-108 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
End to End Ethernet Provisioning Management EVC over SDH
EVC over SDH
....................................................................................................................................................................................................................................
Click on Apply

Figure 18-31 Ethernet Segments definition

....................................................................................................................................................................................................................................
1350 OMS 18-109
8DG42227DAAA 9.6
Issue 3 December 2012
End to End Ethernet Provisioning Management EVC over SDH
EVC over SDH
....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

5 From the main menu bar select Search > Packet > Services > Connection
Oriented(ETS)

Figure 18-32 Search>Packet>Services>Connection Oriented(ETS)

...................................................................................................................................................................................................

6 The ETS EVC is created as defined.

Figure 18-33 ETS EVCs

....................................................................................................................................................................................................................................
18-110 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
End to End Ethernet Provisioning Management EVC over SDH
EVC over SDH
....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

7 Select the ETS EVC and issue Search > Ethernet Segments.

Figure 18-34 ETS EVC: Search>Ethernet Segments

...................................................................................................................................................................................................

8 The list of the Ethernet segments is shown below.

Figure 18-35 Ethernet segment list

....................................................................................................................................................................................................................................
1350 OMS 18-111
8DG42227DAAA 9.6
Issue 3 December 2012
End to End Ethernet Provisioning Management EVC over SDH
EVC over SDH
....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

9 You may select an Ethernet Segment from the list and using the right mouse button, select
from the popup menu Actions > Add Constraints to an Ethernet Service

Figure 18-36 Actions>Add Constraints to an Ethernet Service

...................................................................................................................................................................................................

10 Select as constraint the transport link

....................................................................................................................................................................................................................................
18-112 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
End to End Ethernet Provisioning Management EVC over SDH
EVC over SDH
....................................................................................................................................................................................................................................
Click on Apply.

Figure 18-37 Add Constraints to an Ethernet Service

....................................................................................................................................................................................................................................
1350 OMS 18-113
8DG42227DAAA 9.6
Issue 3 December 2012
End to End Ethernet Provisioning Management EVC over SDH
EVC over SDH
....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

11 Select the Ethernet Segment in the list and using the right mouse button follow the path
Actions > Associate Traffic Classifier

Figure 18-38 Segment:Actions>Associate to Traffic Classifier

...................................................................................................................................................................................................

12 From the list select the Traffic Classifier.

Figure 18-39 Traffic Classifier list

....................................................................................................................................................................................................................................
18-114 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
End to End Ethernet Provisioning Management EVC over SDH
EVC over SDH
....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

13 Click on Apply to launch the association.

Figure 18-40 Associate Traffic Classifier

....................................................................................................................................................................................................................................
1350 OMS 18-115
8DG42227DAAA 9.6
Issue 3 December 2012
End to End Ethernet Provisioning Management EVC over SDH
EVC over SDH
....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

14 Allocate the segment.

Figure 18-41 Allocate the segment

...................................................................................................................................................................................................

15 Implement the segment.

Figure 18-42 Implement the segment

....................................................................................................................................................................................................................................
18-116 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
End to End Ethernet Provisioning Management EVC over SDH
EVC over SDH
....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

16 Allocate and implement the other segment.

Figure 18-43 Both segments are implemented

Result: The EVC-ETS is implemented

Figure 18-44 EVC-ETS implemented

E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS 18-117
8DG42227DAAA 9.6
Issue 3 December 2012
End to End Ethernet Provisioning Management Alarms EVC T-MPLS
EVC over SDH
....................................................................................................................................................................................................................................

Alarms EVC T-MPLS


When to use
The scope of this procedure is to detect a fault condition on a T-MPLS EVC.

Related Information
This task does not have any related information.

Before you begin


This task does not have any preconditions.

Task
...................................................................................................................................................................................................

1 From the T-MPLS EVC list attribute Availability is marked In Failure.

Figure 18-45 T-MPLS EVC list: Availability

....................................................................................................................................................................................................................................
18-118 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
End to End Ethernet Provisioning Management Alarms EVC T-MPLS
EVC over SDH
....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

2 From the T-MPLS EVC issue Search>Fault Localization

Figure 18-46 EVC: Search>Fault Localization

...................................................................................................................................................................................................

3 The Transport Section is In Failure.

Figure 18-47 Navigation to Transport Section

....................................................................................................................................................................................................................................
1350 OMS 18-119
8DG42227DAAA 9.6
Issue 3 December 2012
End to End Ethernet Provisioning Management Alarms EVC T-MPLS
EVC over SDH
....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

4 You can navigate to Link over Cable

Figure 18-48 Navigate to Link over Cable

E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
18-120 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
End to End Ethernet Provisioning Management Overview about Full EVC Takeover procedure
Full EVC Takeover
....................................................................................................................................................................................................................................

Full EVC Takeover

Overview about Full EVC Takeover procedure


Overview about Takeover procedure
Takeover manages the profile configuration in the network.
It manages profile creation on domain basis. The creation affects PKT database only.

....................................................................................................................................................................................................................................
1350 OMS 18-121
8DG42227DAAA 9.6
Issue 3 December 2012
End to End Ethernet Provisioning Management Full EVC Takeover Procedure
Full EVC Takeover
....................................................................................................................................................................................................................................

Full EVC Takeover Procedure


When to use
When the PKT is deployed in a network where Network Elements and Ethernet
Connectivity (network wide) are already in place, then the need to take in charge such
Ethernet Connectivity is a must for PKT Network Manager.

Related information
The Full EVC Takeover Online procedure is applicable to all kind of Connection
Oriented, Connection Less and T-MPLS based EVCs and covers all managed topologies.
1. Connection Oriented EVC:
The Takeover is applied at Ethernet Segment Level. The Takeover is applied on all
Ethernet Segments types, unicast and multicast : the EVC which contains them are
automatically updated;
2. Connection Less EVC:
The Takeover is applied directly to the desired EVC. The Takeover is done on all
EVC types
3. Connection T-MPLS EVC:
The Takeover is applied directly to the desired EVC. The Takeover is done on all
EVC types
Note: The usage of the Offline Takeover procedure forces the shutdown and the
subsequent restart of PKT processes in order to let the Takeover Procedure work.
Using this procedure, there is no need to shutdown the services.

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.

Procedure
Following steps should be done to execute correctly the Takeover with online command:
From MS-GUI main window:
...................................................................................................................................................................................................

1 Create one or more domains that corresponds to the scenario already acting in field : from
the Construction application
Select Action > Packet > Costruction > Create Domain.

....................................................................................................................................................................................................................................
18-122 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
End to End Ethernet Provisioning Management Full EVC Takeover Procedure
Full EVC Takeover
....................................................................................................................................................................................................................................
Insert the User Label, Domain Type, Bridge Type and STP Type compliant with the
attributes already present.

Figure 18-49 Create Domain

Result: The list Domain window is shown with new Domain.


...................................................................................................................................................................................................

2 Define the Network Elements to the PKT environment : from the Construction
application.
Select Action > Packet > Costruction > Define NE.

....................................................................................................................................................................................................................................
1350 OMS 18-123
8DG42227DAAA 9.6
Issue 3 December 2012
End to End Ethernet Provisioning Management Full EVC Takeover Procedure
Full EVC Takeover
....................................................................................................................................................................................................................................
Insert the User Label, Working Mode and STP Type compliant with the attributes already
present.

Figure 18-50 Define NE

Select the Network Elements to be added from the list, click the confirm button. The
Defined Network Element List updated. When the NEs are added, assign the resources
already present or create them.
Select Action > Packet > Costruction > Assign Resources to Domain.
Result: The list Network Element window is shown with new NE.
...................................................................................................................................................................................................

3 If the Customer is not yet created, create it now, repeat the same operation for Traffic
Description and Traffic Classifier
Select Action > Packet > Services> Create Customer.

....................................................................................................................................................................................................................................
18-124 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
End to End Ethernet Provisioning Management Full EVC Takeover Procedure
Full EVC Takeover
....................................................................................................................................................................................................................................
Select Action > Packet > Services> Create Traffic Descriptor.
Select Action > Packet > Services> Create Traffic Classifier.
Insert the information compliant with the attributes already present.
Result: The Customer list is shown with new elements.
...................................................................................................................................................................................................

4 Create one or more EVC (with the Service in automatic mode) that corresponds to the
scenario already acting in field :
Select Action > Packet > Services > (ETS,ETB and T-MPLS)> Create EVC.
Insert the parameters compliant with the attributes already present.
Important! Define one or more allocated services that should Takeover, the service
must have exactly the same characteristics as the service to Takeover.

Figure 18-51 Create EVC

Important! End the operation in the state of allocated EVC.


Note: If the EVCs are T-MPLS, to do the Discovery of the Tunnel and Pseudo-Wire.

....................................................................................................................................................................................................................................
1350 OMS 18-125
8DG42227DAAA 9.6
Issue 3 December 2012
End to End Ethernet Provisioning Management Full EVC Takeover Procedure
Full EVC Takeover
....................................................................................................................................................................................................................................
Result: The list EVC window is shown with new EVC.
...................................................................................................................................................................................................

5 Perform the Audit and Reservation on all interested Network Elements : select the
interested NEs and from the main menu
Select Action > Packet > Audit Align Reservation> Start AAR procedure.
Insert the information compliant with the attributes already present.
...................................................................................................................................................................................................

6 Perform the Audit and Reservation on all interested Network Elements : from the NEs for
Auditlist select the interested NEs and start NE Audit.
Select all interested NEs:Search > Packet > Audit Align Reservation> NEs for
Audit>Start NE Audit.
Insert the information compliant with the attributes already present.
Perform the same operation for Reservation.
...................................................................................................................................................................................................

7 Perform the Align Up procedure for the Takeover on the involved ports.

....................................................................................................................................................................................................................................
18-126 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
End to End Ethernet Provisioning Management Full EVC Takeover Procedure
Full EVC Takeover
....................................................................................................................................................................................................................................
Select Action > Packet > Audit Align Reservation> Service Align Up.

Figure 18-52 Align Up window

Insert the information compliant with the attributes already present.


Note: Execute the Align Up procedure maintaining the Audit window from the
Construction application open.
...................................................................................................................................................................................................

8 Stop Audit, Align and Reservation procedure.


Select Action > Packet > Audit Align Reservation> Stop AAR procedure.
...................................................................................................................................................................................................

9 The Ethernet Segments involved or the EVCs in case of connection less connection
should be in Allocated state.
....................................................................................................................................................................................................................................
1350 OMS 18-127
8DG42227DAAA 9.6
Issue 3 December 2012
End to End Ethernet Provisioning Management Full EVC Takeover Procedure
Full EVC Takeover
....................................................................................................................................................................................................................................
Start the Takeover procedure:
Select Action > Packet > Services> Takeover>Enable Takeover.

Figure 18-53 Enable Takeover

Result: The full Takeover online procedure runs on the allocated services created in
the previous steps.
...................................................................................................................................................................................................

10 Implement the Ethernet Segments or EVCs to complete the Takeover procedure: From the
Ethernet Management application.
...................................................................................................................................................................................................

11 Verify that the Takeover is successfully done, the service should be now in Implemented
state.
Note: Verify that the Takeover is successfully done, the service should be now in
Implemented state.
...................................................................................................................................................................................................

12 Stop the Takeover procedure:

....................................................................................................................................................................................................................................
18-128 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
End to End Ethernet Provisioning Management Full EVC Takeover Procedure
Full EVC Takeover
....................................................................................................................................................................................................................................
Select Action > Packet > Services> Takeover>Disable Takeover.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS 18-129
8DG42227DAAA 9.6
Issue 3 December 2012
End to End Ethernet Provisioning Management T-MPLS Takeover description
T-MPLS Takeover
....................................................................................................................................................................................................................................

T-MPLS Takeover

T-MPLS Takeover description


T-MPLS Takeover Key features:
T-MPLS Takeover procedure is aimed to discover existing T-MPLS infrastructure (i.e.
tunnels and pseudo-wires) from the network, and import it into PKT database.
physical connectivity must be described
Circuit correctness checks – only tunnel/PWs defined coherently in all the NE’s involved
are uploaded
(e.g., two terminations must be found; traffic descriptor parameters must be equal along
the circuit; T-MPLS in-labels must match the out-labels, etc).
Takeover of 1+1 protected tunnels
Takeover of 1+1 APS Protections Groups defined in the NE’s when tunnels are already in
PKT database.
Takeover of T-MPLS profiles (Traffic Descriptor, PHB, L2-encapsulation).
Takeover of all tunnels/PWs OR only tunnels/PWs terminating in a node.

Description of main steps


Define via NPR the physical/logical connectivity supporting T-MPLS, i.e., ethernet
physical-connections or SDH paths. This will result in the definition of links-over-cable /
links-over-SDH in PKT.
Assign via PKT these links to T-MPLS domain. This will result in the definition of
T-MPLS nodes and sections inside PKT database.
Start Takeover operation from T-MPLS domain OR, if only a small part of the network is
involved, from one of the T-MPLS nodes (in this latter case, choice is left to operator
whether to discover all circuits or only those terminating in the node).
This will result (if the circuit were defined correctly in the network) in the tunnels/PWs
objects (in implemented state) inside PKT database.
Check in the lists that tunnels/PWs have been uploaded

....................................................................................................................................................................................................................................
18-130 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
End to End Ethernet Provisioning Management Takeover procedure for T-MPLS
T-MPLS Takeover
....................................................................................................................................................................................................................................

Takeover procedure for T-MPLS


When to use
The procedure permit to take in charge Network Elements and Connectivity when the
PKT is deployed in a network where (network wide) such connectivity is already in place.

Related information
For more information refer to: “T-MPLS Takeover description” (p. 18-130)
For general procedure description, refer to: “Description of main steps” (p. 18-130)

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
Conditions
The topology of the network must be already defined.

Task for T-MPLS


From MS-GUI main window:
...................................................................................................................................................................................................

1 Create a T-MPLS Domain.


Select Action > Packet > Construction > Create Domain.
For details refer to the procedure “Create a Domain” (p. 13-20).
Result: The T-MPLS domain is created.
...................................................................................................................................................................................................

2 Select Search > Packet > Construction > Link Over Cable.
Assign Links Over Cable to T-MPLS domain.
For details refer to the procedure “Assign a Link Over Cable to a Domain” (p. 14-60).
Result: The selected Links Over Cable are assigned to T-MPLS domain
...................................................................................................................................................................................................

3 Execute the T-MPLS PW Takeover:


Select Search > Packet > T-MPLS > T-MPLS domain..
Select the T-MPLS domain.
Select Action > T-MPLS > Takeover All
Note: In a large network the Takeover from the domain requires a long time to
execute. The user can start the Takeover only from involved nodes.
....................................................................................................................................................................................................................................
1350 OMS 18-131
8DG42227DAAA 9.6
Issue 3 December 2012
End to End Ethernet Provisioning Management Takeover procedure for T-MPLS
T-MPLS Takeover
....................................................................................................................................................................................................................................
Result: T-MPLS Tunnels and PseudoWires are discovered and created in the PKT
DB.
To check the object creation, refer to the procedure “View the list of T-MPLS tunnels”
(p. 16-99).
To check the object creation, refer to the procedure “View the list of Pseudo Wires”
(p. 16-51).
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
18-132 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
End to End Ethernet Provisioning Management Overview about Color Profiles
Managing Color Profiles
....................................................................................................................................................................................................................................

Managing Color Profiles

Overview about Color Profiles


Color Profile description
The Color Profile allows the user to define a priority in accepting or rejecting incoming
frames (Red/Yellow/Green). This rule applies when Traffic Descriptor is Regulated and
Policy Control is not Color Blind.

....................................................................................................................................................................................................................................
1350 OMS 18-133
8DG42227DAAA 9.6
Issue 3 December 2012
End to End Ethernet Provisioning Management Display the Color Profile list
Managing Color Profiles
....................................................................................................................................................................................................................................

Display the Color Profile list


When to use
The Color Profile List window presents all the Color Profiles and their attributes.

Related Information
If this list is required from the Ethernet Segment List, only the Color Profiles associated
to the selected Ethernet Segment are displayed.
For more information, refer to “Overview about Color Profiles” (p. 18-133).

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.

Task
From the MS-GUIMain view:
...................................................................................................................................................................................................

1 Select Search > Packet > Services.


Result: The menu of the Services is shown.
...................................................................................................................................................................................................

2 Select Color Profile.


Result: The list window is displayed.
The attributes displayed for each Color Profile are:
• User Label.
• Color Profile Mode (Priority, DSCP).

E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
18-134 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
End to End Ethernet Provisioning Management Create a Color Profile
Managing Color Profiles
....................................................................................................................................................................................................................................

Create a Color Profile


When to use
This function consists in defining a Color Profile used to describe the flow of Ethernet
frames over an Ethernet Segment.

Related Information
For more information, refer to “Overview about Color Profiles” (p. 18-133).

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Conditions
To get a positive result:
• The maximum number of Color Profiles must not be reached.
• The User Label must be different as one which exists.

Task
From the MS-GUI Main menu:
...................................................................................................................................................................................................

1 Select Action > Packet > Services > Create Color Profile.
...................................................................................................................................................................................................

2 On the Create Color Profile Window, the following data must be entered.
To create a customer:
• Enter a User Label.
• Select the Color Profile Mode (Priority, DSCP).
• If Priority Mode is selected, Priority Tab must be set up.
• If DSCP Mode is selected, Code Point 1 to Code Point 4 Tabs must be set up,
selecting a color (Green, Yellow, or Red).
...................................................................................................................................................................................................

3 Click Ok button.
Result: The Color Profile is created.
The Color Profile list is updated.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS 18-135
8DG42227DAAA 9.6
Issue 3 December 2012
End to End Ethernet Provisioning Management Modify a Color Profile
Managing Color Profiles
....................................................................................................................................................................................................................................

Modify a Color Profile


When to use
The function modifies Color Profile characteristics.

Related Information
For more information, refer to “Overview about Color Profiles” (p. 18-133).
The Color Profile modification gives the possibility to modify one or all the following
parameters:
• Color Profile User Label,.
• Color of each priority.

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Conditions
To get a positive result:
• If the User Label is modified, the new User Label must be different as one which is
already used by another Color Profile.
• The Color Profile must not be associated to any Ethernet Segment or could be
associated to Ethernet Segments in Defined provisioning state.

Task
From the MS-GUI Main menu:
...................................................................................................................................................................................................

1 Select Search > Packet > Services > Color Profiles.


...................................................................................................................................................................................................

2 On the Color Profile List, select the Color Profile to modify. Select with the right mouse
button the path Action from Color Profile > Color Profile Modification.

....................................................................................................................................................................................................................................
18-136 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
End to End Ethernet Provisioning Management Modify a Color Profile
Managing Color Profiles
....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

3 The Modify Color Profile window is displayed.

Figure 18-54 Color Profile Modification window

To modify a Color Profile:


• Enter a new User Label (optional).
• If Priority Mode is selected, Priority Tab must be set up.
• If DSCP Mode is selected, Code Point 1 to Code Point 4 Tabs must be set up,
selecting a color (Green, Yellow, or Red).
...................................................................................................................................................................................................

4 Click Ok button.
....................................................................................................................................................................................................................................
1350 OMS 18-137
8DG42227DAAA 9.6
Issue 3 December 2012
End to End Ethernet Provisioning Management Modify a Color Profile
Managing Color Profiles
....................................................................................................................................................................................................................................
Result: The Color Profile is modified.
The Color Profile list is updated.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
18-138 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
End to End Ethernet Provisioning Management Delete a Color Profile
Managing Color Profiles
....................................................................................................................................................................................................................................

Delete a Color Profile


When to use
This function consists in deleting a Color Profile from the supervision.

Related Information
For more information, refer to “Overview about Color Profiles” (p. 18-133).

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Conditions
To get a positive result:
• The Color Profile must not be associated to any Ethernet Segment or could be
associated to Ethernet Segments in Defined provisioning state.

Task
From the MS-GUI Main menu:
...................................................................................................................................................................................................

1 Select Search > Packet > Services > Color Profiles.


...................................................................................................................................................................................................

2 On the Color Profile List Window, select the Color Profile to delete. Select with the right
mouse button from the popup menu Action from Color Profile > Delete.
...................................................................................................................................................................................................

3 Select one of the options in the confirmation box. Refer to the procedure “Confirm the
action” (p. 11-40).
Result: The Color Profile is deleted.
After confirmation, the Color Profiles are removed and the Color Profile List is
updated.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS 18-139
8DG42227DAAA 9.6
Issue 3 December 2012
End to End Ethernet Provisioning Management Get the Color Profile Properties
Managing Color Profiles
....................................................................................................................................................................................................................................

Get the Color Profile Properties


When to use
This function gets information about a Color Profile.

Related Information
For more information, refer to “Overview about Color Profiles” (p. 18-133).

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.

Task
From the MS-GUI Main menu:
...................................................................................................................................................................................................

1 Select Search > Packet > Services > Color Profiles.


...................................................................................................................................................................................................

2 On the Color Profile List Window, select a Color. Select with the right mouse button from
the popup menu Properties.
...................................................................................................................................................................................................

3 The Properties window is displayed.


The attributes displayed for each Color Profile are:
• Id
• User Label.

....................................................................................................................................................................................................................................
18-140 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
End to End Ethernet Provisioning Management Get the Color Profile Properties
Managing Color Profiles
....................................................................................................................................................................................................................................
• Priority 0… Priority 7.
• Color Profile Mode (Priority, DSCP).

Figure 18-55 Color Profile Properties window

E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS 18-141
8DG42227DAAA 9.6
Issue 3 December 2012
End to End Ethernet Provisioning Management Overview about Traffic Descriptor

....................................................................................................................................................................................................................................

Managing Traffic Descriptors

Overview about Traffic Descriptor


Traffic Descriptor description
The Traffic Descriptors describes the characteristics of an Ethernet Segment in term of
Class of Service (CoS) and bandwidth.
Another step toward the MEF alignment is provided by possibility to display bandwidth
parameters following both IETF definitions (as already available) and MEF definitions.
For reminder, the following definitions are applicable for IETF: CIR, PIR, PBS, CBS
while the following one are applicable for MEF: CIR, EIR, CBS, EBS.
The existing relationships are described as in the following:
• EIR = PIR – CIR .
• EBS = PBS – CBS .
Three Traffic Descriptors are created by default during the 1350 OMS PKT installation.

Class of services dependencies

Table 18-2 Class of services and traffic parameters dependencies

Traffic Class of Service.


Descriptor
parameters.
Best Effort. Guaranteed. Regulated.
CIR. 0. (CIR = PIR) & (CIR > 0). (CIR <= PIR) & (CIR > =
0).
if (CIR > 0), (CBS > 0).
if (CIR = 0), (CBS=0).
PIR. > 0. (PIR = CIR) & (PIR > 0). (PIR > = CIR) & (PIR > 0).
CBS. 0. (CBS = PBS) & (CBS > 0). (CBS > = 0) &
(CBS<=PBS).
if (CBS > 0), (CIR > 0).
if (CBS = 0), (CIR=0).
PBS. > 0. (PBS = CBS) & (PBS > 0). (PBS > 0) & (PBS >
=CBS).

....................................................................................................................................................................................................................................
18-142 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
End to End Ethernet Provisioning Management Overview about Traffic Descriptor
Managing Traffic Descriptors
....................................................................................................................................................................................................................................

Table 18-3 ISA boards and Ethernet traffic parameters dependencies

ISA ES1 / ES4. ISA PR EA / ISA ES16.


Minimum. Maximum. Minimum. Maximum.
CIR. 0 or 8. Up to PIR. 0 or 64. Up to PIR.
PIR. 8. Up to ELR. 64. Up to ELR.
CBS. 0. 16384. 0. Min (16384, 500/3*CIR).
PBS. > 0. 16384. > 0. Min (65335, 500/3*PIR).

....................................................................................................................................................................................................................................
1350 OMS 18-143
8DG42227DAAA 9.6
Issue 3 December 2012
End to End Ethernet Provisioning Management Display the Traffic Descriptor list
Managing Traffic Descriptors
....................................................................................................................................................................................................................................

Display the Traffic Descriptor list


When to use
The Traffic Descriptor List window presents all the Traffic Descriptors and their
attributes.

Related Information
If this list is required from the Ethernet Segment List, only the Traffic Descriptors
associated to the selected Ethernet Segment are displayed.
For more information, refer to “Traffic Descriptor description” (p. 18-142).

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.

Task
From the MS-GUIMain view:
...................................................................................................................................................................................................

1 Select Search > Packet > Services.


Result: The menu of the Services is shown.
...................................................................................................................................................................................................

2 Select Traffic Descriptors.


Result: The list window is displayed.
See the following topic in this document: “Description of the list of Traffic
Descriptors” (p. 18-145)
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
18-144 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
End to End Ethernet Provisioning Management Description of the list of Traffic Descriptors
Managing Traffic Descriptors
....................................................................................................................................................................................................................................

Description of the list of Traffic Descriptors


Attributes of a Traffic Descriptor
The attributes displayed for each Traffic Descriptor are:
• User Label.
• Class of Service (Guaranteed, Regulated, Best Effort, Guaranteed2, Regulated1,
Regulated3, Regulated4, Background).
• CIR (Committed Information Rate).
• PIR (Peak Information Rate).
• CBS (Committed Burst Size).
• PBS (Peak Burst Size).

....................................................................................................................................................................................................................................
1350 OMS 18-145
8DG42227DAAA 9.6
Issue 3 December 2012
End to End Ethernet Provisioning Management Create a Traffic Descriptor
Managing Traffic Descriptors
....................................................................................................................................................................................................................................

Create a Traffic Descriptor


When to use
This function consists in defining a Traffic Descriptor.

Related Information
Traffic Descriptor is used to describe the flow of the Ethernet frames over an Ethernet
Segment.
For more information, refer to “Traffic Descriptor description” (p. 18-142).

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Conditions
To get a positive result:
• The maximum number of Traffic Descriptors must not be reached.
• The traffic parameters of the Traffic Descriptor must be different from an existing
ones Traffic Descriptor.
• The User Label must be different from the already used by other Traffic Descriptors.

Task
From the MS-GUI Main menu:
...................................................................................................................................................................................................

1 Select Action > Packet > Services > Traffic Descriptor Creation.

....................................................................................................................................................................................................................................
18-146 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
End to End Ethernet Provisioning Management Create a Traffic Descriptor
Managing Traffic Descriptors
....................................................................................................................................................................................................................................
Result: The Creation window opens.

...................................................................................................................................................................................................

2 On the Create Traffic Descriptor Window, the following data must be entered.
To create a Traffic Descriptor:
• Enter a User Label.
• Select the Class of Service (Best Effort, Guaranteed, Regulated, Guaranteed2,
Regulated1, Regulated3, Regulated4, Background).
• Enter a CIR value (set automatically to '0' if the selected Class of Service is 'Best
Effort').
• Enter a PIR value.
• Enter a CBS value (set automatically to '0' if the selected Class of Service is 'Best
Effort').
• Enter a PBS value (if the selected Class of Service is 'Guaranteed', PBS value is
automatically set to CBS value - but could be modified).

....................................................................................................................................................................................................................................
1350 OMS 18-147
8DG42227DAAA 9.6
Issue 3 December 2012
End to End Ethernet Provisioning Management Create a Traffic Descriptor
Managing Traffic Descriptors
....................................................................................................................................................................................................................................
See CIR/PIR/CBS/PBSdependencies in “Class of services dependencies” (p. 18-142). The
relationship remains unchanged for the two Guaranteed as well as for the four Regulated.
...................................................................................................................................................................................................

3 Click Ok button.
Result: After checking the coherence of the traffic parameters values, the Traffic
Descriptor is created.
The Traffic Descriptor List is updated.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
18-148 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
End to End Ethernet Provisioning Management Modify a Traffic Descriptor
Managing Traffic Descriptors
....................................................................................................................................................................................................................................

Modify a Traffic Descriptor


When to use
The function modifies Traffic Descriptor characteristics.

Related Information
For more information, refer to “Traffic Descriptor description” (p. 18-142).
The Traffic Descriptor modification gives the possibility to modify:
• Traffic Descriptor User Label.
• Class of Service.
• CIR, PIR, CBS and/or PBS.

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Conditions
To get a positive result:
• If the User Label is modified, the new User Label must be different from the one
used by another Traffic Descriptor.
• The Traffic Descriptor must not be associated to any Ethernet Segment or could be
associated to Ethernet Segments in Defined provisioning state.

Task
From the MS-GUI Main menu:
...................................................................................................................................................................................................

1 Select Search > Packet > Services > Traffic Descriptors.


...................................................................................................................................................................................................

2 On the Traffic Descriptor List, select the Traffic Descriptor to modify. Select with the
right mouse button the path Modify.

....................................................................................................................................................................................................................................
1350 OMS 18-149
8DG42227DAAA 9.6
Issue 3 December 2012
End to End Ethernet Provisioning Management Modify a Traffic Descriptor
Managing Traffic Descriptors
....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

3 The Modify Traffic Descriptor window is displayed.

Figure 18-56 Traffic Descriptor Modification window

To modify a Traffic Descriptor:


• Enter a new User Label (optional).
• Modify the Class of Service (optional).
• Modify the ClR (optional).
• Modify the PIR (optional).
• Modify the CBS (optional).
• Modify the PBS (optional).
...................................................................................................................................................................................................

4 Click Ok button.

....................................................................................................................................................................................................................................
18-150 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
End to End Ethernet Provisioning Management Modify a Traffic Descriptor
Managing Traffic Descriptors
....................................................................................................................................................................................................................................
Result: After confirmation of the modification, 1350 OMS PKT checks the
consistence of the traffic parameter values and then, the Traffic Descriptor list is
updated.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS 18-151
8DG42227DAAA 9.6
Issue 3 December 2012
End to End Ethernet Provisioning Management Delete a Traffic Descriptor
Managing Traffic Descriptors
....................................................................................................................................................................................................................................

Delete a Traffic Descriptor


When to use
This function consists in deleting a Traffic Descriptor.

Related Information
For more information, refer to “Traffic Descriptor description” (p. 18-142).

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Conditions
To get a positive result:
• The Traffic Descriptor must not be associated to any Ethernet Segment or could be
associated to Ethernet Segments in Defined provisioning state.

Task
From the MS-GUI Main menu:
...................................................................................................................................................................................................

1 Select Search > Packet > Services > Traffic Descriptors.


...................................................................................................................................................................................................

2 On the traffic descriptor List Window, select the traffic descriptor to delete. Select with
the right mouse button from the popup menu Action from Traffic Descriptor > Delete.
...................................................................................................................................................................................................

3 Select one of the options in the confirmation box. Refer to the procedure “Confirm the
action” (p. 11-40).
Result: After confirmation, the Traffic Descriptors are removed.
The Traffic Descriptor list is updated.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
18-152 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
End to End Ethernet Provisioning Management Get the Traffic Descriptor Properties
Managing Traffic Descriptors
....................................................................................................................................................................................................................................

Get the Traffic Descriptor Properties


When to use
This function gets information about a Traffic Descriptor.

Related Information
For more information, refer to “Traffic Descriptor description” (p. 18-142).

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.

Task
From the MS-GUI Main menu:
...................................................................................................................................................................................................

1 Select Search > Packet > Services > Traffic Descriptors.


...................................................................................................................................................................................................

2 On the Traffic Descriptor List Window, select a TD. Select with the right mouse button
from the popup menu Properties.
...................................................................................................................................................................................................

3 The Properties window is displayed.

....................................................................................................................................................................................................................................
1350 OMS 18-153
8DG42227DAAA 9.6
Issue 3 December 2012
End to End Ethernet Provisioning Management Get the Traffic Descriptor Properties
Managing Traffic Descriptors
....................................................................................................................................................................................................................................
See the following topic in this document: “Details of a Traffic Descriptor” (p. 18-155)

Figure 18-57 Traffic Descriptor (Ethernet Management) Properties window

E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
18-154 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
End to End Ethernet Provisioning Management Details of a Traffic Descriptor
Managing Traffic Descriptors
....................................................................................................................................................................................................................................

Details of a Traffic Descriptor


Attributes of a Traffic Descriptor
The attributes displayed for each Traffic Descriptor are:
• Id
• User Label.
• CIR (Committed Information Rate).
• PIR (Peak Information Rate).
• CBS (Committed Burst Size).
• PBS (Peak Burst Size).
• Class of Service (Guaranteed, Regulated, Best Effort, Guaranteed2, Regulated1,
Regulated3, Regulated4, Background).

....................................................................................................................................................................................................................................
1350 OMS 18-155
8DG42227DAAA 9.6
Issue 3 December 2012
End to End Ethernet Provisioning Management Overview about Traffic Classifiers
Managing Traffic Classifiers
....................................................................................................................................................................................................................................

Managing Traffic Classifiers

Overview about Traffic Classifiers


Traffic Classifier description
The 1350OMS-PKT realizes a flow classification.
The 1350OMS-PKT is capable to distinguish different flows that are passing through the
same port or transport link using a Traffic Classifier
The Traffic Classifier describes the characteristics of an Ethernet frames on an Ethernet
Segment. Ethernet frames can be either tagged or untagged.
Three Traffic Classifiers are created by default during the 1350 OMS PKT installation.
The classification can be done with one or more of the following criteria:
• Vlan Tag + Priority
• IP DSCP/TOS
• EtherType
When a VlanTag+Priority criteria is defined two flows are considered different if they
have different (or different sets of) VLAN Ids and/or VLAN Priorities.
A classification with IP DSCP/TOS criteria allows to identify distinct flows (at UNI/IWI)
basing on IPv4 frame.
The EthertType classification criteria is based on type/len field of Ethernet frame when it
assumes the Type meaning.
Each Ethernet Segment is characterized by a set of Traffic Classifiers that, in combination
with classification mode (Priority/DSCP), univocally determine which frames belongs to
it.
Each Provider Bridge Ingress Flow is characterized by a set of Traffic Classifiers that, in
combination with Classification Mode ("Priority"/"DSCP"), univocally determine which
frames passes through it. See also “IP DSCP/TOS and EtherType” (p. 18-6)
Classification criteria are not mutually excluded therefore some combinations of they are
allowed
Table 18-4 Allowed combination of Traffic Classification criteria

Vlan Prior- DSCP Ether- Note Classification Type


ity Type
Specific Spe- Don'tCare Any Priority SPECIFIC VLAN CLASSIFIER
or Range cific or value SPECIFIC VLAN CLASSIFIER +
Range ETHTYPE

....................................................................................................................................................................................................................................
18-156 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
End to End Ethernet Provisioning Management Overview about Traffic Classifiers
Managing Traffic Classifiers
....................................................................................................................................................................................................................................
Table 18-4 Allowed combination of Traffic Classification criteria (continued)

Vlan Prior- DSCP Ether- Note Classification Type


ity Type
Any Don'tCareSpecific IP Dscp UNTAGGED + SPECIFIC RANGE
value or Range (0x0800) DSCP + IP
(except
Don't SPECIFIC VLAN + SPECIFIC RANGE
care) DSCP + ETHTYPE

Don'tCare Don'tCareSpecific Any Tagged TAGGED + SPECIFIC RANGE DSCP


or Range value
or TAGGED + NO IP
NotIp-
TAGGED + NO IP + ETHTYPE
Packet
Un- Un- Don'tCare Any Untagged UNTAGGED CLASSIFIER
tagged tagged value UNTAGGED CLASSIFIER +
ETHTYPE

Any Don'tCareNotIp- NotIpPacket UNTAGGED + NO IP CLASSIFIER


value Packet UNTAGGED + NO IP CLASSIFIER +
(except ETHTYPE
Don't
care) SPECIFIC VLAN + NO IP
SPECIFIC VLAN + NO IP + ETHTYPE
Don'tCare Don'tCareDon'tCare Don'tCare Default (Don'tCare) Default

VLAN admitted values


For the VLAN, the following values/ranges are admitted:
• Specific VLAN (0<= VLAN Id <=4095) and (VLAN Max = 0).
• Range VLAN (0<= VLAN Id <=4094) and (1<= VLAN Max <= 4095) and (VLAN
Id < VLAN Max).
• Untagged Frame (VLAN Id = 4096) and (VLAN Max = 0).
• Do not Care (VLAN Id = 4097) and (VLAN Max = 0).

Priority admitted values


For the Priority, the following values/ranges are admitted:
• Specific priority (0<= Priority Id <=7) and (Priority Max = 0).
• Range priority (0<= Priority Id <=6) and (1<= Priority Max <= 7) and (Priority Id <
Priority Max).
• Untagged Frame (Priority Id = 8) and (Priority Max = 0).
• Do not Care (Priority Id = 9) and (Priority Max = 0).

....................................................................................................................................................................................................................................
1350 OMS 18-157
8DG42227DAAA 9.6
Issue 3 December 2012
End to End Ethernet Provisioning Management Display the Traffic Classifier list
Managing Traffic Classifiers
....................................................................................................................................................................................................................................

Display the Traffic Classifier list


When to use
The Traffic Classifier List window presents all the Traffic Classifiers and their attributes.

Related Information
If this list is required from the Ethernet Segment List (or VLAN Constraint List), only the
Traffic Classifiers associated to the selected items are displayed.
For more information, refer to “Traffic Classifier description” (p. 18-156).

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.

Task
From the MS-GUIMain view:
...................................................................................................................................................................................................

1 Select Search > Packet > Services.


Result: The menu of the Services is shown.
...................................................................................................................................................................................................

2 Select Traffic Classifier.


Result: The list window is displayed.
See the following topic in this document: “Description of the list of Traffic
Classifiers” (p. 18-159)
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
18-158 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
End to End Ethernet Provisioning Management Description of the list of Traffic Classifiers
Managing Traffic Classifiers
....................................................................................................................................................................................................................................

Description of the list of Traffic Classifiers


Attributes of a Traffic Classifier
The attributes displayed for each Traffic Classifier are:
• User Label.
• VLAN Identifier.
• VLAN Max.
• Priority Identifier.
• Priority Max.
• DSCP (Differentiated Services Code Point).
• DSCP Max.
• EtherType.

....................................................................................................................................................................................................................................
1350 OMS 18-159
8DG42227DAAA 9.6
Issue 3 December 2012
End to End Ethernet Provisioning Management Create a Traffic Classifier
Managing Traffic Classifiers
....................................................................................................................................................................................................................................

Create a Traffic Classifier


When to use
This function consists in defining a Traffic Classifier that can be associated to an Ethernet
Segment.

Related Information
For more information, refer to “Traffic Classifier description” (p. 18-156).

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Conditions
To get a positive result:
• The User Label must be not in use by another Traffic Classifier.
• The maximum number of Traffic Classifiers must not be reached.

Task
From the MS-GUI Main menu:
...................................................................................................................................................................................................

1 Select Action > Packet > Services > Create Traffic Classifier.
Result: The Create Traffic Classifier windows opens.
...................................................................................................................................................................................................

2 To create a Traffic Classifier the following data must be entered:


• Enter a User Label.
• Select a Classification Type.
• Enter a Priority Identifier (value between 0 and 7, Untagged, Do not care). It
represents a value of field priority bit contained in VLAN tagged Ethernet frame.
• Enter a VLAN Identifier (value between 0 and 4095). It represents the identifier of a
particular logical flow (logical grouping of stations).
• Enter a value for IP DSCP (value between 0 and 63).
• Enter a Priority Max (value between 0 and 7). It represents the maximum value of
priority range (0 if a range is not used).
• Enter a VLAN Max (value between 0 and 4095). It represents the maximum value of
VLAN range (0 if a range is not used).

....................................................................................................................................................................................................................................
18-160 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
End to End Ethernet Provisioning Management Create a Traffic Classifier
Managing Traffic Classifiers
....................................................................................................................................................................................................................................
• Enter a value for IP DSCP Max (value between 0 and 63).
• Select the EtherType.
...................................................................................................................................................................................................

3 Click Ok button.
Result: After checking the coherence of the traffic parameters values, the Traffic
Classifier is created.
The Traffic Classifier List is updated.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS 18-161
8DG42227DAAA 9.6
Issue 3 December 2012
End to End Ethernet Provisioning Management Modify a Traffic Classifier
Managing Traffic Classifiers
....................................................................................................................................................................................................................................

Modify a Traffic Classifier


When to use
The function modifies Traffic Classifier characteristics.

Related Information
Default Traffic Classifier cannot be modified.
The Traffic Classifier modification gives the possibility to modify:
• Traffic Classifier User Label.
• Priority Id, VLAN Id, Priority Max and/or VLAN Max.
For more information, refer to “Traffic Classifier description” (p. 18-156).

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Conditions
To get a positive result:
• The new User Label must be not in use by another Traffic Classifier.
• The Traffic Classifier is not in use by any Ethernet Segments.
• The Traffic Classifier is associated to one or more Ethernet Segments in the Defined
provisioning state.

Task
From the MS-GUI Main menu:
...................................................................................................................................................................................................

1 Select Search > Packet > Services > Traffic Classifiers.


...................................................................................................................................................................................................

2 On the Traffic Classifier List, select the Traffic Classifier to modify. Select with the right
mouse button the path Modify.

....................................................................................................................................................................................................................................
18-162 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
End to End Ethernet Provisioning Management Modify a Traffic Classifier
Managing Traffic Classifiers
....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

3 The Modify Traffic Classifier window is displayed.

Figure 18-58 Traffic Classifier Modification window

To modify a Traffic Classifier:


• Enter a new User Label (optional).
• Modify the Priority Id (optional).
• Modify the VLAN Id (optional).
• Modify the Priority Max (optional).
• Modify the VLAN Max (optional).
...................................................................................................................................................................................................

4 Click Ok button.
Result: After confirmation of the modification, 1350 OMS PKT checks the
consistence of the traffic parameter values and then, the Traffic Classifier list is
updated.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS 18-163
8DG42227DAAA 9.6
Issue 3 December 2012
End to End Ethernet Provisioning Management Delete a Traffic Classifier
Managing Traffic Classifiers
....................................................................................................................................................................................................................................

Delete a Traffic Classifier


When to use
This function consists in deleting a Traffic Classifier from the supervision.

Related Information
Default Traffic Classifier cannot be deleted.
For more information, refer to “Traffic Classifier description” (p. 18-156).

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Conditions
To get a positive result:
• No more Ethernet Segments are using this Traffic Classifier.

Task
From the MS-GUI Main menu:
...................................................................................................................................................................................................

1 Select Search > Packet > Services > Traffic Classifiers.


...................................................................................................................................................................................................

2 On the Traffic Classifier List Window, select the traffic descriptor to delete. Select with
the right mouse button from the popup menu Action > Traffic Classifier > Delete.
...................................................................................................................................................................................................

3 Select one of the options in the confirmation box. Refer to the procedure “Confirm the
action” (p. 11-40).
Result: After confirmation, the Traffic Classifier are removed.
The Traffic Classifier list is updated.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
18-164 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
End to End Ethernet Provisioning Management Get the Traffic Classifier Properties
Managing Traffic Classifiers
....................................................................................................................................................................................................................................

Get the Traffic Classifier Properties


When to use
This function gets information about a Traffic Classifier.

Related Information
For more information, refer to “Traffic Classifier description” (p. 18-156).

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.

Task
From the MS-GUIMain view:
...................................................................................................................................................................................................

1 Select Search > Packet > Services > Traffic Classifiers.


...................................................................................................................................................................................................

2 On the Traffic Classifier List Window, select a Traffic Classifier. Select with the right
mouse button from the popup menu Properties.
...................................................................................................................................................................................................

3 The Properties window is displayed.

....................................................................................................................................................................................................................................
1350 OMS 18-165
8DG42227DAAA 9.6
Issue 3 December 2012
End to End Ethernet Provisioning Management Get the Traffic Classifier Properties
Managing Traffic Classifiers
....................................................................................................................................................................................................................................
See the following topic in this document: “Details of a Traffic Classifier” (p. 18-167)

Figure 18-59 Traffic Classifier Properties window

E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
18-166 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
End to End Ethernet Provisioning Management Details of a Traffic Classifier
Managing Traffic Classifiers
....................................................................................................................................................................................................................................

Details of a Traffic Classifier


Attributes of a Traffic Classifier
The attributes displayed for each Traffic Classifier are:
• Id.
• User Label.
• Ethernet Segment Id.
• Ethernet Segment.
• VLAN Id.
• VLAN Max.
• Priority Identifier.
• Priority Max.
• EVC Port Id Label
• ESG Port Id Label
• DSCP (Differentiated Services Code Point).
• DSCP Max.
• EtherType.

....................................................................................................................................................................................................................................
1350 OMS 18-167
8DG42227DAAA 9.6
Issue 3 December 2012
End to End Ethernet Provisioning Management Overview about Ethernet edge physical ports
Managing Ethernet ETS Edge Physical Ports
....................................................................................................................................................................................................................................

Managing Ethernet ETS Edge Physical Ports

Overview about Ethernet edge physical ports


Ethernet edge physical ports description
The Ethernet edge physical ports represent the border of the network managed by the
1350 OMS PKT.
They are the extremities of Ethernet Services, EVCs, and Ethernet Segments and they
represent UNIs and IWIs.
An Ethernet edge physical port is in the Ethernet Domain, the image of an Ethernet
Physical Port (PPT) or an External Termination Point (ETP) in the Construction Domain.

Ethernet edge physical port attributes


The fundamental attributes of an Ethernet physical edge port are:
• The Activation State that tells whether the port is active or not. If active, the port can
carry traffic/is carrying traffic.
• The VLAN Type (that identifies the VLAN Tag protocol Type used to distinguish
tagged and untagged frames and to form new VLAN Tags using push operations).
Ethernet edge physical port cannot be explicitly created or deleted by the user: Port is
automatically created when a proper PPT or ETP is created. Port is automatically deleted
when the related Construction object is deleted.

Ethernet edge physical port and VLAN


Whenever a new Ethernet edge physical port is created, it comes with an Activation State
and a VLAN Type that is aligned with what defined in the NE to which the Edge port
belongs. If the edge port is ETP then the Activation State is Down and the VLAN Type is
the default one (that is, 8100 hexadecimal).
In the scope of MEF alignment, a set of attributes is added to Ethernet Edge Port
(intended as UNI).
The Edge ports support the VLAN Type according to the board they belong to. The
boards like ISA PR EA supports any VLAN Type. The boards like ISA PR ES supports
only the standard VLAN. The boards like ISA E/FE/GE and ISA ES1/4 do not support
any VLAN.

....................................................................................................................................................................................................................................
18-168 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
End to End Ethernet Provisioning Management Display the ETS edge port list
Managing Ethernet ETS Edge Physical Ports
....................................................................................................................................................................................................................................

Display the ETS edge port list


When to use
The Edge Port List window presents all the edge ports and their attributes.

Related Information
For more information, refer to “Ethernet edge physical ports description” (p. 18-168).

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.

Task
From the MS-GUIMain view:
...................................................................................................................................................................................................

1 Select Search > Packet > Services.


Result: The menu of the Services is shown.
...................................................................................................................................................................................................

2 Select Connection Oriented (ETS) > ETS Edge Ports.


Result: The list window is displayed.
The attributes displayed for each edge port are:
• User Label.
• Network Element.
• Usage State (Busy, Reserved, Not Meaningful, Idle).
• Rate.
• Activation State (Down, Up).
• VLAN Type.
• Interface Type.

E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS 18-169
8DG42227DAAA 9.6
Issue 3 December 2012
End to End Ethernet Provisioning Management Modify an edge port
Managing Ethernet ETS Edge Physical Ports
....................................................................................................................................................................................................................................

Modify an edge port


When to use
This function allows to modify the characteristics of a selected edge port.

Related Information
For more information, refer to “Ethernet edge physical ports description” (p. 18-168).
Details when modifying the edge port characteristics:
• Max Number of EVC: the number of EVC that must be allowed on that UNI. ( > = 1).
• Service Multiplexing: new attribute for all Edge ports.
Default value:
– Yes for ETS, ETS_P, ETB (Virt).
– No for ETB (MAC).
– Modifiable in all cases except ETB (MAC).
This attribute is checked against the other attributes like: Max Number of EVC,
Bundling and AllToOneBundling. The check is performed at attribute set and at UNI
usage.
• Bundling: checked if the EVC can be mapped with one or more VLAN, not checked
if one EVC can be mapped only with one VLAN.
• All to one Bundling: checked if the EVC maps all VLAN existing on that UNI (that
is, one EVC only on that UNI), not checked if the mapping is performed differently.

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Conditions
To get a positive result:
• The edge port must be not active (for example: activation state equal to Down).
• The edge port must not be an ENE edge port.
• The edge port can be involved in defined Ethernet Segments only.

Task
From the MS-GUI Main menu:
...................................................................................................................................................................................................

1 Select Search > Packet > Services > Connection Oriented (ETS) > ETS Edge Ports.

....................................................................................................................................................................................................................................
18-170 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
End to End Ethernet Provisioning Management Modify an edge port
Managing Ethernet ETS Edge Physical Ports
....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

2 On the Edge Port List, select the Edge Port to modify. Select with the right mouse button
the path Modify or Action > Modify from the main menu.
...................................................................................................................................................................................................

3 The Modify Edge Port window is displayed.

Figure 18-60 Edge Port Modification window

To modify the edge port characteristics:


• Max Number of EVC.
• Service Multiplexing.
• Bundling.
• All to one Bundling.
...................................................................................................................................................................................................

4 Click Ok button.
Result: After confirmation of the modification: the new attribute values are
downloaded to the NE at the implementation time.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS 18-171
8DG42227DAAA 9.6
Issue 3 December 2012
End to End Ethernet Provisioning Management Configure an ETS Edge Port
Managing Ethernet ETS Edge Physical Ports
....................................................................................................................................................................................................................................

Configure an ETS Edge Port


When to use
This function consists in configuring the VLAN type of a selected edge port.

Related Information
For more information, refer to “Ethernet edge physical ports description” (p. 18-168).

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Conditions
To get a positive result:
• The edge port must not be active (for example: activation state equal to Down).
• The edge port can be involved in defined Ethernet Segments only.
• The edge port must not be an ENE edge port.

Task
From the MS-GUI Main menu:
...................................................................................................................................................................................................

1 Select Search > Packet > Services > Connection Oriented (ETS) > ETS Edge Ports.
...................................................................................................................................................................................................

2 On the Traffic Classifier List, select the Traffic Classifier to modify. Follow the path
Action > ETS Edge Port > Edge Port Configuration.

....................................................................................................................................................................................................................................
18-172 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
End to End Ethernet Provisioning Management Configure an ETS Edge Port
Managing Ethernet ETS Edge Physical Ports
....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

3 The Edge Port configuration window is displayed.

Figure 18-61 Edge Port Configuration window

To modify the edge port characteristics:


• Vlan Type: Insert the Vlan Type selecting it from the defined Vlan type list.
...................................................................................................................................................................................................

4 Click Ok button.

....................................................................................................................................................................................................................................
1350 OMS 18-173
8DG42227DAAA 9.6
Issue 3 December 2012
End to End Ethernet Provisioning Management Configure an ETS Edge Port
Managing Ethernet ETS Edge Physical Ports
....................................................................................................................................................................................................................................
Result: After confirmation of the modification: the VLAN type is downloaded to the
NE at the implementation time.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
18-174 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
End to End Ethernet Provisioning Management Get the ETS Edge Port Properties
Managing Ethernet ETS Edge Physical Ports
....................................................................................................................................................................................................................................

Get the ETS Edge Port Properties


When to use
This function gets information about an ETS edge port.

Related Information
For more information, refer to “Ethernet edge physical ports description” (p. 18-168).

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.

Task
From the MS-GUI Main menu:
...................................................................................................................................................................................................

1 Select Search > Packet > Services > Connection Oriented (ETS) > ETS Edge Ports.
...................................................................................................................................................................................................

2 On the ETS Edge Port List Window, select an Edge Port. Select with the right mouse
button from the popup menu Properties.
...................................................................................................................................................................................................

3 The Properties window is displayed.


The attributes displayed for each edge port are:
• User Label.
• Network Element.
• Usage State (Busy, Reserved, Not Meaningful, Idle).
• Rate.
• Activation State (Down, Up).

....................................................................................................................................................................................................................................
1350 OMS 18-175
8DG42227DAAA 9.6
Issue 3 December 2012
End to End Ethernet Provisioning Management Get the ETS Edge Port Properties
Managing Ethernet ETS Edge Physical Ports
....................................................................................................................................................................................................................................
• VLAN Type.
• Interface Type.

Figure 18-62 Edge Port Properties window

E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
18-176 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
End to End Ethernet Provisioning Management Display the traffic parameter list
Managing Ethernet ETS Edge Physical Ports
....................................................................................................................................................................................................................................

Display the traffic parameter list


When to use
The Traffic Parameter List window presents all the information about the traffic
parameters of the selected edge port.

Related Information
This list is filled only when the Edge port is involved in an Ethernet Segment and
contains Traffic Classifier and Traffic Descriptor.
For more information, refer to “Ethernet edge physical ports description” (p. 18-168).

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.

Task
From the MS-GUI Main menu:
...................................................................................................................................................................................................

1 Select Search > Packet > Services > Connection Oriented (ETS) > ETS Edge Ports.
...................................................................................................................................................................................................

2 On the ETS Edge Port List Window, select an Edge Port. Select with the right mouse
button from the popup menu Action from Ets Edge Port > Traffic Parameter List.
Result: The Traffic Parameter List window is displayed.
See the following topic in this document: “Description of the list of Traffic
Parameters” (p. 18-178)
...................................................................................................................................................................................................

3 Selecting a Traffic Parameter in the list, the corresponding properties window can be
displayed selecting with the right mouse button the item Properties from the popup
menu.
Result: The property window is displayed.
See the following topic in this document: “Details of Traffic Parameters” (p. 18-179)
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS 18-177
8DG42227DAAA 9.6
Issue 3 December 2012
End to End Ethernet Provisioning Management Description of the list of Traffic Parameters
Managing Ethernet ETS Edge Physical Ports
....................................................................................................................................................................................................................................

Description of the list of Traffic Parameters


Attributes of a Traffic Parameter
The attributes displayed for each traffic parameter are:
• Ethernet Flow.
• Edge port Role.
• Class of Service (Best Effort, Guaranteed, Regulated).
• Traffic Descriptor associated to the Ethernet Segment.
• CIR.
• PIR.
• EIR.
• Traffic Classifier associated to the Ethernet Segment.
• VLAN Identifier.
• VLAN Range.
• Priority Identifier.
• Priority Range.

....................................................................................................................................................................................................................................
18-178 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
End to End Ethernet Provisioning Management Details of Traffic Parameters
Managing Ethernet ETS Edge Physical Ports
....................................................................................................................................................................................................................................

Details of Traffic Parameters


Attributes of a Traffic Parameter
The attributes displayed for each traffic parameter are:
• Ethernet Flow.
• Edge port Role.
• Class of Service (Best Effort, Guaranteed, Regulated).
• Traffic Descriptor associated to the Ethernet Segment.
• CIR.
• PIR.
• EIR.
• Traffic Classifier associated to the Ethernet Segment.
• VLAN Identifier.
• VLAN Range.
• Priority Identifier.
• Priority Range.

....................................................................................................................................................................................................................................
1350 OMS 18-179
8DG42227DAAA 9.6
Issue 3 December 2012
End to End Ethernet Provisioning Management Navigation to equipment
Managing Ethernet ETS Edge Physical Ports
....................................................................................................................................................................................................................................

Navigation to equipment
When to use
This procedure permits to navigate to the Equipment starting from Edge Port List, with
port selection.

Related Information
For more information about Edge Port, refer to “Ethernet edge physical ports description”
(p. 18-168).

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
Note: The navigation does not run if the address of the target server is not defined in
the file hosts of the PC where the MS-GUI is running.
The MS-GUI is set to map mode.

Task
From the MS-GUI Main menu:
...................................................................................................................................................................................................

1 Select Search > Packet > Services > Connection Oriented (ETS) > ETS Edge Ports.
Result: The list window is shown.
...................................................................................................................................................................................................

2 Select one Edge Port in the list.


...................................................................................................................................................................................................

3 Select Search > Inventory from Edge Port > External Navigation to > GUI.

....................................................................................................................................................................................................................................
18-180 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
End to End Ethernet Provisioning Management Navigation to equipment
Managing Ethernet ETS Edge Physical Ports
....................................................................................................................................................................................................................................
Result: The Show Equipment window is shown.

Figure 18-63 Show Equipment window

E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS 18-181
8DG42227DAAA 9.6
Issue 3 December 2012
End to End Ethernet Provisioning Management Show PM on an Edge Port
Managing Ethernet ETS Edge Physical Ports
....................................................................................................................................................................................................................................

Show PM on an Edge Port


When to use
This function Shows Performance Monitoring (PM) on a Connection Oriented Edge Port
or Connection Less Edge Port.

Related Information
For more information about Edge Port, refer to “Ethernet Edge Port management”
(p. 11-51).
For more information about PM, refer to “Quality of service: PM management ”
(p. 11-69).

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.

Task
From the MS-GUI Main view:
...................................................................................................................................................................................................

1 Select Search > Packet > Services.


Result: The Service menu is shown.
...................................................................................................................................................................................................

2 Select Connection Oriented (ETS) > ETS Edge Ports or Connection Less (Bridge) >
Bridge Edge Ports.
Result: The Edge Ports list is displayed.
...................................................................................................................................................................................................

3 Select the Edge Ports in the list and follow the path Search > Edge Port > Show > PM.
Result: The PM related to the Edge Port is shown.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
18-182 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
End to End Ethernet Provisioning Management Show External Termination Point
Managing Ethernet ETS Edge Physical Ports
....................................................................................................................................................................................................................................

Show External Termination Point


When to use
This procedure show the Edge Port External Termination Points.

Related Information
For more information about Edge Port, refer to “Ethernet edge physical ports description”
(p. 18-168).

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.

Task
From the MS-GUI Main menu:
...................................................................................................................................................................................................

1 Select Search > Packet > Services > Connection Oriented (ETS) > ETS Edge Ports.
Result: The list window is shown.
...................................................................................................................................................................................................

2 Select one Edge Port in the list.


...................................................................................................................................................................................................

3 Select Search > Edge Port > Show > External Termination Point.
Result: The External Termination Point list is shown.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS 18-183
8DG42227DAAA 9.6
Issue 3 December 2012
End to End Ethernet Provisioning Management Overview about Ethernet Transport Links
Managing Ethernet Transport Links
....................................................................................................................................................................................................................................

Managing Ethernet Transport Links

Overview about Ethernet Transport Links


Ethernet Transport Link description
The Ethernet Transport Link represents the elementary link that supports the connectivity
provisioned by the Ethernet Traffic Management Domain, that is, Ethernet links (and by
extensions EVCs and Services).
An Ethernet Transport Link is the image, on the Ethernet Domain, of a Transport Link of
the Construction Domain.
The Ethernet Transport Link cannot be explicitly created or deleted by the user. The
Ethernet Transport Link is automatically created when a Transport Link dedicated to
Ethernet is created and is automatically deleted when the related Transport Link is
deleted.

Transport Link attributes


Important attributes for a Transport Link are the Configuration State and, considering its
extremities, the Activation State and the VLAN Type.
To be able to transport Ethernet traffic, the extremities of the Transport Link must be
"activated", that is, a specific configuration must be performed on the NEs that host
terminations to activate them.
For this reason, at creation time, the Activation State of the Transport Link terminations is
checked (uploading it from the corresponding NEs) and each non-active termination is
activated.
To manage VLAN tagged frames, a port (and in particular an end point of a Transport
Link) must be configured with a proper VLAN Tag Protocol Type (used to distinguish
tagged and untagged frames and to form new VLAN Tags using push operations).
The VLAN Type attribute of the Transport Link extremities is managed in two ways:
• at creation time, the VLAN Tag Protocol Type for each Transport Link extremity is
uploaded from the related NEs and the VLAN Type attribute is set. If in the 1350
OMS PKT there is no VLAN Type equivalent of the uploaded VLAN Tag Protocol
Type, a new VLAN Type (with a proper user label) is created to model the latter.
• an operation is provided to configure the VLAN Tag Protocol Type of the extremities
of a Transport Link after its creation.

....................................................................................................................................................................................................................................
18-184 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
End to End Ethernet Provisioning Management Overview about Ethernet Transport Links
Managing Ethernet Transport Links
....................................................................................................................................................................................................................................
Transport Link states
At any time, the configuration state of an Ethernet Transport Link could be recalculated
and set to:
• Configured: If both extremities are active and are configured with the same VLAN
Tag protocol type.
• Partially Configured: If only one extremity is active or when both extremities are
active but are configured with two different VLAN Tag protocol types.
• Not Configured: If both extremities are not active.

....................................................................................................................................................................................................................................
1350 OMS 18-185
8DG42227DAAA 9.6
Issue 3 December 2012
End to End Ethernet Provisioning Management Display the Ethernet ETS Transport Link list
Managing Ethernet Transport Links
....................................................................................................................................................................................................................................

Display the Ethernet ETS Transport Link list


When to use
The Ethernet Transport Link List window presents all the Ethernet Transport Links and
their attributes.

Related Information
If this list is required from the Ethernet Segment List, only the Transport Links associated
to the selected Ethernet Segment is displayed.
If this list is required from the VLAN type list, only Transport Links whose edge ports are
associated to the selected VLAN type is displayed.
For details see “Overview about Ethernet Transport Links” (p. 18-184).

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Conditions
To get a positive result:
• The Transport Link must not be in use by an Ethernet Segment (Its usage state must
be Idle).
• The Transport Link must have a SDH or Cable technology.

Task
From the MS-GUIMain view:
...................................................................................................................................................................................................

1 Select Search > Packet > Services.


Result: The menu of the Services is shown.
...................................................................................................................................................................................................

2 Select Connection Oriented (ETS) > ETS Transport Links.


Result: The list window is displayed.
See the following topic in this document: “Description of the list of ETS Transport
Links” (p. 18-187)
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
18-186 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
End to End Ethernet Provisioning Management Description of the list of ETS Transport Links
Managing Ethernet Transport Links
....................................................................................................................................................................................................................................

Description of the list of ETS Transport Links


Attributes of an ETS Transport Link
The attributes displayed for each Transport Link are:
• User Label.
• Subnetwork.
• Technology (MPLS, SDH, Cable).
• Guaranteed Bandwidth.
• Best Effort Bandwidth.
• Usage State (Idle, Busy, Reserved, Not Meaningful).
• Working State (Normal, Configuring, Removing).
• Configuration State (Configured, Partially Configured, Not Configured).

....................................................................................................................................................................................................................................
1350 OMS 18-187
8DG42227DAAA 9.6
Issue 3 December 2012
End to End Ethernet Provisioning Management Configure an ETS Transport Link
Managing Ethernet Transport Links
....................................................................................................................................................................................................................................

Configure an ETS Transport Link


When to use
This function permits to change the VLAN Protocol Type of Transport Link extremities.

Related Information
The VLAN Type is not an attribute of the Transport Link. The VLAN Type is an attribute
of its extremities (that is, Transport Link terminations). So, VLAN Type is displayed in
the extremity window of the Transport Link.
For these reasons, while the Edge port modification command acts on one Edge port (and
its attributes), the Transport Link configuration command acts only on the Transport Link
terminations (that is, a shortcut for the user, to avoid him to configure separately the two
terminations.
For details see “Overview about Ethernet Transport Links” (p. 18-184).
Transport Link states
After confirmation, the Configuration state of the Transport Link is recalculated and set
to:
• Configured: if both extremities are active and are configured with the same VLAN
Tag Protocol Type.
• Partially Configured: if only one extremity is active (while the other is not active) or
when both extremities are active but are configured with two different VLAN Tag
Protocol Types.
• Not Configured: if both extremities are not active.
Transport Link VLAN
The ports at the extremities of the Transport Link are active and configured with the
VLAN Type:
• They recognize as tagged only the Ethernet frames that are tagged with the same
VLAN type.
• Any push operation (that is, VLAN constraint of type "Push") defined on them uses
the specified VLAN type to create (and push) new VLAN tags.

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.

....................................................................................................................................................................................................................................
18-188 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
End to End Ethernet Provisioning Management Configure an ETS Transport Link
Managing Ethernet Transport Links
....................................................................................................................................................................................................................................
Conditions
To get a positive result:
• The Transport Link must not be in use by an Ethernet Segment (Its usage state must
be Idle).
• The Transport Link must have a SDH or Cable technology.

Task
From the MS-GUIMain view:
...................................................................................................................................................................................................

1 Select Search > Packet > Services > Connection Oriented (ETS) > ETS Transport
Links.
...................................................................................................................................................................................................

2 On the Traffic Classifier List, select the Traffic Classifier to modify. Follow the path
Action > Transport Link > Transport Link Configuration.
...................................................................................................................................................................................................

3 The Transport Link configuration window is displayed.


To configure a Transport Link:
• Select a Service Type (by using the sensitive help).
• Select a VLAN Type (by using the sensitive help) or select True for the
Set standard VLAN Type (8100).
...................................................................................................................................................................................................

4 Click Ok button.
Result: The Transport Link configuration state is changed.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS 18-189
8DG42227DAAA 9.6
Issue 3 December 2012
End to End Ethernet Provisioning Management Get the Transport Link extremities
Managing Ethernet Transport Links
....................................................................................................................................................................................................................................

Get the Transport Link extremities


When to use
This function gets information about the extremities of a Transport Link.

Related Information
For details see “Overview about Ethernet Transport Links” (p. 18-184).

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Conditions
To get a positive result:
• The Transport Link must not be in use by an Ethernet Segment (Its usage state must
be Idle).
• The Transport Link must have a SDH or Cable technology.

Task
From the MS-GUIMain view:
...................................................................................................................................................................................................

1 Select Search > Packet > Services > Connection Oriented (ETS) > ETS Transport
Links.
...................................................................................................................................................................................................

2 On the Traffic Classifier List, select the Traffic Classifier to modify. Follow the path
Action > Transport Link > Extremities.

....................................................................................................................................................................................................................................
18-190 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
End to End Ethernet Provisioning Management Get the Transport Link extremities
Managing Ethernet Transport Links
....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

3 The Transport Link Extremities window is displayed.

Figure 18-64 Transport Link Extremities window

The window allows to modify:


• The Network Element.
• The NE Type (by using the sensitive help).
• The Termination User Label (by using the sensitive help).
• The Activation State (by using the sensitive help).
...................................................................................................................................................................................................

4 Click Ok button.

....................................................................................................................................................................................................................................
1350 OMS 18-191
8DG42227DAAA 9.6
Issue 3 December 2012
End to End Ethernet Provisioning Management Get the Transport Link extremities
Managing Ethernet Transport Links
....................................................................................................................................................................................................................................
Result: After confirmation the extremities data are updated.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
18-192 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
End to End Ethernet Provisioning Management Get the Transport Link properties
Managing Ethernet Transport Links
....................................................................................................................................................................................................................................

Get the Transport Link properties


When to use
This function gets information about a Transport Link.

Related Information
For details see “Overview about Ethernet Transport Links” (p. 18-184).

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.

Task
From the MS-GUIMain view:
...................................................................................................................................................................................................

1 Select Search > Packet > Services > Connection Oriented (ETS) > ETS Transport
Links.
...................................................................................................................................................................................................

2 On the Transport Link List, select the Transport Link to see the properties. Follow the
path Action > Properties.

....................................................................................................................................................................................................................................
1350 OMS 18-193
8DG42227DAAA 9.6
Issue 3 December 2012
End to End Ethernet Provisioning Management Get the Transport Link properties
Managing Ethernet Transport Links
....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

3 The Transport Link Properties window is displayed.

Figure 18-65 Transport Link Properties window

...................................................................................................................................................................................................

4 Click the window Close button.


Result: The properties window is closed.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
18-194 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
End to End Ethernet Provisioning Management Details of ETS Transport Links
Managing Ethernet Transport Links
....................................................................................................................................................................................................................................

Details of ETS Transport Links


Attributes of an ETS Transport Link
The attributes displayed for each Transport Link are:
• Id.
• User Label.
• Subnetwork Id Label.
• Subnetwork.
• Technology (MPLS, SDH, Cable).
• Directionality.
• Ethernet Segment Id.
• Ethernet Segment.
• Usage State (Idle, Busy, Reserved, Not Meaningful).
• Working State (Normal, Configuring, Removing).
• A END Id label.
• Z END Id label.
• A END Type label.
• Z END Type label.
• Forward cost.
• Backward cost.
• Guaranteed Bandwidth.
• Best Effort Bandwidth.
• Transport Link Label.
• Consistency State.
• Configuration State (Configured, Partially Configured, Not Configured).
• VLAN Id.
• VLAN Type.
• NAD.

....................................................................................................................................................................................................................................
1350 OMS 18-195
8DG42227DAAA 9.6
Issue 3 December 2012
End to End Ethernet Provisioning Management Display the Transport Link bandwidth load
Managing Ethernet Transport Links
....................................................................................................................................................................................................................................

Display the Transport Link bandwidth load


When to use
This function gets information about the bandwidth load of a Transport Link.

Related Information
For details see “Overview about Ethernet Transport Links” (p. 18-184).

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.

Task
From the MS-GUIMain view:
...................................................................................................................................................................................................

1 Select Search > Packet > Services > Connection Oriented (ETS) > ETS Transport
Links.
...................................................................................................................................................................................................

2 On the Traffic Classifier List, select the Traffic Classifier to modify. Follow the path
Action Transport Link > Bandwidth Load.
...................................................................................................................................................................................................

3 The Transport Link Bandwidth Load window is displayed.


...................................................................................................................................................................................................

4 Click the window Close button.


Result: The properties window is closed.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
18-196 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
End to End Ethernet Provisioning Management Overview about Ethernet Segments
Managing Ethernet Segments
....................................................................................................................................................................................................................................

Managing Ethernet Segments

Overview about Ethernet Segments


Ethernet Segment description
An Ethernet Segment is a unidirectional end-to-end connection between two Ethernet
physical ports (that is, between two PEs).
Every Ethernet Segment is terminated by means of two Ethernet Edge ports which
represent the terminations in the Provider Edges (where the Ethernet traffic "enter
in"/"exit from" the managed network).
An Ethernet Edge Physical port can support different Ethernet traffics.
Each Ethernet Segment is built by means of a series of Ethernet Links.
Ethernet Links (Transport Links) are unidirectional connections terminated by means of
two Ethernet Link Terminations.
The conjunction between two Ethernet Links is made by a cross connection named
Ethernet Switch.

Ethernet Segment representation

Figure 18-66 Ethernet Segment representation

....................................................................................................................................................................................................................................
1350 OMS 18-197
8DG42227DAAA 9.6
Issue 3 December 2012
End to End Ethernet Provisioning Management Overview about Ethernet Segments
Managing Ethernet Segments
....................................................................................................................................................................................................................................
Bandwidth check for Transport Links
The following bandwidth checks are executed for SDH and Cable Transport Link:
• The sum of all CIR of Ethernet Segments allocated using the Transport Link must be
less or equal the total bandwidth of the Transport Link; this check is executed
separately for forward and backward direction.
• The PIR of Ethernet Segment must be less than or equal to of the total bandwidth.
• The number of best effort Ethernet Segments must be less than or equal to the
configuration limit.

Bandwidth check for MPLS connections


For MPLS Transport Link:
• The PIR, CIR, CBS and PBS of Ethernet Segment must be less than or equal to the
same values associated to Transport Link.

Bandwidth check for multicast connections


The bandwidth check for multicast connections is executed taking this connection type in
account. If more Ethernet Segments use the same Transport Link, the bandwidth
reservation is considered only for one Ethernet Segment.
For the extremities of the Ethernet Segment, the following bandwidth checks are
executed:
• For Aend and Zend: The sum of CIR of the Ethernet Segment that uses the port as
Aend/Zend + the CIR of the Ethernet Segment that is allocating <= rate of the port.
Another check that must be executed is: only one Color Profile can be defined on the
same port; the Color Profile is managed based on port granularity, when a same port is
used by different Ethernet Segment, the same Color Profile must be defined.
A VLAN compatibility check is also performed (that is, verify that the same termination
ingress of connection with the same VLAN is not used more than once).
The Transport Link usage state is set to busy the first time that Transport Link is used by
one Ethernet Segment.
The bandwidth parameters of all involved Transport Links are updated taking into
account the bandwidth configured for the Ethernet Segment; the available bandwidth
(guaranteed) is decreased of the CIR value associated to the Ethernet Segment.
Then, the Ethernet Segment List is updated with, for each selected Ethernet Segment,
Provisioning state set to Allocated.
The provisioning state of the related EVC is updated in Allocated or Partially Allocated.

....................................................................................................................................................................................................................................
18-198 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
End to End Ethernet Provisioning Management Display the Ethernet Segment list
Managing Ethernet Segments
....................................................................................................................................................................................................................................

Display the Ethernet Segment list


When to use
The Ethernet Segment List window presents all the Ethernet Segments and their
attributes.

Related Information
If this list is required from the Ethernet Service, Traffic Descriptor, Traffic Classifier, or
Color Profile list, only the Ethernet Segments associated to the selected the object is
displayed..
See “Ethernet Segment description” (p. 18-197).

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.

Task
From the MS-GUIMain view:
...................................................................................................................................................................................................

1 Select Search > Packet > Services.


Result: The menu of the Services is shown.
...................................................................................................................................................................................................

2 Select Connection Oriented (ETS) > Ethernet Segments.


Result: The list window is displayed.
See the following topic in this document: “Description of the list of Ethernet
Segments” (p. 18-200)
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS 18-199
8DG42227DAAA 9.6
Issue 3 December 2012
End to End Ethernet Provisioning Management Description of the list of Ethernet Segments
Managing Ethernet Segments
....................................................................................................................................................................................................................................

Description of the list of Ethernet Segments


Ethernet Segment description
An Ethernet Segment is a unidirectional end-to-end connection between two Ethernet
physical ports (that is, between two PEs).
Every Ethernet Segment is terminated by means of two Ethernet Edge ports which
represent the terminations in the Provider Edges (where the Ethernet traffic "enter
in"/"exit from" the managed network).
An Ethernet Edge Physical port can support different Ethernet traffics.
Each Ethernet Segment is built by means of a series of Ethernet Links.
Ethernet Links (Transport Links) are unidirectional connections terminated by means of
two Ethernet Link Terminations.
The conjunction between two Ethernet Links is made by a cross connection named
Ethernet Switch.

Ethernet Segment representation

Figure 18-67 Ethernet Segment representation

Attributes of a Ethernet Segment


The attributes displayed for each Ethernet Segment are:
• User Label.
• Subnetwork.
• EVC.

....................................................................................................................................................................................................................................
18-200 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
End to End Ethernet Provisioning Management Description of the list of Ethernet Segments
Managing Ethernet Segments
....................................................................................................................................................................................................................................
• Policy Mode (Color Blind, Color Aware, Disabled).
• Working State (Normal, Configuring, Allocating, De-allocating, Implementing,
De-implementing, Commissioning, De-commissioning, Constraint adding,
Constraint removing).
• Provisioning State (Defined, Partially Allocated, Allocated, Partially
Implemented, Implemented).
• Availability Status (Normal, Degraded, In Failure, Not Meaningful).

....................................................................................................................................................................................................................................
1350 OMS 18-201
8DG42227DAAA 9.6
Issue 3 December 2012
End to End Ethernet Provisioning Management Create an Ethernet Segment
Managing Ethernet Segments
....................................................................................................................................................................................................................................

Create an Ethernet Segment


When to use
This function consists in creating an Ethernet Segment.

Related Information
See “Ethernet Segment description” (p. 18-197).
Policy Mode
Policy Mode values and meaning:
• Disabled: no policy applies.
• Color Blind: Policy is enabled and based only on Traffic Descriptor parameters.
• Color Aware: Policy is enabled and based both on Traffic Descriptor parameters and
on Color Profile.
Color Profile
Color Profile depends on the selected Policy Mode:
• Policy Mode = Disabled: Color Profile can be defined.
• Policy Mode = Color Aware: Color Profile must be defined.
• Policy Mode = Color Blind: Color Profile cannot be defined.
Traffic Descriptor
Traffic Descriptor depends on the selected Policy Mode:
• Policy Mode = Disabled: No Traffic Descriptor.
• Policy Mode = Color Aware: the Traffic Descriptor must be Regulated.
• Policy Mode = Color Blind: the Traffic Descriptor must be Best Effort or Guaranteed.
Priority Mode
Priority Mode depends on the Policy Mode:
• If Policy Mode is Color Blind, choose the Priority Id value between 0 and 7,
Untagged, Do not care. The Priority Id is priority of all the packets after the push.
• If Policy Mode is Color Aware, choose Green Priority and Yellow Priority for all
green and yellow outgoing packets.

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.

....................................................................................................................................................................................................................................
18-202 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
End to End Ethernet Provisioning Management Create an Ethernet Segment
Managing Ethernet Segments
....................................................................................................................................................................................................................................
Conditions
To get a positive result:
• At least, one EVC, one Color Profile, one Traffic Descriptor, and two Edge Physical
Ports must exist.
• The User Label must be not in use.
• The Edge Physical Port can be in use by another Ethernet Segment provided that it
belongs to the same Ethernet service.

Task
From the MS-GUIMain view:
...................................................................................................................................................................................................

1 Select Action > Packet > Services > Connection Oriented (ETS) > Create Ethernet
Segment.
...................................................................................................................................................................................................

2 To create an Ethernet Segment:


On the Ethernet Segment Creation window General Panel
• Enter an Ethernet Segment User label.
• Enter the EVC the Ethernet Segment belongs to.
• Choose the EVC Termination or ENE on side "A" and on side "Z" by using the
sensitive help (each termination is composed of 'Network Element'+'User
Label'+'Role').
• Choose a Traffic Descriptor by using the sensitive help. See “Traffic Descriptor”
(p. 18-202).
• Select a Policy Mode (Disabled, Color Blind, Color Aware). See “Policy Mode”
(p. 18-202).
• Define a Color Profile by using the sensitive help (Regulated, Best Effort,
Guaranteed). See “Color Profile” (p. 18-202).
• Select the Classification Mode (Priority, DSCP).
• Enter a Comment (optional).
...................................................................................................................................................................................................

3 On the Pop Panel enter following data:


Execute the following steps:
• Specify a list of Traffic Classifiers references by using the icon that lists the Traffic
Classifier.
• Select one or more Traffic Classifier.
...................................................................................................................................................................................................

4 On the Push Panel enter following data:

....................................................................................................................................................................................................................................
1350 OMS 18-203
8DG42227DAAA 9.6
Issue 3 December 2012
End to End Ethernet Provisioning Management Create an Ethernet Segment
Managing Ethernet Segments
....................................................................................................................................................................................................................................
Execute the following steps:
• Enter the VLAN Id to be pushed.
• Select a Policy Mode (Disabled, Color Blind, Color Aware). See “Policy Mode”
(p. 18-202).
• Select the Priority Id (0, …,7, Untagged, Do not care,Green Priority,Yellow
Priority).
...................................................................................................................................................................................................

5 Click Ok.
Result: The Ethernet Segment is created into the 1350 OMS PKT with the following
state:
• Provisioning State: Defined.
• Availability Status: Normal.
• Working State: Normal.
If the usage state of each EVC termination is idle, the usage state is marked busy.
The tree area, the Ethernet Segment list, and the EVC list are updated.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
18-204 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
End to End Ethernet Provisioning Management Modify an Ethernet Segment
Managing Ethernet Segments
....................................................................................................................................................................................................................................

Modify an Ethernet Segment


When to use
The function modifies Ethernet Segment characteristics.

Related Information
See “Ethernet Segment description” (p. 18-197).
See “Color Profile” (p. 18-202).
See “Traffic Descriptor” (p. 18-202).
The Ethernet modification gives the possibility to modify one or all the following
parameters:
• Ethernet Segment User Label.
• Color Profile.
• Traffic Descriptor.
• Comment.

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Conditions
To get a positive result:
• If the User Label is modified, the new User Label must not be in use by another
Ethernet Segment.
• Traffic Descriptor is modifiable only when Ethernet Segment provisioning state is
Defined.
• Color Profile is modifiable only when Ethernet Segment provisioning state is Defined
or Allocated.

Task
From the MS-GUI Main view:
...................................................................................................................................................................................................

1 Select Search > Packet > Services > Connection Oriented (ETS) > Ethernet
Segments.
...................................................................................................................................................................................................

2 On the Ethernet Segment List Window, select the Segment to modify. Click the right
mouse button and select Modify on the popup menu.
....................................................................................................................................................................................................................................
1350 OMS 18-205
8DG42227DAAA 9.6
Issue 3 December 2012
End to End Ethernet Provisioning Management Modify an Ethernet Segment
Managing Ethernet Segments
....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

3 The Modify Segment window is displayed.

Figure 18-68 Ethernet Segment Modification window

To modify an Ethernet Segment:


• Enter a new User Label.
• Choose a new Traffic Descriptor by using the sensitive help, according to the Policy
Mode.
• Modify the Color Profile, by using the sensitive help, according to the Policy Mode.
• Modify the Classification Mode (Priority, DSCP).
• Modify the Comment (optional).

....................................................................................................................................................................................................................................
18-206 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
End to End Ethernet Provisioning Management Modify an Ethernet Segment
Managing Ethernet Segments
....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

4 Click Ok.
Result: The segment is modified.
If the Ethernet User Label is modified, the tree area, the Ethernet Segment list, and
the opened graphical views are updated.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS 18-207
8DG42227DAAA 9.6
Issue 3 December 2012
End to End Ethernet Provisioning Management Delete an Ethernet Segment
Managing Ethernet Segments
....................................................................................................................................................................................................................................

Delete an Ethernet Segment


When to use
This function consists in deleting an Ethernet Segment from the 1350 OMS PKT
supervision.

Related Information
See “Ethernet Segment description” (p. 18-197).

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Conditions
To get a positive result:
• The Ethernet Segment Provisioning state must be Defined.

Task
From the MS-GUI Main view:
...................................................................................................................................................................................................

1 Select Search > Packet > Services > Connection Oriented (ETS) > Ethernet
Segments.
...................................................................................................................................................................................................

2 On the Traffic Classifier List Window, select the traffic descriptor to delete. Select with
the right mouse button from the popup menu Action > Ethernet Segment > Delete.
...................................................................................................................................................................................................

3 Select one of the options in the confirmation box. Refer to the procedure “Confirm the
action” (p. 11-40).
Result: After confirmation, the Ethernet Segments are deleted.
If the Ethernet Edge Physical Port terminating the deleted Ethernet Segments is no
more used by any other Ethernet Segment, the Ethernet Edge Physical Port is marked
as "not busy" (Usage State set to idle).
The provisioning state of parent EVC is recalculated.
The Ethernet Segment list, the tree area, and the opened graphical views are updated.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
18-208 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
End to End Ethernet Provisioning Management Associate a Traffic Classifier to an Ethernet Segment
Managing Ethernet Segments
....................................................................................................................................................................................................................................

Associate a Traffic Classifier to an Ethernet Segment


When to use
This function consists in associating a Traffic Classifier to an Ethernet Segment.

Related Information
One or more Traffic Classifier can be associated to an Ethernet Segment.
If two Ethernet Segments share the same Edge port, the Traffic Classifiers associated to
them must refer different VLAN Bit and Priority Bit.
See “Ethernet Segment description” (p. 18-197).

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Conditions
To get a positive result:
• The Ethernet Segment Provisioning state must be Defined.

Task
From the MS-GUI Main view:
...................................................................................................................................................................................................

1 From the Multi Service GUI Main view, follow the path Search > Packet > Services >
Connection Oriented (ETS) > Ethernet Segments.
...................................................................................................................................................................................................

2 Select the Ethernet Segment in the list.


...................................................................................................................................................................................................

3 Follow the path Action > ETS Ethernet Segment > Associate Traffic Classifier.

....................................................................................................................................................................................................................................
1350 OMS 18-209
8DG42227DAAA 9.6
Issue 3 December 2012
End to End Ethernet Provisioning Management Associate a Traffic Classifier to an Ethernet Segment
Managing Ethernet Segments
....................................................................................................................................................................................................................................
Result: The corresponding windows opens.

Figure 18-69 Traffic Classifier Association (to an Ethernet Segment) window

...................................................................................................................................................................................................

4 To associate a Traffic Classifier to an Ethernet Segment:


• Choose a Traffic Classifier by using the sensitive help.
• Click Ok button.
Result: After confirmation, the Traffic Classifier is associated to the Ethernet
Segment.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
18-210 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
End to End Ethernet Provisioning Management Disassociate a Traffic Classifier to an Ethernet Segment
Managing Ethernet Segments
....................................................................................................................................................................................................................................

Disassociate a Traffic Classifier to an Ethernet Segment


When to use
This function consists in disassociating a Traffic Classifier from an Ethernet Segment.

Related Information
See “Ethernet Segment description” (p. 18-197).

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Conditions
To get a positive result:
• The Ethernet Segment Provisioning state must be Defined.

Task
From the MS-GUI Main view:
...................................................................................................................................................................................................

1 Select Search > Packet > Services > Connection Oriented (ETS) > Ethernet
Segments.
...................................................................................................................................................................................................

2 Select the Ethernet Segment in the list.


...................................................................................................................................................................................................

3 Follow the path Action > ETS Ethernet Segment > Disassociate Traffic Classifier.

....................................................................................................................................................................................................................................
1350 OMS 18-211
8DG42227DAAA 9.6
Issue 3 December 2012
End to End Ethernet Provisioning Management Disassociate a Traffic Classifier to an Ethernet Segment
Managing Ethernet Segments
....................................................................................................................................................................................................................................
Result: The corresponding windows opens.

Figure 18-70 Traffic Classifier disassociation (from an Ethernet Segment) window

...................................................................................................................................................................................................

4 To disassociate a Traffic Classifier from an Ethernet Segment:


• Choose a Traffic Classifier by using the sensitive help (only the associated Traffic
Classifiers to the concerned Ethernet Segment are displayed).
• Click Ok button.
Result: After confirmation, the Traffic Classifier is disassociated from the Ethernet
Segment.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
18-212 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
End to End Ethernet Provisioning Management Add a constraint to an Ethernet Segment
Managing Ethernet Segments
....................................................................................................................................................................................................................................

Add a constraint to an Ethernet Segment


When to use
This function consists in adding an allocation constraint to an Ethernet Segment.

Related Information
See “Ethernet Segment description” (p. 18-197).

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Conditions
To get a positive result:
• The Ethernet Segment Provisioning state must be Defined.

Task
From the MS-GUI Main view:
...................................................................................................................................................................................................

1 Follow the path Search > Packet > Services > Connection Oriented (ETS) > Ethernet
Segments.
...................................................................................................................................................................................................

2 Select the Ethernet Segment in the list.


...................................................................................................................................................................................................

3 Follow the path Action > ETS Ethernet Segment > Add Constraint to an Ethernet
Segment.

....................................................................................................................................................................................................................................
1350 OMS 18-213
8DG42227DAAA 9.6
Issue 3 December 2012
End to End Ethernet Provisioning Management Add a constraint to an Ethernet Segment
Managing Ethernet Segments
....................................................................................................................................................................................................................................
Result: The corresponding windows opens.

Figure 18-71 Add Constraint to an Ethernet Segment window (Pop)

....................................................................................................................................................................................................................................
18-214 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
End to End Ethernet Provisioning Management Add a constraint to an Ethernet Segment
Managing Ethernet Segments
....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

4 To add a constraint to an Ethernet Segment:


• Choose a Transport Link by using the sensitive help.
• On the Push Panel, execute the following steps:
– Enter the VLAN Id to be pushed.
– Select a Policy Mode (Disabled, Color Blind, Color Aware). See “Policy Mode”
(p. 18-202).
– Select the Priority Id (0, …,7, Untagged, Do not care,Green Priority,Yellow
Priority).
• Click Ok button.
Result: If the Constraint List is opened, this window is updated with the new added
constraint.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS 18-215
8DG42227DAAA 9.6
Issue 3 December 2012
End to End Ethernet Provisioning Management List the constraints related to an Ethernet Segment
Managing Ethernet Segments
....................................................................................................................................................................................................................................

List the constraints related to an Ethernet Segment


When to use
This function consists in getting the list of constraints related to an Ethernet Segment.

Related Information
See “Ethernet Segment description” (p. 18-197).

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Conditions
To get a positive result:
• The Ethernet Segment Provisioning state must be Defined.

Task
From the MS-GUI Main view:
...................................................................................................................................................................................................

1 Select Search > Packet > Services > Connection Oriented (ETS) > Ethernet
Segments.
...................................................................................................................................................................................................

2 Select the Ethernet Segment in the list.


...................................................................................................................................................................................................

3 Select Search > Inventory from Ethernet Segment > List Constraints.
Result: The list window is displayed.
See the following topic in this document: “Description of the list of Constraints”
(p. 18-217)
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
18-216 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
End to End Ethernet Provisioning Management Description of the list of Constraints
Managing Ethernet Segments
....................................................................................................................................................................................................................................

Description of the list of Constraints


Attributes of a Constraint
The attributes displayed for each constraint are:
• Constraint Entity User Label (= user label of the Transport Link).
• Constraint Type (Use, Not Use, Use For Multicast).

....................................................................................................................................................................................................................................
1350 OMS 18-217
8DG42227DAAA 9.6
Issue 3 December 2012
End to End Ethernet Provisioning Management Delete an Ethernet Segment Constraint
Managing Ethernet Segments
....................................................................................................................................................................................................................................

Delete an Ethernet Segment Constraint


When to use
This function consists in deleting a constraint associated to an Ethernet Segment.

Related Information
See “Ethernet Segment description” (p. 18-197).

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Conditions
To get a positive result:
• The Ethernet Segment Provisioning state must be Defined.
• No operation is pending on the selected Ethernet Segment.

Task
From the MS-GUI Main view:
...................................................................................................................................................................................................

1 Follow the path Search > Packet > Services > Connection Oriented (ETS) > Ethernet
Segments.
...................................................................................................................................................................................................

2 On the traffic Ethernet Segment list Window, select the Ethernet Segment to which the
constraint belongs. Follow the path Search > Inventory from Ethernet Segment > List
Constraints.
...................................................................................................................................................................................................

3 Select the constraint to delete.


...................................................................................................................................................................................................

4 Select one of the options in the confirmation box. Refer to the procedure “Confirm the
action” (p. 11-40).
Result: After confirmation, the Ethernet Segment constraints are dissociated from the
related Ethernet Segment and removed.
The Ethernet Segment Constraint list is updated.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
18-218 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
End to End Ethernet Provisioning Management Get the Ethernet Segment Constraint Properties
Managing Ethernet Segments
....................................................................................................................................................................................................................................

Get the Ethernet Segment Constraint Properties


When to use
This function consists in getting information about a constraint associated to an Ethernet
Segment.

Related Information
See “Ethernet Segment description” (p. 18-197).

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Conditions
To get a positive result:
• The Ethernet Segment Provisioning state must be Defined.

Task
From the MS-GUI Main view:
...................................................................................................................................................................................................

1 Follow the path Search > Packet > Services > Connection Oriented (ETS) > Ethernet
Segments.
...................................................................................................................................................................................................

2 On the Traffic Classifier List Window, select the Ethernet Segment.


...................................................................................................................................................................................................

3 Follow the path Search > Inventory from Ethernet Segment > List Constraints, select
the constraint in the list.
...................................................................................................................................................................................................

4 Select with the right mouse button from the popup menu Properties.
...................................................................................................................................................................................................

5 The Properties window is displayed.

....................................................................................................................................................................................................................................
1350 OMS 18-219
8DG42227DAAA 9.6
Issue 3 December 2012
End to End Ethernet Provisioning Management Get the Ethernet Segment Constraint Properties
Managing Ethernet Segments
....................................................................................................................................................................................................................................
See the following topic in this document: “Details of an Ethernet Segment Constraint”
(p. 18-221)

Figure 18-72 Ethernet Segment constraint properties window

E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
18-220 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
End to End Ethernet Provisioning Management Details of an Ethernet Segment Constraint
Managing Ethernet Segments
....................................................................................................................................................................................................................................

Details of an Ethernet Segment Constraint


Attributes of an Ethernet Segment Constraint
The attributes displayed for each constraint are:
• Id.
• Constrained Class.
• Constrained Class Id Label.
• Constrained Entity User Label.
• Constraint Class.
• Constraint Class Id Label.
• Constraint Entity User Label (= user label of the Transport Link).
• Constraint Type (Use, Not Use, Use For Multicast).
• Replication Factor.
• VLAN Id.
• Yellow Priority.
• Green Priority.
• Priority Mode.
• Number of Traffic Classifiers.

....................................................................................................................................................................................................................................
1350 OMS 18-221
8DG42227DAAA 9.6
Issue 3 December 2012
End to End Ethernet Provisioning Management Modify a Constraint
Managing Ethernet Segments
....................................................................................................................................................................................................................................

Modify a Constraint
When to use
The function modifies Ethernet Segment Constraint characteristics.

Related Information
See “Ethernet Segment description” (p. 18-197).
The Constraint modification gives the possibility to modify one or all the constraint
parameters:
• VLAN Identifier.
• Policy Mode.
• Priority Id.
• Green Priority.
• Yellow Priority.

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Conditions
To get a positive result:
• The Ethernet Segment Provisioning state must be Defined.
• No operation is pending on the selected Ethernet Segment.

Task
From the MS-GUI Main view:
...................................................................................................................................................................................................

1 Follow the path Search > Packet > Services > Connection Oriented (ETS) > Ethernet
Segments.
...................................................................................................................................................................................................

2 On the Ethernet Segment List Window, select the Ethernet Segment.


...................................................................................................................................................................................................

3 Follow the path Search > Inventory from Ethernet Segment > List Constraints, select
the constraint in the list.
...................................................................................................................................................................................................

4 Select with the right mouse button from the popup menu Modify.
....................................................................................................................................................................................................................................
18-222 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
End to End Ethernet Provisioning Management Modify a Constraint
Managing Ethernet Segments
....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

5 The Properties window is displayed.

Figure 18-73 Constraint Modification window

...................................................................................................................................................................................................

6 To modify a constraint, modify one or all the following parameters:


• On Pop Panel.
Execute the following step:
– Choose a Traffic Classifier by using the sensitive help and Add button to insert it.
• On Push Panel.

....................................................................................................................................................................................................................................
1350 OMS 18-223
8DG42227DAAA 9.6
Issue 3 December 2012
End to End Ethernet Provisioning Management Modify a Constraint
Managing Ethernet Segments
....................................................................................................................................................................................................................................
Execute the following steps:
– Enter a new VLAN Id.
– Modify Policy Mode (Color Blind or Color Aware).
– Modify Priority Id, Green Priority and/or Yellow Priority.
...................................................................................................................................................................................................

7 Confirm the modifications with Ok button.


Result: If the VLAN Id is modified, after modification, the VLAN Constraint list is
updated.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
18-224 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
End to End Ethernet Provisioning Management VLAN Push/Pop at ETS NNI Interface
Managing Ethernet Segments
....................................................................................................................................................................................................................................

VLAN Push/Pop at ETS NNI Interface


Overview
The Vlan Push/Pop mechanism is extended to ETS domain, to allow the encapsulation of
untagged or C-Vlan Tagged Ethernet frames, with a Provider VLAN Tag. This behavior is
used to route the traffic in segregated way either only internally to the managed network
or for inter-working purpose. The difference for this operation is that the definition of
VLAN constraint is performed before the segment allocation. Early definition allows the
VLAN stacking on NNI.
See “Ethernet Segment description” (p. 18-197).

Sequence of operations
The new sequence of operations is:
• Create an Ethernet Segment.
• Associate a Traffic Classifier.
• Definition of route Constraints (allowing to define the full routes of Ethernet traffic).
• Definition of VLAN Constraints, defining the points where the Push/Pop on NNI
must be performed.
• Allocation of the Ethernet Segment.
• Implementation.

....................................................................................................................................................................................................................................
1350 OMS 18-225
8DG42227DAAA 9.6
Issue 3 December 2012
End to End Ethernet Provisioning Management Allocate an Ethernet Segment
Managing Ethernet Segments
....................................................................................................................................................................................................................................

Allocate an Ethernet Segment


When to use
This function consists in finding a route between the end physical ports of the Ethernet
Segment.

Related Information
See “Ethernet Segment description” (p. 18-197).

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Conditions
To get a positive result:
• The Ethernet Segment Provisioning state must be Defined.
• A list of constraints containing all Transport Links used is associated to the Ethernet
Segment.
• Traffic profile, Traffic Descriptor, and Traffic Classifier must be associated to the
Ethernet Segment.
• No operation is pending on the Ethernet Segment.

Task
From the MS-GUI Main view:
...................................................................................................................................................................................................

1 Select Search > Packet > Services > Connection Oriented (ETS) > Ethernet
Segments.
...................................................................................................................................................................................................

2 Select the Ethernet Segment in the list.


...................................................................................................................................................................................................

3 Follow the path Action > Ethernet Segment > Allocate.


Result: A confirmation box is displayed.
The 1350 OMS PKT checks the 'validation' of the Transport Links to be used in term
of traffic type, bandwidth, and continuity of the chosen Transport Links.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
18-226 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
End to End Ethernet Provisioning Management Deallocate an Ethernet Segment
Managing Ethernet Segments
....................................................................................................................................................................................................................................

Deallocate an Ethernet Segment


When to use
This function consists in finding a route between the end physical ports of the Ethernet
Segment.

Related Information
See “Ethernet Segment description” (p. 18-197).
After confirmation:
• deletion of the VLAN constraints related to each Ethernet Segment is done (no more
VLAN constraint is associated to them).
• Then the Ethernet Segment List is updated with provisioning state set to Defined.
• The provisioning state of related EVC is updated in Defined or Partially Allocated.
• The bandwidth parameters of all involved Transport Links are updated taken into
account the bandwidth freed by the de-allocation.
• If the de-allocated segment is the last using the Transport Link, the Transport Link
usage state is set to Idle.

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Conditions
To get a positive result:
• The Ethernet Segment Provisioning state must be Defined.
• No operation is pending on the Ethernet Segment.

Task
From the MS-GUI Main view:
...................................................................................................................................................................................................

1 Select Search > Packet > Services > Connection Oriented (ETS) > Ethernet
Segments.
...................................................................................................................................................................................................

2 Select the Ethernet Segment in the list.


...................................................................................................................................................................................................

3 Follow the path Action > Ethernet Segment > Deallocate.

....................................................................................................................................................................................................................................
1350 OMS 18-227
8DG42227DAAA 9.6
Issue 3 December 2012
End to End Ethernet Provisioning Management Deallocate an Ethernet Segment
Managing Ethernet Segments
....................................................................................................................................................................................................................................
Result: A confirmation box is displayed.
The 1350 OMS PKT checks the 'validation' of the Transport Links to be used in term
of traffic type, bandwidth, and continuity of the chosen Transport Links.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
18-228 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
End to End Ethernet Provisioning Management Implement an Ethernet Segment
Managing Ethernet Segments
....................................................................................................................................................................................................................................

Implement an Ethernet Segment


When to use
This function establishes an Ethernet flow over an Ethernet Segment.

Related Information
See “Ethernet Segment description” (p. 18-197).
In case of correct execution, all the Ethernet Segment connections inside the NE are
implemented. The Ethernet Segment is updated into the 1350 OMS PKT with the
following states:
• Provisioning State: Implemented.
• Consistency State: Consistent.
• Availability Status: Available.
In case of errors, the Ethernet Segment is set to:
• Provisioning State: Partially Implemented.
• Consistency State: Not Consistent.
• Availability Status: Not Available.
The provisioning state of the related EVC is also updated to Implemented or Partially
Implemented.

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Conditions
To get a positive result:
• The Ethernet Segment provisioning state must be set to Implemented or Partially
Implemented.
• The NE extremities must not be locked (that is, audit/alignment/reserve not in
progress).
• No operation is pending on the Ethernet Segment.

Task
From the MS-GUI Main view:
...................................................................................................................................................................................................

1 Select Search > Packet > Services > Connection Oriented (ETS) > Ethernet
Segments.

....................................................................................................................................................................................................................................
1350 OMS 18-229
8DG42227DAAA 9.6
Issue 3 December 2012
End to End Ethernet Provisioning Management Implement an Ethernet Segment
Managing Ethernet Segments
....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

2 Select the Ethernet Segment in the list.


...................................................................................................................................................................................................

3 Select Action > Ethernet Segment > Implement.


Result: A confirmation box is displayed.
...................................................................................................................................................................................................

4 Select one of the options in the confirmation box. Refer to the procedure “Confirm the
action” (p. 11-40).
Result: After confirmation, the 1350 OMS PKT implements the Ethernet Segments.
The Ethernet Segment List is updated.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
18-230 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
End to End Ethernet Provisioning Management Deimplement an Ethernet Segment
Managing Ethernet Segments
....................................................................................................................................................................................................................................

Deimplement an Ethernet Segment


When to use
This function removes an Ethernet flow over an Ethernet Segment.

Related Information
See “Ethernet Segment description” (p. 18-197).
In case of correct execution, all the Ethernet Segment connections inside the NE are
de-implemented. The Ethernet Segment is updated into the 1350 OMS PKT with the
following states:
• Provisioning State: Allocated.
• Consistency State: Not Meaningful.
• Availability Status: Not Meaningful.
In case of errors, the Ethernet Segment is set to:
• Provisioning State: Partially Implemented.
• Consistency State: Not Consistent.
• Availability Status: Not Available.
The provisioning state of the related EVC is also updated in Allocated or Partially
Implemented.

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Conditions
To get a positive result:
• The Ethernet Segment provisioning state must be set to Allocated.
• The NE extremities must not be locked (that is, audit/alignment/reserve not in
progress).
• No operation is pending on the Ethernet Segment.

Task
From the MS-GUI Main view:
...................................................................................................................................................................................................

1 Select Search > Packet > Services > Connection Oriented (ETS) > Ethernet
Segments.

....................................................................................................................................................................................................................................
1350 OMS 18-231
8DG42227DAAA 9.6
Issue 3 December 2012
End to End Ethernet Provisioning Management Deimplement an Ethernet Segment
Managing Ethernet Segments
....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

2 Select the Ethernet Segment in the list.


...................................................................................................................................................................................................

3 Follow the path Action > Ethernet Segment > Deimplement.


Result: A confirmation box is displayed.
...................................................................................................................................................................................................

4 Select one of the options in the confirmation box. Refer to the procedure “Confirm the
action” (p. 11-40).
Result: After confirmation, the 1350 OMS PKT de-implements the Ethernet
Segments.
The Ethernet Segment List is updated.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
18-232 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
End to End Ethernet Provisioning Management Configure an Ethernet Segment
Managing Ethernet Segments
....................................................................................................................................................................................................................................

Configure an Ethernet Segment


When to use
This function consists in configuring an Ethernet Segment, that is, assigning a traffic
descriptor to the Ethernet Segment.

Related Information
See “Ethernet Segment description” (p. 18-197).

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Conditions
To get a positive result:
• The Ethernet Segment provisioning state must be set to Implemented or Partially
Implemented.

Task
From the Multi Service GUI Main view:
...................................................................................................................................................................................................

1 Follow the path Search > Packet > Services > Connection Oriented (ETS) > Ethernet
Segments.
...................................................................................................................................................................................................

2 On the Ethernet Segment List Window, select the Ethernet Segment.


...................................................................................................................................................................................................

3 Follow the path Action > Ethernet Segment > Configure.

....................................................................................................................................................................................................................................
1350 OMS 18-233
8DG42227DAAA 9.6
Issue 3 December 2012
End to End Ethernet Provisioning Management Configure an Ethernet Segment
Managing Ethernet Segments
....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

4 The Configuration window is displayed.

Figure 18-74 Ethernet Segment Configuration window

...................................................................................................................................................................................................

5 To configure the selected Ethernet Segment:


• Choose a Traffic Descriptor by using the sensitive help.
• Click Ok button.
Result: After confirmation, the traffic descriptor is associated to the Ethernet
Segment.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
18-234 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
End to End Ethernet Provisioning Management Get the Ethernet Segment extremities
Managing Ethernet Segments
....................................................................................................................................................................................................................................

Get the Ethernet Segment extremities


When to use
This function gets information about the extremities of an Ethernet Segment.

Related Information
See “Ethernet Segment description” (p. 18-197).

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Conditions
To get a positive result:
• No operation is pending on the selected Ethernet Segment.

Task
From the Multi Service GUI Main view
...................................................................................................................................................................................................

1 Follow the path Search > Packet > Services > Connection Oriented (ETS) > Ethernet
Segments.
...................................................................................................................................................................................................

2 On the Ethernet Segment List Window, select the Ethernet Segment.


...................................................................................................................................................................................................

3 Follow the path Search > Inventory from Ethernet Segment > Extremities.
...................................................................................................................................................................................................

4 The Extremities window is displayed.

....................................................................................................................................................................................................................................
1350 OMS 18-235
8DG42227DAAA 9.6
Issue 3 December 2012
End to End Ethernet Provisioning Management Get the Ethernet Segment extremities
Managing Ethernet Segments
....................................................................................................................................................................................................................................
See the following topic in this document: “Description of the list of Ethernet Segment
Extremities” (p. 18-239)

Figure 18-75 Ethernet Segment Extremities window

...................................................................................................................................................................................................

5 To modify a segment extremity Click Modify Button, for the Origin A following window
is displayed.

....................................................................................................................................................................................................................................
18-236 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
End to End Ethernet Provisioning Management Get the Ethernet Segment extremities
Managing Ethernet Segments
....................................................................................................................................................................................................................................
Result: The Extremities modification window is displayed.

Figure 18-76 Ethernet Segment Extremity Modification window (Origin)

...................................................................................................................................................................................................

6 Choose a Traffic Classifier by using the sensitive help and Add button to insert it.
...................................................................................................................................................................................................

7 Click Modify button for the Destination Z.

....................................................................................................................................................................................................................................
1350 OMS 18-237
8DG42227DAAA 9.6
Issue 3 December 2012
End to End Ethernet Provisioning Management Get the Ethernet Segment extremities
Managing Ethernet Segments
....................................................................................................................................................................................................................................
Result: Following window is displayed.

Figure 18-77 Ethernet Segment Extremity Modification window (Destination)

...................................................................................................................................................................................................

8 Execute the following steps:


• Enter a new VLAN Id.
• Modify Priority Mode (Color Blind or Color Aware).
• Modify Priority Id, Green Priority and/or Yellow Priority.
...................................................................................................................................................................................................

9 Confirm with Ok button.


Result: Ethernet Segment Extremities characteristics change.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
18-238 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
End to End Ethernet Provisioning Management Description of the list of Ethernet Segment Extremities
Managing Ethernet Segments
....................................................................................................................................................................................................................................

Description of the list of Ethernet Segment Extremities


Attributes of an Ethernet Segment Extremity
The attributes displayed for each object are:
• User Label.
• User Label (A).
• Committed Rate (A).
• Rate (A).
• Network Element (A).
• Usage State (A).
• Vlan Type (A).
• User Label (Z).
• Committed Rate (Z).
• Rate (Z).
• Network Element (Z).
• Usage State (Z).
• Vlan Type (Z).
• VLAN Id.
• Priority Mode.
• Green Priority.
The attributes displayed for each Ethernet Segment extremity are:
Origin (A), Destination (Z):
• User Label.
• Committed Rate.
• Rate.
• Network Element.
• Usage State (Idle, Busy).
• Vlan Type.

....................................................................................................................................................................................................................................
1350 OMS 18-239
8DG42227DAAA 9.6
Issue 3 December 2012
End to End Ethernet Provisioning Management Get the Ethernet Segment properties
Managing Ethernet Segments
....................................................................................................................................................................................................................................

Get the Ethernet Segment properties


When to use
This function gets information about an Ethernet Segment.

Related Information
See “Ethernet Segment description” (p. 18-197).

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Conditions
To get a positive result:
• No operation is pending on the selected Ethernet Segment.

Task
From the Multi Service GUI Main view
...................................................................................................................................................................................................

1 Follow the path Search > Packet > Services > Connection Oriented (ETS) > Ethernet
Segments.
...................................................................................................................................................................................................

2 On the Ethernet Segment List Window, select the Ethernet Segment.


...................................................................................................................................................................................................

3 Follow the path Action > Properties.


Result: The Properties window is displayed.
See the following topic in this document: “Details of an Ethernet Segment”
(p. 18-241)
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
18-240 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
End to End Ethernet Provisioning Management Details of an Ethernet Segment
Managing Ethernet Segments
....................................................................................................................................................................................................................................

Details of an Ethernet Segment


Attributes of a Ethernet Segment
The attributes displayed for each Ethernet Segment are:
• User Label.
• Subnetwork.
• EVC.
• Policy Mode (Color Blind, Color Aware, Disabled).
• Working State (Normal, Configuring, Allocating, De-allocating, Implementing,
De-implementing, Commissioning, De-commissioning, Constraint adding,
Constraint removing).
• Provisioning State (Defined, Partially Allocated, Allocated, Partially
Implemented, Implemented).
• Availability Status (Normal, Degraded, In Failure, Not Meaningful).

....................................................................................................................................................................................................................................
1350 OMS 18-241
8DG42227DAAA 9.6
Issue 3 December 2012
End to End Ethernet Provisioning Management Display the route of an Ethernet Segment
Managing Ethernet Segments
....................................................................................................................................................................................................................................

Display the route of an Ethernet Segment


When to use
This function gets graphical information about the Transport Links used (crossed) by an
Ethernet Segment.

Related Information
See “Ethernet Segment description” (p. 18-197).
The following commands are available from the graphical view, depending on the
selected object and its position on the route:
• With no selection: Begin of Route and End of Route commands allow to highlight the
NE used for the beginning or the end of the route.
• With a selected entity (NE, Transport Link, ENE, Off page connector): Begin of
Route and End of Route commands are completed by other commands depending on
the selected entity.

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.

Task
From the Multi Service GUI Main view
...................................................................................................................................................................................................

1 Follow the path Search > Packet > Services > Connection Oriented (ETS) > Ethernet
Segments.
...................................................................................................................................................................................................

2 On the Ethernet Segment List Window, select the Ethernet Segment.


...................................................................................................................................................................................................

3 Follow the path Display Route.

....................................................................................................................................................................................................................................
18-242 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
End to End Ethernet Provisioning Management Display the route of an Ethernet Segment
Managing Ethernet Segments
....................................................................................................................................................................................................................................
Result: The Route Display window is displayed.
The Transport Links used by the Ethernet Segment appears in blue.

Figure 18-78 Route Display - Ethernet Segment window

E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS 18-243
8DG42227DAAA 9.6
Issue 3 December 2012
End to End Ethernet Provisioning Management Display the connectivity view of an Ethernet Segment
Managing Ethernet Segments
....................................................................................................................................................................................................................................

Display the connectivity view of an Ethernet Segment


When to use
This function gets graphical information about the connectivity view of an Ethernet
Segment.

Related Information
See “Ethernet Segment description” (p. 18-197).

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.

Task
From the Multi Service GUI Main view
...................................................................................................................................................................................................

1 Follow the path Search > Packet > Services > Connection Oriented (ETS) > Ethernet
Segments.
...................................................................................................................................................................................................

2 On the Ethernet Segment List Window, select the Ethernet Segment.


...................................................................................................................................................................................................

3 Follow the path Connectivity view.

....................................................................................................................................................................................................................................
18-244 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
End to End Ethernet Provisioning Management Display the connectivity view of an Ethernet Segment
Managing Ethernet Segments
....................................................................................................................................................................................................................................
Result: The Connectivity view window is displayed.

Figure 18-79 Connectivity view - Ethernet Segment window

E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS 18-245
8DG42227DAAA 9.6
Issue 3 December 2012
End to End Ethernet Provisioning Management Overview
Managing VLAN types
....................................................................................................................................................................................................................................

Managing VLAN types

Overview about VLAN types


VLAN types description
The VLAN type entity models the VLAN Tag Protocol Type allowing the user to give a
name (user label) to a specific VLAN Tag Protocol Type (either standard or not) to ease
its subsequent usage in the scope of VLAN management.
The VLAN can be associated to an Ethernet edge port or a Provider Network before the
creation of the Ethernet Segment (mapping model). If VLAN is associated to an Ethernet
Segment (tunneling model), association induces the propagation to the edge ports. A
VLAN Protocol type value could be duplicated according to its usage.
Note: The creation and modification of a VLAN Tag Protocol Type over an active
Ethernet interface has an influence on the active traffic. Only if the Ethernet Interface
is not affected by Active traffic, this operation is allowed. The provisioning state of all
EVCs and all Ethernet Segments using the interface is checked.

....................................................................................................................................................................................................................................
18-246 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
End to End Ethernet Provisioning Management Display the VLAN type list
Managing VLAN types
....................................................................................................................................................................................................................................

Display the VLAN type list


When to use
This function gets graphical information about the connectivity view of an Ethernet
Segment.

Related Information
See “Overview about VLAN types” (p. 18-246).

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.

Task
From the MS-GUI Main view:
...................................................................................................................................................................................................

1 Select Search > Packet > Services.


Result: The menu of the Services is shown.
...................................................................................................................................................................................................

2 Select VLAN.
Result: The list window is displayed.
The attributes displayed for each VLAN Type are:
• User Label.
• Protocol Type (VLAN Id in hexadecimal value).
• Role (Customer, Provider).

E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS 18-247
8DG42227DAAA 9.6
Issue 3 December 2012
End to End Ethernet Provisioning Management Create a VLAN type
Managing VLAN types
....................................................................................................................................................................................................................................

Create a VLAN type


When to use
This function consists in defining a VLAN Type and a user label to identify it (for
example in the operations of association to Edge Ports).

Related Information
To give maximum flexibility to the user, creation of two or more VLAN types with the
same VLAN Tag Protocol Type is possible.
See “Overview about VLAN types” (p. 18-246).

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Conditions
To get a positive result:
• The User Label must be different from the existing ones.
• The maximum number of VLAN types must not be reached.

Task
From the Multi Service GUI Main view:
...................................................................................................................................................................................................

1 Follow the path Search > Packet > Services > VLANs.
...................................................................................................................................................................................................

2 Follow the path Action > Add VLAN.

....................................................................................................................................................................................................................................
18-248 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
End to End Ethernet Provisioning Management Create a VLAN type
Managing VLAN types
....................................................................................................................................................................................................................................
Result: The creation window is displayed.

Figure 18-80 VLAN Type Creation window

...................................................................................................................................................................................................

3 To create a VLAN type:


• Enter a VLAN type User label.
• Enter a VLAN Tag Protocol Type (hexadecimal value between 05dd a ffff ).

....................................................................................................................................................................................................................................
1350 OMS 18-249
8DG42227DAAA 9.6
Issue 3 December 2012
End to End Ethernet Provisioning Management Create a VLAN type
Managing VLAN types
....................................................................................................................................................................................................................................
If Protocol Type is equal to 8100 (hex), Role attribute is set to Customer otherwise Role is
set to Provider.
...................................................................................................................................................................................................

4 Confirm the modifications with Ok button.


Result: The VLAN Type is created and the VLAN Type List is updated.
.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
18-250 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
End to End Ethernet Provisioning Management Modify a VLAN type
Managing VLAN types
....................................................................................................................................................................................................................................

Modify a VLAN type


When to use
The function modifies VLAN type characteristics.

Related Information
See “Overview about VLAN types” (p. 18-246).
The VLAN type modification gives the possibility to modify one or all the following
parameters:
• VLAN type User Label.
• VLAN Tag Protocol Type (hexadecimal value).

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Conditions
To get a positive result:
• If the User Label is modified, the new User Label must be not in use by another
VLAN Type.
• The VLAN type must not be not in use by any Provider Network, Edge Port,
Transport link, or Transport link end point.

Task
From the Multi Service GUI Main view:
...................................................................................................................................................................................................

1 Follow the path Search > Packet > Services > VLANs.
...................................................................................................................................................................................................

2 On the VLAN List Window, select the VLAN Type to modify.


...................................................................................................................................................................................................

3 Follow the path Action > Modify.

....................................................................................................................................................................................................................................
1350 OMS 18-251
8DG42227DAAA 9.6
Issue 3 December 2012
End to End Ethernet Provisioning Management Modify a VLAN type
Managing VLAN types
....................................................................................................................................................................................................................................
Result: The modification window is displayed.

Figure 18-81 VLAN Type Modification window

...................................................................................................................................................................................................

4 To modify a VLAN type:


• Enter a new User Label (optional).
• Modify the VLAN Tag Protocol Type value (optional).
If new VLAN Tag Protocol Type is equal to 8100 (hex), Role attribute is set to Customer
otherwise Role is set to Provider.
...................................................................................................................................................................................................

5 Confirm the modifications with Ok button.


Result: After confirmation of the modification: the VLAN Type List is updated.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
18-252 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
End to End Ethernet Provisioning Management Delete a VLAN type
Managing VLAN types
....................................................................................................................................................................................................................................

Delete a VLAN type


When to use
This function consists in deleting a VLAN type from the 1350 OMS PKT supervision.

Related Information
See “Overview about VLAN types” (p. 18-246).

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Conditions
To get a positive result:
• The VLAN type must not be used. It must not be associated to any provider network,
edge port, or Transport Link end point.

Task
From the Multi Service GUI Main view:
...................................................................................................................................................................................................

1 Follow the path Search > Packet > Services > VLANs.
...................................................................................................................................................................................................

2 On the traffic VLAN list Window, select the VLAN Type to delete.
...................................................................................................................................................................................................

3 Follow the path Action > Delete.


...................................................................................................................................................................................................

4 Select one of the options in the confirmation box. Refer to the procedure “Confirm the
action” (p. 11-40).
Result: After confirmation, the VLAN types are removed and the VLAN Type List is
updated.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS 18-253
8DG42227DAAA 9.6
Issue 3 December 2012
End to End Ethernet Provisioning Management Delete a VLAN type

....................................................................................................................................................................................................................................

....................................................................................................................................................................................................................................
18-254 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
19 19
Bridge Network
Management

Overview
Purpose
This chapter describes how to set up a Connection Less network (Provider Bridge).

Contents

Connection Less Networks 19-4


Bridge Network Management 19-4
Bridge Traffic Management 19-6
Spanning Tree Instance Management 19-8
VLAN management 19-10
EVC Data Plane 19-11
The EVC life cycle 19-13
Layer-2 Control Protocol Processing 19-16
Bandwidth Profile per UNI 19-18
View the list of bridge NEs 19-22
Description of the list of Bridge NEs 19-23
View the list of bridge ENEs 19-24
Description of the list of Bridge ENEs 19-25
View the Provider Bridge Flows of an EVC 19-26
Connection Less Transport Link Management 19-27
Display the Ethernet Bridge Transport Link list 19-27
Description of the list of Bridge Transport Links 19-29
Configure a transport Link 19-30
Get the Transport Link extremities 19-34
Description of the list of Transport Link extremities 19-37
Get the Transport Link properties 19-38

...................................................................................................................................................................................................................................
1350 OMS 19-1
8DG42227DAAA 9.6
Issue 3 December 2012
Bridge Network Management Overview

....................................................................................................................................................................................................................................

Details of an ETB Transport Link 19-40


Activate a Bridge Transport Link 19-41
Deactivate a Bridge Transport Link 19-42
View the list of Bridge Edge Ports 19-43
Description of the list of Bridge Edge Ports 19-44
Activate a Bridge Edge Port 19-45
Deactivate a Bridge Edge Port 19-46
Connection Less EVC Management 19-47
View the Connection Less EVC list 19-47
Description of the list of Bridge EVCs 19-48
Create a Bridge EVC 19-49
Modify a Bridge EVC 19-53
Delete a Bridge EVC 19-56
Get the EVC properties 19-58
Details of a Bridge EVC 19-60
Configure a Bridge or an ETS EVC 19-61
Add bridge Transport Link to EVC 19-62
Remove bridge Transport Link to EVC 19-63
Inventory of bridge Transport Links of an EVC 19-64
EVC Fault Localization 19-65
Description of the list of Fault Localization 19-68
Description of the list of Alarms 19-69
Navigation to AS 19-70
Bridge EVC Termination Management 19-72
View the list of EVC terminations 19-72
Description of the list of EVC Terminations 19-73
Add Connection Less EVC Termination 19-74
Delete a Bridge EVC Termination 19-81
Configure a Bridge EVC Termination 19-83
Get the EVC termination properties 19-85
Details of an EVC Termination 19-87
Workflow for Bridge Management 19-88
Overview about Workflow 19-88
Create a Domain 19-90
Add NE to a Domain 19-91

....................................................................................................................................................................................................................................
19-2 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Bridge Network Management Overview

....................................................................................................................................................................................................................................

Domain Configuration 19-94


Domain Modification 19-96
Configure a Network Element 19-98
Link Over TDM configuration 19-100
NE Ethernet Physical Port Configuration 19-102
Create a Customer 19-104
Create an Ethernet Service 19-107
Traffic Descriptor Definition 19-109
EVC Allocation and Implementation 19-111
EVC Bandwidth Management 19-112
Dynamic change capability 19-112
Function Description 19-113
Service Delimiting 19-117
Vlan Push/Pop On Provider Bridge UNI/IWI Management 19-117
Spanning Tree 19-119
Show the Spanning Tree Instance of EVC 19-119
Show the Spanning Tree Instance 19-120
Spanning Tree Instance configuration 19-121
Spanning Tree Instance Implementation 19-123
Spanning Tree Instance Deimplementation 19-124

....................................................................................................................................................................................................................................
1350 OMS 19-3
8DG42227DAAA 9.6
Issue 3 December 2012
Bridge Network Management Bridge Network Management
Connection Less Networks
....................................................................................................................................................................................................................................

Connection Less Networks

Bridge Network Management


Bridge network description
The aim of bridge network management is to provide support for emerging
Ethernet-based Connection Less services like the virtual private LAN service (EVPLAN)
connecting in a transparent way various customer sites across a metropolitan network
(Metro-Ethernet).
An Ethernet switch learns the MAC addresses of end-hosts and associates them with
appropriate ports on which the end-host frames arrive. In case of mesh networks,
loop-free connectivity is assured by a distributed computation carried through control
frames and resulting in a spanning tree. In the context of Metro-Ethernet, a customer
network is a collection of multiple networks (LANs) that are physically connected by
means of a service provider network and operate as if all those multiple networks are
connected (virtually) as a single LAN.
Ethernet infrastructure participating to switching can be partitioned into virtual LANs
possibly overlapping and each one identified by a VLAN-Id. The Q-tag inserted in the
Ethernet frames can be used to limit packet broadcasting to the switches participating to
the VLAN. Packets tagged with a VLAN are never sent to interfaces that are not part in
the VLAN and therefore traffic segregation is achieved. This way, VLAN-Ids allow
additional pruning of the loop-free logical connectivity provided by the spanning tree.

Provider bridge added value


A provider bridge network brings the following main added values with respect to a
virtual bridge one:
• If different customers use the same C-VLAN, for each customer a different P-VLAN
is stacked over that C-VLAN. Stacking segregates the traffic sourced by one customer
from the one sourced by the other, inside the provider network.
• It is possible to perform in the NE traffic classification and traffic description of the
ingress frames at the edge of the provider domain:
– Traffic classification allows sharing an IWI interface among different customers.
– Traffic description allows enhanced quality of service management.
The introduction of the ISA ES family allows offering Ethernet bridging functionality
over SDH network and cables.

Bridge network functional areas


Bridge network management is based on the following functional areas:
• Network construction.
• Bridge infrastructure management including: Transport link activation/deactivation.

....................................................................................................................................................................................................................................
19-4 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Bridge Network Management Bridge Network Management
Connection Less Networks
....................................................................................................................................................................................................................................
• Bridge traffic management including:
– EVC association to bridge infrastructure.
– Manual or automatic VLAN distribution inside 1350 OMS PKT resources.
– STP parameters set-up inside 1350 OMS PKT resources.
– VLAN and STP provisioning to the NE.
– QoS management.
• Maintenance management.
• Utilities.

....................................................................................................................................................................................................................................
1350 OMS 19-5
8DG42227DAAA 9.6
Issue 3 December 2012
Bridge Network Management Bridge Traffic Management
Connection Less Networks
....................................................................................................................................................................................................................................

Bridge Traffic Management


Overview
The traffic management is related to the elementary EVC management based on
Connection Less networks (MAC Bridge, Virtual Bridge, or Provider Bridge).
Bridge Traffic management handles the set-up of data traffic toward the customer edge,
STP tuning and VLAN distribution inside and at the edge of the domain.
Following main functions are in the scope of the bridge traffic management.
• EVC association to bridge infrastructure.
• Manual or automatic VLAN distribution inside 1350 OMS PKT resources.
• STP parameters set-up inside 1350 OMS PKT resources.
• VLAN and STP provisioning to the NE.

Bridge EVC
One EVC is an elementary EVC that spans the scope of a single bridge domain. In case of
MAC domain, no VLAN are managed and there exists at most only one EVC for the
domain. In case of Virtual or Provider domain, more EVC can insist on the same domain.
The EVC is associated to a set of edge ports of a bridge domain. EVC association to
domain is automatic for MAC or when the edge ports are specified at EVC creation-time:
the terminations of one EVC must correspond to edge ports belonging to the same bridge
domain. All or a subset of the domain edge ports can be selected as EVC terminations (all
by default in a MAC domain).
In case of Virtual or Provider domain, one EVC is optionally characterized by one VLAN
bundle, that is, a group of VLAN. Moreover, in case of Provider domain, we have to
distinguish the outer VLAN, that is, the C-VLAN, from the inner VLAN carried inside
the domain, namely the P-VLAN. This distinction is expressed by means of a
C-VLAN/P-VLAN mapping. The C-VLAN/P-VLAN mapping is defined at EVC level
since it must be uniform for all EVC terminations. Any given inner VLAN can be
associated to only one EVC supported by the same domain.

EVC Terminations
The EVC Termination is a:
• MAC Bridge Termination if it uses a MAC Bridge Port.
• Virtual Bridge Termination if it uses a Virtual Bridge Port.
• Provider Bridge Termination if it uses a Provider Bridge Customer Port.

....................................................................................................................................................................................................................................
19-6 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Bridge Network Management Bridge Traffic Management
Connection Less Networks
....................................................................................................................................................................................................................................
The EVC Termination is conceptually associated to:
• One Ethernet interface (either local or remote) in case of MAC Bridge Termination.
• One set of ETB virtual ports insisting on the same Ethernet interface in case of Virtual
Bridge Termination. This set the set of ETB virtual ports corresponding to the
C-VLAN of the EVC ( One ETB virtual port correspond to one C-VLAN).
• One ETS flow or set of ETS flows in case of Provider Bridge Termination. The flow
or set of flows referenced by the Traffic Classifiers is associated with the C-VLAN of
the EVC.

....................................................................................................................................................................................................................................
1350 OMS 19-7
8DG42227DAAA 9.6
Issue 3 December 2012
Bridge Network Management Spanning Tree Instance Management
Connection Less Networks
....................................................................................................................................................................................................................................

Spanning Tree Instance Management


Network robustness
In Connection Less networks based on Bridge solution, the risk of network loop and
packet flooding can lead to network congestion. The usage of Spanning Tree Protocols
adds robustness to the network, as the active topology is automatically recalculated by the
ISA boards after the detection of one of the following conditions:
• Alarms on Transport Links or edge ports.
• Add/remove of NE or Transport Links in the Domain.
• Tuning of STP parameters (for example: bridge priority) by management system.

STI tree topology


Network congestion can be avoided supplying a tree topology to the internal used
resources. The tree topology can be obtained in two different ways:
• Manually by the user: the user statically shapes a tree in the network manually
configuring Transport Links to be used.
• Automatically by ISA Boards: the user configures and enables the usage of Spanning
Tree Protocols inside a given Domain (STP/RSTP/PVSTP/MSTP) to let ISA Boards
to autonomously determine an active tree shape (also called active topology) inside
the network.

STI resources
The spanning tree instance (STI) is the set of NE, ENE and Ports carrying control frames
(BPDU) that participate to the same distributed computation. The spanning tree NE
(ST-NE) represents the image of one NE or ENE in the scope of the STI.
Each ST-Termination is characterized by a port state and a port forced state. The port state
tells whether the port is forwarding or discarding data frames in the scope of the STI. The
port forced state tells whether the control on the port state is delegated to the network
(dynamic forced state) or manually constrained by user (blocked or forwarding forced
state). The ST-termination port forced state can be configured acting on the ST-link, that
means, configuring both end-points with one single operation.

Port configuration
On a per-STI basis, configuring the port forced state to forced blocking. One or more
ST-links can be manually excluded from the data forwarding process. On the other hand,
configuring the port forced state to forced forwarding implies that the ST-link is
constrained to participate to packet forwarding.
In both cases, either configuring the port forced state to forced blocking or forwarding,
the ST-links are manually excluded from the network computation: these links belong or
not to a static tree topology due to the constraints of the user. A failure on forced
forwarding links is not recovered by the spanning tree protocol.

....................................................................................................................................................................................................................................
19-8 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Bridge Network Management Spanning Tree Instance Management
Connection Less Networks
....................................................................................................................................................................................................................................
The active STI is constituted by NE, ENE and Ports carrying both BPDU and customer
data frames. The Ports belonging to the spanning tree instance (STI) are NNI interfaces
carrying control frames (BPDU): the active NNI interfaces carry both customer data
frames and control frames. A distributed computation (control frame forwarding)
determines dynamically which interfaces must actually forward data frames. The active
spanning tree is a dynamic snapshot of the network status.

Static tree topology


A static tree topology is a subset of the active STI, built by user forcing manually the
control plane port forced state to forwarding for all ST-Terminations in the tree. The user
can statically determine part or all of the STI active topology. A static tree topology can
introduce loops in the network.
The number of spanning tree instances for a domain depends on the associated STP type:
• None - no spanning tree instance.
• STP/RSTP - only one spanning tree instance for all VLAN.
• PVSTP - one spanning tree instance per-VLAN.
• MSTP - one spanning tree instance per set of VLAN.
Each STI represents a control plane, namely a virtual infrastructure dedicated to the
transport of control frames (that is, the BPDU carrying the spanning tree computation). A
dedicated set of BPDU is exchanged for each STI.
By design choice, the EVC is always associated to a single spanning tree instance (STI),
whatever STP type is running. to have a service exploiting different spanning tree
instances, we must define different EVC for that service. The associated STI can be
shared with other EVC. As a consequence, in case of PVSTP, the EVC must be
characterized by a single VLAN.

....................................................................................................................................................................................................................................
1350 OMS 19-9
8DG42227DAAA 9.6
Issue 3 December 2012
Bridge Network Management VLAN management
Connection Less Networks
....................................................................................................................................................................................................................................

VLAN management
Overview
Virtual LANs are introduced for segmenting the network into different broadcast (or
multicast) domains. The VLAN-Id is used to forward Ethernet traffic only toward those
Ethernet ports (UNI) that are members of a given VLAN, ensuring that the tagged frames
are only accessible by the proper end-user and therefore realizing traffic segregation.
4096 different VLAN can be used in one Ethernet network.
VLAN management helps solving security and privacy, bandwidth management, and
increasing the performance.

The use of VLAN


VLAN can be used anyway to switch traffic in different contexts:
• Defining Ethernet VPNs (EVPLAN service in Connection Less networks).
• Switching broadband access traffic to the selected ISP. For instance, the use of
customer-based VLAN for routing purposes in the network couples the operational
aspects of the customer and network user domain.
• Allowing inter-working the provider network characterized by its own VLAN tag
with the network of another provider using not standard VLAN tag. This
inter-working is achieved by means of VLAN push and pop operations. Provider
network inter-working at the Layer-2 control protocol level can follow a transit model
(tunneling) or a peer-to-peer model (mapping mode).
• In the scope of Virtual Bridge management, the VLAN assume the meaning of
Customer VLAN (C-VLAN).
• In the scope of Provider Bridge management, the VLAN assume the meaning of
Provider VLAN (P-VLAN). A scalable solution design can be designed mapping the
received Customer VLAN on one internally defined P-VLAN.
• Both in case of Virtual and Provider Bridge management, Ethernet frames can flow in
the network only after having properly provisioned the required VLAN inside the
network (C-VLAN for Virtual and P-VLAN for Provider).

....................................................................................................................................................................................................................................
19-10 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Bridge Network Management EVC Data Plane
Connection Less Networks
....................................................................................................................................................................................................................................

EVC Data Plane


Overview
Each EVC spanning the scope of a bridge domain has an associated data plane and active
topology. The EVC data plane is the set of NE, ENE and Ports enabled to carry user data
frames belonging to that EVC. It contains the set of NE and Ports where the set of VLAN
characterizing the EVC has to be distributed.
The EVC active topology is the set of NE, ENE and Ports belonging to the same Domain
and actually carrying user data frames. For example, the active topology differs from the
data plane when a link is blocked by the spanning tree computation to avoid loops. In
fact, the EVC active topology is actually the projection of the EVC data plane onto the
active topology of the STI supporting the EVC: the data path for the EVC is therefore
obtained keeping into account both the VLAN distribution and the dynamic computation
of the associated STI.
The EVC data plane and active topology are also virtual entities since they are specific
for the VLAN bundle characterizing the EVC and, therefore, are specific for that EVC.
Data frames characterized by different VLAN Id can generally follow different data paths
across the bridge network, but data frames belonging to same EVC are constrained, by
design choice, to follow the same data path to allow QoS management on a per-EVC
basis.
When edge ports (that is, UNI or IWI interfaces) are associated to the EVC, they belong
to the EVC data plane but not to the active STI topology, since control frames coming
from CE or from another domain must be filtered or tunneled. UNI and IWI interfaces are
not allowed to enter the active STI topology.
On the other hand, NNI Transport Links can belong to both EVC data plane and active
STI topology: they can carry both data frames and control frames.

Active topology
The Ports belonging to the EVC active topology are therefore characterized by:
• The VLAN characterizing the EVC are in the Port member set.
• Forced port state equal to forced forwarding (namely they are part of the STI static
active Topology) or.
• Forced port state equal to dynamic and port state equal to forwarding (namely, they
are part of the STI dynamic active topology).
Following table summarizes the port forced-state relation with EVC active topology.

Forced-state/ Plane. Control frame Data frame EVC Active


forwarding. forwarding. Topology.
Forced-blocking. No. No. No.
Forced-forwarding. No. Yes. Yes.

....................................................................................................................................................................................................................................
1350 OMS 19-11
8DG42227DAAA 9.6
Issue 3 December 2012
Bridge Network Management EVC Data Plane
Connection Less Networks
....................................................................................................................................................................................................................................

Forced-state/ Plane. Control frame Data frame EVC Active


forwarding. forwarding. Topology.
Dynamic. Yes. Decided by network Decided by network
computation. computation.

....................................................................................................................................................................................................................................
19-12 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Bridge Network Management The EVC life cycle
Connection Less Networks
....................................................................................................................................................................................................................................

The EVC life cycle


Overview
The EVC life cycle is tightly related to the life cycle of the associated EVC data plane
and that of the supporting STI.
At Domain activation time, the default STP protocol type is enabled on all NE and also
the NNI Ports are activated. This activations implies that control frames are allowed to
flow in the network. In case of STP/RSTP/MSTP, the default STI is therefore
implemented in the network. The default STI is referred as the CIST (Common Instance
Spanning Tree) in case of MSTP. We extend this terminology also to the case of
STP/RSTP, where it represents the only instance available.
In case of MAC Domain, only one EVC is created automatically by the system at Domain
activation time. In case of Virtual or Provider Domain, the EVC must be explicitly
created by user and more than one EVC can insist on the same Domain.

EVC creation or modification


At creation/modification time, the EVC is associated to a set of edge ports and, in case of
Virtual or Provider Domain, to a set of VLAN. Association to edge ports implies the
automatic association with the underlying Domain. The EVC is characterized by a
full-mesh/ not full-mesh attribute used to drive the VLAN distribution inside 1350 OMS
PKT resources (at EVC data plane allocation time). In case of Provider Bridge, user must
specify a C-VLAN/P-VLAN mapping.
At EVC Termination creation/modification time, user can optionally specify a default
user priority on a per-Port basis (in case of MAC Bridge or Virtual Bridge edge port). In
case of Virtual Bridge only, the user can also specify an 801.2p priority bit regeneration
table.
The EVC data plane is one-to-one with the EVC and is automatically defined at EVC
creation time. Similarly, the EVC data plane is automatically deleted at EVC deletion
time. to allow EVC allocation, the EVC data plane must be allocated first. EVC data
plane allocation means defining the physical infrastructure for the data plane. The system
must include the VLAN in the EVC bundle in the VLAN member set of the ports that are
part of the virtual data plane specific for that EVC. All VLANs in the EVC share the same
virtual data plane.
EVC data plane allocation implies VLAN distribution to Edge Ports, corresponding to the
VLAN distributed on EVC Terminations. The UNI/IWI association to EVC data plane is
therefore automatically established by the system. The VLAN of each EVC Termination
is allocated on the respective UNI/IWI.
The VLAN in the EVC bundle have to be uniformly allocated to the NNI. The NNI
association is performed either manually (not full-mesh case) or automatically (full-mesh
case).

....................................................................................................................................................................................................................................
1350 OMS 19-13
8DG42227DAAA 9.6
Issue 3 December 2012
Bridge Network Management The EVC life cycle
Connection Less Networks
....................................................................................................................................................................................................................................
In case of full-mesh, the association is performed at EVC data plane allocation-time: the
system automatically distributes the VLAN in 1350 OMS PKT MIB to all Transport
Links (that is, NNI Ports) in the Domain. In case of not full-mesh, the user must use a
specific function to add/remove a set of Transport Links to the allocated EVC data plane.

EVC allocation
To summarize, when a full-mesh EVC Data Plane is allocated, all VLAN in the bundle
are distributed to all edge ports and Transport Links in the domain. In case of not
full-mesh, the allocation operates only on edge ports, while the user has to add the
selected set of Transport Links; then the system automatically and uniformly distributes
all VLAN in the bundle to the selected Transport Links. to perform a non-uniform VLAN
allocation over the Transport Links used by a service, the user is therefore required to use
different EVC.
EVC allocation means to select a supporting STI and to associate the selected STI to the
set of VLAN characterizing the EVC. The way to select a STI for the EVC depends on
the domain STP type:
• None: spanning tree instance is not supported and the infrastructure must be a tree
topology. The user must ensure that the topology is loop-free.
• STP/RSTP: the default spanning tree instance (the CIST) is implicitly selected by the
system. The CIST is automatically implemented at domain activation time.
• PVSTP: for the single VLAN characterizing the EVC, a new STI is automatically
allocated by the system at EVC allocation time.
• MSTP.
In this case, the user has two possibilities:
– Allocate the EVC over an existing STI (the CIST by default).
– Require to allocate the EVC over a new STI to be automatically created and
allocated by the system.

Provisioning details
EVC de-allocation implies losing the relation with the supporting STI. If the STI is not
the CIST, at de-allocation time of the last EVC, the supporting STI is automatically
deleted. The CIST is automatically de-implemented at bridge domain deactivation time.
The EVC Data Plane de-allocation can be performed individually or cascaded
automatically after EVC de-allocation.
The EVC Data Plane de-allocation is a pre-condition for EVC deletion. The EVC Data
Plane de-allocation consists in removing of the VLAN characterizing the EVC from the
Edge Ports (that is, UNI/IWI Ports) and from all associated Transport Links (that is, NNI
Ports). Therefore, the EVC data plane de-allocation behaves in the same way both in case
of full-mesh and not full-mesh EVC. In case of not full-mesh EVC, the user can remove
one or more Transport Links from the allocated EVC data plane, before implementing it.
To allow EVC implementation, the supporting STI and the EVC data plane must be
implemented first.

....................................................................................................................................................................................................................................
19-14 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Bridge Network Management The EVC life cycle
Connection Less Networks
....................................................................................................................................................................................................................................
STI implementation means that any new STI is instantiated on the ISA NE (only in case
of MSTI) and that the STP parameters are provisioned on the ISA NE (only NNI Ports).
The CIST is automatically implemented at bridge domain activation time.

....................................................................................................................................................................................................................................
1350 OMS 19-15
8DG42227DAAA 9.6
Issue 3 December 2012
Bridge Network Management Layer-2 Control Protocol Processing
Connection Less Networks
....................................................................................................................................................................................................................................

Layer-2 Control Protocol Processing


Overview
The user optionally defines, on EVC basis, which control Protocol must be tunneled or
discarded. Such configuration must be propagated to all EVC terminations to ensure that
all EVC terminations use the same Tunneling criteria. A check is needed also toward
Layer-2 Control Protocol Processing defined at UNI level. This check allows a congruent
management of Control protocols crossing the EVC.
In case of Connection Oriented EVC, the value defined for the EVC is predefined to
Tunnel for all L2 Control Protocols and this value is propagated to contained Ethernet
Segments.
In case of Provider Bridge based EVC, the value can be freely defined by the user for the
EVC. The value is propagated to all EVC Terminations.
In case of MAC Bridge or Virtual Bridge based EVC, the EVC is always tunneling (the
UNI setting is fully operative).
If the Layer-2 Protocol Processing is not defined at EVC level, then this definition is
delegated to each single EVC Termination (for Provider Bridge Based EVCs) while for
Ethernet Segment (Connection Oriented EVCs) is fixed to Tunnel for all L2 Protocols.
This way to operate is maintained as backward compatible with previous 1350 OMS PKT
releases but is not considered as MEF compliant because do not ensure that at EVC level
a common policy on Control Protocols is applied.
During EVC Definition, for each used UNI, a check is performed respect to the Max
Number of EVC defined on each UNI.

L2 Control Protocols
For the List of L2 Control Protocols, refer to the following table:

Table 19-1 L2 Control Protocols

Control Protocol. Dis- Tunnel Notes.


card. (default
for all
protocols).
Data Frames. Yes. Yes. At EVC level, it is allowed to
Tunnel or Discard also Data
Frames.
Customer BPDU (STP, RSTP, Yes. Yes.
MSTP).
Provider BPDU (STP, RSTP, Yes. Yes.
MSTP).
Slow Protocols. Yes. Yes.
802.1X PAE. Yes. Yes.

....................................................................................................................................................................................................................................
19-16 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Bridge Network Management Layer-2 Control Protocol Processing
Connection Less Networks
....................................................................................................................................................................................................................................
Table 19-1 L2 Control Protocols (continued)

Control Protocol. Dis- Tunnel Notes.


card. (default
for all
protocols).
Provider GVRP. Yes. Yes.
Bridge Management. Yes. Yes.
Customer GMRP. Yes. Yes.
Customer GVRP. Yes. Yes.

Bandwidth profiles
The bandwidth profiles defined for each EVC termination have to be intended in the
following way:
• In case of Connection Less EVCs based on Provider Bridge, the bandwidth profiles
defined for each EVC termination represents the bandwidth profile for the traffic at
the ingress of that UNI (and it is immediately checked).
• In case of Connection Less EVCs based on Virtual Bridge, the bandwidth profiles
defined for each EVC are automatically defined as Best Effort Class Of Service
having the PIR fully equal to the UNI rate.
• In case of Connection Less EVCs based on MAC Bridge, the bandwidth profiles
defined for each EVC are automatically inherited from UNI characteristics (in fact all
UNI of a MAC Bridge supports only the Bandwidth Profile per UNI) and the traffic
parameters.

....................................................................................................................................................................................................................................
1350 OMS 19-17
8DG42227DAAA 9.6
Issue 3 December 2012
Bridge Network Management Bandwidth Profile per UNI
Connection Less Networks
....................................................................................................................................................................................................................................

Bandwidth Profile per UNI


Overview
Each Bandwidth Profile configured on a given UNI represent the way the traffic entering
in ingress to that UNI is shaped and managed in term of Bandwidth. The following
possible values for Bandwidth Profile are manageable at UNI level:
• “Bandwidth Profile per UNI” (p. 19-18). Bandwidth description is shared for all
connection starting from this ingress UNI.
• “Bandwidth Profile per EVC” (p. 19-18). Bandwidth description is shared for all
connection starting from this UNI in the scope of this EVC. Each EVC has one or a
group of VLAN.
• “Bandwidth Profile per CoS” (p. 19-18). The bandwidth applies to traffic defined by
one or a group of VLAN and one Priority bit.

Bandwidth Profile per UNI


The Bandwidth Profile is configured with a bandwidth description on the edge port before
having created any service on this port. In this case, all the services that start on this UNI
share this bandwidth (in the limits described in the profile). The provisioning is
accomplished by means of the management of the FlowGroup concept. For each EVC
Connection Oriented based starting from this UNI, the UNI Bandwidth profile is
propagated along the used route (the pseudo CAC implemented at 1350 OMS PKT level
takes into account either current per flow Traffic Descriptors and FlowGroup Traffic
Descriptor). In case of UNI belonging to MAC bridges, traffic parameters are
automatically defined as Best Effort CoS with the PIR value equal to the UNI rate.

Bandwidth Profile per EVC


The bandwidth profile is supplied during each termination addition describing the
bandwidth usable and shared for all the connection of the considered EVC. This setting
applies on the added termination only; that is, one port used by the EVC can work in per
EVC mode and another port used by the same EVC can work in per Cos mode. The
provisioning is accomplished by means of the management of the FlowGroup concept.
For each EVC Connection Oriented based starting from this UNI, the UNI Bandwidth
profile is propagated along the used route (the pseudo CAC implemented at 1350 OMS
PKT level takes into account either current per flow Traffic Descriptors and FlowGroup
Traffic Descriptor).

Bandwidth Profile per CoS


The bandwidth profile is described by one VLAN or group and one Priority bit or set of
bits. This profile is applicable for one EVC termination: so the EVC termination is used
per Cos or is used per EVC. The description of the bandwidth profile is done by the way
of one Traffic Descriptor composed of Bandwidth profile attributes (CIR, PIR, CBS,
PBS) and also one QoS attribute, standing for the description of the PHB (Per Hop

....................................................................................................................................................................................................................................
19-18 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Bridge Network Management Bandwidth Profile per UNI
Connection Less Networks
....................................................................................................................................................................................................................................
Behavior), that is, the internal NE mode for managing the traffic. The PHB (Per Hop
Behavior), represents, on equipment base, the QoS expected by a Customer at EVC level
(that is, on Per Network Behavior).

The QoS definition


The QoS attribute can be automatically determined by the 1350 OMS PKT from the
bandwidth parameter values supplied in the profile. This behavior is the default behavior
but, to remain as flexible as the equipment (introducing 8 QoS following the same
formula for the profile values), the user can force this value to a specific one according to
the equipment formula.
In addition to the Traffic Descriptor, two other concepts complete the QoS definition:
• the Policy mode: such management is today aligned with IETF and whose extension
in the scope of MEF compliancy is in the scope of 1350 OMS PKT.
• The Color Profile: such management is aligned with IETF concepts for Color Aware
traffic management. This management is not considered MEF. The Color Profile
management, is maintained unchanged in respect to previous 1350 OMS PKT
releases. The user must plan the usage or not.

Bandwidth Profile Per UNI attributes


The Bandwidth Profile per UNI is one of the possible management definable on UNI
basis relatively to MEF compliancy.
The Bandwidth Profile Per UNI is described by the following attributes:
• Committed Information Rate (CIR).
• Excess Information Rate (EIR).
• Committed Burst Size (CBS).
• Excess Burst Size (EBS).
• Color Mode (CM).
• Coupling Flag (CF).

Manual and default operations


This management is mutually exclusive with the two other possible management
(Bandwidth Profile per EVC and Bandwidth Profile per EVC per Cos). The Bandwidth
Profile per UNI must be defined on a given UNI in two ways:
• By the user through a manual operation before the port is used.
• Automatically as the default value for a given UNI depending on restrictions existing
on specific NE configurations.

....................................................................................................................................................................................................................................
1350 OMS 19-19
8DG42227DAAA 9.6
Issue 3 December 2012
Bridge Network Management Bandwidth Profile per UNI
Connection Less Networks
....................................................................................................................................................................................................................................
The following table reports the known operations at NE configuration or at Port upload.
Table specify the manual operation needed or the predefined default operation.

UNI Configuration. Bandwidth (BWD) Default Value. Modification


Profile allowed. Allowed.
ETS. Per UNI, Per EVC, /. Yes, Bwd Per UNI only
Per CoS. before UNI usage.
ETS (Provider Per UNI, Per EVC, /. Yes, Bwd Per UNI only
Bridge). Per CoS. before UNI usage.
ETB (MAC Bridge). Per UNI. CIR=PIR=Port NO.
Rate.
ETB (Virtual Bridge). Per UNI. CIR=PIR=Port NO.
Rate.

After having configured a UNI supporting a Bandwidth Profile per UNI, each EVC using
that port inherits, from that UNI the same Bandwidth profile for traffic entering from that
UNI. All the EVCs instantiated as entering from that UNI use the same Bandwidth
profile).
From the traffic point of view, all traffic entering in a UNI (from a CE) is in competition
with other traffics for the probability to be transmitted in the transport network.
An EVC using a UNI being configured with a Bandwidth Profile per UNI can use other
UNIs having different Bandwidth Profiles configured (either per UNI, Per EVC, Per
CoS).

EVC provisioning
It is important to differentiate the expected management behavior (particularly for
allocation and provisioning steps) in the various cases of Connection Oriented (ETS) or
Connection Less (ETB) management.
ETS Case:
When an EVC lying on an ETS domain uses a UNI defined to support a Bandwidth
Profile per UNI, the Ethernet Segment starting from that UNI inherits (as Traffic
Descriptor Definition) the information defined in that Bandwidth profile.
When the EVC is allocated, this implying the allocation of contained Ethernet Segments,
that TD (reflecting the BwdProfilePerUNI) is propagated along the route of the Ethernet
Segment.
When the EVC is Implemented, this implying the implementation of contained Ethernet
Segments, that TD (reflecting the BwdProfilePerUNI) is provisioned on all affected NEs
along the route of the Ethernet Segment.
In terms of Provisioning, the SNMP objects to be provisioned is a FlowGroup (reflecting
that EVC on the UNI) with associated a Traffic Descriptor.

....................................................................................................................................................................................................................................
19-20 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Bridge Network Management Bandwidth Profile per UNI
Connection Less Networks
....................................................................................................................................................................................................................................
ETB Provider Bridge Case:
When an EVC lying on an ETB Provider Bridge domain uses a UNI defined to support a
Bandwidth Profile per UNI, the EVC Termination (reflecting the traffic entering from that
UNI) inherits (as Traffic Descriptor Definition) the information defined in that Bandwidth
profile.
This “inheritance” can happen both at EVC Definition and during EVC Termination
Adding.
The Traffic Descriptor reflecting the BwdProfilePerUNI is defined and associated to the
EVC Termination.
When the EVC is Implemented, this implying the implementation of EVC Termination,
the TD that reflects the BwdProfilePerUNI, is provisioned on the affected NEs.
ETB Virtual and MAC Bridge Case:
When an EVC lying on an ETB Virtual or MAC Bridge domain uses a UNI defined to
support a Bandwidth Profile per UNI, the EVC Termination (reflecting the traffic entering
from that UNI) inherits (as Traffic Descriptor Definition) the information defined in that
Bandwidth profile.
This “inheritance” can happen both at EVC Definition and during EVC Termination
Adding.
The TD reflecting the BwdProfilePerUNI is defined and associated to that EVC
Termination.
When the EVC is Implemented, nothing happens on NEs, because in the scope of Virtual
and MAC bridge no provisioning is possible in terms of Traffic Descriptors.

....................................................................................................................................................................................................................................
1350 OMS 19-21
8DG42227DAAA 9.6
Issue 3 December 2012
Bridge Network Management View the list of bridge NEs
Connection Less Networks
....................................................................................................................................................................................................................................

View the list of bridge NEs


When to use
This function lists the Network Elements of connection less type.

Related Information
For information, see: “Overview about Workflow ” (p. 19-88).

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.

Task
From the MS-GUI Main view:
...................................................................................................................................................................................................

1 Follow the path Search > Packet > Services > Connection Less (Bridge).
Result: The Connection Less menu is shown.
...................................................................................................................................................................................................

2 Bridge NEs
Result: The list window is displayed.
See the following topic in this document: “Description of the list of Bridge NEs”
(p. 19-23)
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
19-22 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Bridge Network Management Description of the list of Bridge NEs
Connection Less Networks
....................................................................................................................................................................................................................................

Description of the list of Bridge NEs


Attributes of a Bridge NE
The attributes displayed for each Bridge (Connection less) NE are:
• User Label.
• Working State (Normal, Configuring, Removing).
• STP Type(MSTP, RSTP).
• Domain.
• MAC Address.
• Network Element.
• Spanning Tree Instance.
• Provider Bridge Operation Mode(Not Meaningful, 5P3D).
• PTM Name.

....................................................................................................................................................................................................................................
1350 OMS 19-23
8DG42227DAAA 9.6
Issue 3 December 2012
Bridge Network Management View the list of bridge ENEs
Connection Less Networks
....................................................................................................................................................................................................................................

View the list of bridge ENEs


When to use
This function lists the External Network Elements of connection less type.

Related Information
For information, see: “Overview about Workflow ” (p. 19-88).

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.

Task
From the MS-GUI Main view:
...................................................................................................................................................................................................

1 Follow the path Search > Packet > Services > Connection Less (Bridge).
Result: The Connection Less menu is shown.
...................................................................................................................................................................................................

2 Bridge External NEs


Result: The list window is displayed.
See the following topic in this document: “Description of the list of Bridge ENEs”
(p. 19-25)
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
19-24 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Bridge Network Management Description of the list of Bridge ENEs
Connection Less Networks
....................................................................................................................................................................................................................................

Description of the list of Bridge ENEs


Attributes of an ENE
The attributes displayed for each Bridge (Connection less) ENE are:
• User Label.
• Working State (Normal, Configuring, Removing).
• STP Type(MSTP, RSTP).
• Domain.
• MAC Address.
• Network Element.
• Spanning Tree Instance.
• Provider Bridge Operation Mode(Not Meaningful, 5P3D).
• PTM Name.

....................................................................................................................................................................................................................................
1350 OMS 19-25
8DG42227DAAA 9.6
Issue 3 December 2012
Bridge Network Management View the Provider Bridge Flows of an EVC
Connection Less Networks
....................................................................................................................................................................................................................................

View the Provider Bridge Flows of an EVC


When to use
This function shows the provider bridge Flows of an EVC.

Related Information
For information about Connection Less EVC, see: “Bridge Traffic Management”
(p. 19-6).

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.

Task
From the MS-GUI Main view:
...................................................................................................................................................................................................

1 Select the path Search > Packet > Services > Connection Less (Bridge) > Bridge EVCs.
Result: The EVC list is shown.
...................................................................................................................................................................................................

2 Select the Bridge EVC and select the path Search > Bridge EVC > Provider bridge
Flows.
Result: The list shows the flows belonging to the selected EVC.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
19-26 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Bridge Network Management Display the Ethernet Bridge Transport Link list
Connection Less Transport Link Management
....................................................................................................................................................................................................................................

Connection Less Transport Link Management

Display the Ethernet Bridge Transport Link list


When to use
The Ethernet Transport Link List window presents all the Ethernet Transport Links and
their attributes.

Related Information
If this list is required from the VLAN type list, only Transport Links whose edge ports are
associated to the selected VLAN type, are displayed.
For general information about Transport Links, see: “Transport link management”
(p. 11-50).

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Conditions
To get a positive result:
• The Transport Link must not be in use by an Ethernet Segment (Its usage state must
be Idle).
• The Transport Link must have an SDH or Cable technology.

Task
From the Multi Service GUI Main view:
...................................................................................................................................................................................................

1 Select Search > Packet > Services.


Result: The menu of the Services is shown.
...................................................................................................................................................................................................

2 Select Connection Less > Transport Link.

....................................................................................................................................................................................................................................
1350 OMS 19-27
8DG42227DAAA 9.6
Issue 3 December 2012
Bridge Network Management Display the Ethernet Bridge Transport Link list
Connection Less Transport Link Management
....................................................................................................................................................................................................................................
Result: The list window is displayed.
See the following topic in this document: “Description of the list of Bridge Transport
Links” (p. 19-29)

Figure 19-1 Connection Less Transport Link List

E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
19-28 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Bridge Network Management Description of the list of Bridge Transport Links
Connection Less Transport Link Management
....................................................................................................................................................................................................................................

Description of the list of Bridge Transport Links


Attributes of a Bridge Transport Link
The attributes displayed for each Bridge (Connection less) Transport Link are:
• User Label.
• Subnetwork.
• Technology (MPLS, SDH, Cable).
• Total Bandwidth.
• Usage State (Idle, Busy, Reserved, Not Meaningful).
• Working State (Normal, Configuring, Removing).
• Configuration State (Configured, Partially Configured, Not Configured).
• Domain.
• Domain Type.

....................................................................................................................................................................................................................................
1350 OMS 19-29
8DG42227DAAA 9.6
Issue 3 December 2012
Bridge Network Management Configure a transport Link
Connection Less Transport Link Management
....................................................................................................................................................................................................................................

Configure a transport Link


When to use
This function permits to change the VLAN Protocol Type of Transport Link extremities.

Related Information
For information about Transport Link management, see: “Overview about Transport links
” (p. 14-4).
The VLAN Type is not an attribute of the Transport Link. The VLAN Type is an attribute
of its extremities (that is, Transport Link terminations). So, VLAN Type is displayed in
the extremity window of the Transport Link.
For these reasons, while the Edge port modification command acts on one Edge port (and
its attributes), the Transport Link configuration command acts only on the Transport Link
terminations. The command is a shortcut for the user, not to configure separately the two
terminations.
The ports at the extremities of the Transport Link are active and configured with the
VLAN Type and, hence:
• They recognize as tagged only the Ethernet frames that are tagged with this VLAN
type.
• Any push operation (that is, VLAN constraint of type "Push") defined on them uses
the specified VLAN type to create (and push) new VLAN tags.
PCP Table Profile compliant with NE
PCP Table Profile possible values are As Container, 5P3D, 6P2D, 7P1D, 8P0D; to be
assigned in compliance with the NE, as listed:
• On node basis, ES1/4 admits the values: 5P3D (default on node basis), 8P0D.
• On node basis, ES16 admits the values: 5P3D (default on node basis), 8P0D.
• On port basis, ES1/4 does not admit any PCP Port table profile.
• On port basis, ES16 admits the values: as Container (This value is the default on Port
Basis [default=0] mirroring the value defined on Node basis), 5P3D, 6P2D, 7P1D,
8P0D.

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.

....................................................................................................................................................................................................................................
19-30 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Bridge Network Management Configure a transport Link
Connection Less Transport Link Management
....................................................................................................................................................................................................................................
Conditions
To get a positive result:
• The Transport Link must not be in use by an Ethernet Segment (Its usage state must
be Idle).
• The Transport Link must have an SDH or Cable technology.

Task
From the Multi Service GUI Main view:
...................................................................................................................................................................................................

1 follow the path Search > Packet > Services > Connection Less > Transport Link.
...................................................................................................................................................................................................

2 Select the Transport Link in the list.


...................................................................................................................................................................................................

3 Follow the path Action > Configure..

....................................................................................................................................................................................................................................
1350 OMS 19-31
8DG42227DAAA 9.6
Issue 3 December 2012
Bridge Network Management Configure a transport Link
Connection Less Transport Link Management
....................................................................................................................................................................................................................................
Result: The configuration window is displayed.

Figure 19-2 Transport Link Configuration window

...................................................................................................................................................................................................

4 To configure a Transport Link:


• Acceptable Frame Type (All, ONLY VLAN tagged):
• PVID.
• Enable Ingress Filtering.
• Priority bit mapping.
• Default User Priority.
....................................................................................................................................................................................................................................
19-32 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Bridge Network Management Configure a transport Link
Connection Less Transport Link Management
....................................................................................................................................................................................................................................
• PCP Table Profile. See “PCP Table Profile compliant with NE” (p. 19-30).
• Select a VLAN Type (by using the sensitive help) or set the Set standard VLAN Type
(8100) value to true.
...................................................................................................................................................................................................

5 Click Ok button.
Result: After confirmation, the Configuration state of the Transport Link is
recalculated and set to:
• Configured: if both extremities are active and are configured with the same
VLAN Tag Protocol Type.
• Partially Configured: if only one extremity is active (while the other is not active)
or when both extremities are active but are configured with two different VLAN
Tag Protocol Types.
• Not Configured: if both extremities are not active.

E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS 19-33
8DG42227DAAA 9.6
Issue 3 December 2012
Bridge Network Management Get the Transport Link extremities
Connection Less Transport Link Management
....................................................................................................................................................................................................................................

Get the Transport Link extremities


When to use
This function gets information about the extremities of a Transport Link.
This function permits optionally to modify extremity characteristics.

Related Information
For information about Transport Link management, see: “Overview about Transport links
” (p. 14-4).

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.

Task
From the Multi Service GUI Main view:
...................................................................................................................................................................................................

1 Follow the path: Search > Packet > Services > Connection Less > Transport Link.
...................................................................................................................................................................................................

2 Select the Transport Link in the list.


...................................................................................................................................................................................................

3 Follow the path Search > Inventory from Transport Link > Extremities.

....................................................................................................................................................................................................................................
19-34 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Bridge Network Management Get the Transport Link extremities
Connection Less Transport Link Management
....................................................................................................................................................................................................................................
Result: The extremities window is displayed.
See the following topic in this document: “Description of the list of Transport Link
extremities” (p. 19-37)

Figure 19-3 Transport Link Extremities window

...................................................................................................................................................................................................

4 Change parameters.

....................................................................................................................................................................................................................................
1350 OMS 19-35
8DG42227DAAA 9.6
Issue 3 December 2012
Bridge Network Management Get the Transport Link extremities
Connection Less Transport Link Management
....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

5 Click Ok button.
Result: The Transport Link extremities attributes are changed consequently.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
19-36 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Bridge Network Management Description of the list of Transport Link extremities
Connection Less Transport Link Management
....................................................................................................................................................................................................................................

Description of the list of Transport Link extremities


Attributes of a Transport Link extremity
The attributes shown are:
• Network Element.
• Network Element type.
• Termination user label.
• Activation State.
• VLAN Type.
• Acceptable Frame Type.
• PVID.
• Enable Ingress Filtering.
• Default User Priority.
• Priority bit mapping.
• PCP Table Profile.

....................................................................................................................................................................................................................................
1350 OMS 19-37
8DG42227DAAA 9.6
Issue 3 December 2012
Bridge Network Management Get the Transport Link properties
Connection Less Transport Link Management
....................................................................................................................................................................................................................................

Get the Transport Link properties


When to use
This function gets information about the properties of a Transport Link.

Related Information
For information about Transport Link management, see: “Overview about Transport links
” (p. 14-4).

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.

Task
From the Multi Service GUI Main view:
...................................................................................................................................................................................................

1 Follow the path Search > Packet > Services > Connection Less > Transport Link.
...................................................................................................................................................................................................

2 Select the Transport Link in the list.


...................................................................................................................................................................................................

3 Follow the path Action > Properties.

....................................................................................................................................................................................................................................
19-38 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Bridge Network Management Get the Transport Link properties
Connection Less Transport Link Management
....................................................................................................................................................................................................................................
Result: The properties window is displayed.
See the following topic in this document: “Details of an ETB Transport Link”
(p. 19-40)

Figure 19-4 Transport Link Properties window

E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS 19-39
8DG42227DAAA 9.6
Issue 3 December 2012
Bridge Network Management Details of an ETB Transport Link
Connection Less Transport Link Management
....................................................................................................................................................................................................................................

Details of an ETB Transport Link


Attributes of an ETB Transport Link
The attributes displayed for each Transport Link are:
• Id.
• User Label.
• Subnetwork Id Label.
• Subnetwork.
• Technology (MPLS, SDH, Cable).
• Usage State (Idle, Busy, Reserved, Not Meaningful).
• Working State (Normal, Configuring, Removing).
• A END Id label.
• Z END Id label.
• A END Type label.
• Z END Type label.
• Transport Link Label.
• Configuration State (Configured, Partially Configured, Not Configured).
• VLAN Id.
• VLAN Type.
• Domain Id.
• Domain.
• Domain Type.
• STI Id label.
• STI User Label.
• EVC Id.
• EVC User Label.
• Total Bandwidth.
• NAD.

....................................................................................................................................................................................................................................
19-40 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Bridge Network Management Activate a Bridge Transport Link
Connection Less Transport Link Management
....................................................................................................................................................................................................................................

Activate a Bridge Transport Link


When to use
This function activates a Bridge Transport Link.

Related Information
For information about Connection Less EVC, see: “Bridge Traffic Management”
(p. 19-6).

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.

Task
From the MS-GUI Main view:
...................................................................................................................................................................................................

1 Follow the path Search > Packet > Services > Connection Less (Bridge) > Bridge
Transport Links.
Result: The list window is displayed.
...................................................................................................................................................................................................

2 Select the Transport Links in the list.


...................................................................................................................................................................................................

3 Select Action > Bridge Transport Link > Activate.


Result: The Transport Link is activated.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS 19-41
8DG42227DAAA 9.6
Issue 3 December 2012
Bridge Network Management Deactivate a Bridge Transport Link
Connection Less Transport Link Management
....................................................................................................................................................................................................................................

Deactivate a Bridge Transport Link


When to use
This function deactivates a Bridge Transport Link.

Related Information
For information about Connection Less EVC, see: “Bridge Traffic Management”
(p. 19-6).

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.

Task
From the MS-GUI Main view:
...................................................................................................................................................................................................

1 Follow the path Search > Packet > Services > Connection Less (Bridge) > Bridge
Transport Links.
Result: The list window is displayed.
...................................................................................................................................................................................................

2 Select the Transport Links in the list.


...................................................................................................................................................................................................

3 Select Action > Bridge Transport Link > Deactivate.


Result: The Transport Link is deactivated.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
19-42 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Bridge Network Management View the list of Bridge Edge Ports
Connection Less Transport Link Management
....................................................................................................................................................................................................................................

View the list of Bridge Edge Ports


When to use
This function lists Bridge Edge Ports.

Related Information
For information about Connection Less EVC, see: “Bridge Traffic Management”
(p. 19-6).

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.

Task
From the MS-GUI Main view:
...................................................................................................................................................................................................

1 Follow the path Search > Packet > Services > Connection Less (Bridge).
Result: The Bridge menu is displayed.
...................................................................................................................................................................................................

2 Select Bridge Edge Port.


Result: The list window is displayed.
See the following topic in this document: “Description of the list of Bridge Edge
Ports” (p. 19-44)
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS 19-43
8DG42227DAAA 9.6
Issue 3 December 2012
Bridge Network Management Description of the list of Bridge Edge Ports
Connection Less Transport Link Management
....................................................................................................................................................................................................................................

Description of the list of Bridge Edge Ports


Attributes of a Bridge Edge Port
The attributes displayed for each Bridge Edge Port are:
• User Label.
• Rate.
• Network Element.
• EVC User Label.
• Role (Root, Leaf, Both).
• Usage State.
• VLAN Type.

....................................................................................................................................................................................................................................
19-44 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Bridge Network Management Activate a Bridge Edge Port
Connection Less Transport Link Management
....................................................................................................................................................................................................................................

Activate a Bridge Edge Port


When to use
This function activates a Bridge Edge Port.

Related Information
For information about Connection Less EVC, see: “Bridge Traffic Management”
(p. 19-6).

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.

Task
From the MS-GUI Main view:
...................................................................................................................................................................................................

1 Follow the path Search > Packet > Services > Connection Less (Bridge) > Bridge Edge
Ports.
Result: The list window is displayed.
...................................................................................................................................................................................................

2 Select the Edge Port in the list.


...................................................................................................................................................................................................

3 Select Action > Bridge Edge Port > Activate.


Result: The Port is activated.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS 19-45
8DG42227DAAA 9.6
Issue 3 December 2012
Bridge Network Management Deactivate a Bridge Edge Port
Connection Less Transport Link Management
....................................................................................................................................................................................................................................

Deactivate a Bridge Edge Port


When to use
This function deactivates a Bridge Edge Port.

Related Information
For information about Connection Less EVC, see: “Bridge Traffic Management”
(p. 19-6).

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.

Task
From the MS-GUI Main view:
...................................................................................................................................................................................................

1 Follow the path Search > Packet > Services > Connection Less (Bridge) > Bridge Edge
Ports.
Result: The list window is displayed.
...................................................................................................................................................................................................

2 Select the Edge Port in the list.


...................................................................................................................................................................................................

3 Select Action > Bridge Edge Port > Deactivate.


Result: The Port is deactivated.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
19-46 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Bridge Network Management View the Connection Less EVC list
Connection Less EVC Management
....................................................................................................................................................................................................................................

Connection Less EVC Management

View the Connection Less EVC list


When to use
The Ethernet Virtual Connection List window presents all the EVCs and their attributes.

Related Information
If this list is required from the Ethernet Service List (or from the Ethernet Segment List or
from the Ethernet Transport Link List), only the EVCs associated to the selected service
(or Ethernet Segment or Ethernet Transport Link) are displayed.
For information about Connection Less EVC, see: “Bridge Traffic Management”
(p. 19-6).

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.

Task
From the MS-GUI Main view:
...................................................................................................................................................................................................

1 Select Search > Packet > Services.


Result: The menu of the Services is shown.
...................................................................................................................................................................................................

2 Select Connection Less > Bridge EVCs.


Result: The list window is displayed.
See the following topic in this document: “Description of the list of Bridge EVCs”
(p. 19-48)
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS 19-47
8DG42227DAAA 9.6
Issue 3 December 2012
Bridge Network Management Description of the list of Bridge EVCs
Connection Less EVC Management
....................................................................................................................................................................................................................................

Description of the list of Bridge EVCs


Attributes of a Bridge EVC
The attributes displayed for each EVC are:
• User Label.
• Ethernet Service User Label.
• Type (Point to point, Routed multi-point, Any to any).
• Service Type.
• Traffic Type (Unicast, Multicast).
• Domain.
• Bridge Type.
• Working State (Normal, Configuring, Allocating, De-allocating, Implementing,
De-implementing, Commissioning, De-commissioning, Termination adding,
Termination removing, Constraint adding, Constraint removing, removing).
• Provisioning State (Defined, Partially allocated, Allocated, Partially implemented,
Implemented, Commissioned).
• Service State.
• Availability Status (Normal, Degraded, In Failure, Not Meaningful).
• Domain.
For more attributes, refer to “EVC attributes to support ELP” (p. 28-36).

....................................................................................................................................................................................................................................
19-48 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Bridge Network Management Create a Bridge EVC
Connection Less EVC Management
....................................................................................................................................................................................................................................

Create a Bridge EVC


When to use
This function consists in creating a Connection Less Ethernet Virtual Connection.

Related Information
If this action is required from the Service List, the Ethernet Service field of the EVC
Creation window, is filled with the service selected in the Service List.
For information about Connection Less EVC, see: “Bridge Traffic Management”
(p. 19-6).
Service Type, Type, Resource Sharing relations

Table 19-2 Service Type, Type, Resource Sharing relations

Service Type. Type. Traffic Type. Resource Sharing.


EVPL. Point-to-Point. Unicast. Full.
EPTL. Point-to-Point. Unicast. Private UNI and Link.
EPL. Point-to-Point. Unicast. Private UNI.
EVPLAN. Any-to-Any. Unicast. Full.
Private UNI.
Private Link.
Private UNI and Link.
1
.
Extended EVPL. Point-to-Point. Unicast. Full.
Private UNI.
Private Link.
Private UNI and Link.
1
.
Extended Any-to-Any. Unicast. Full.
EVPLAN. Rooted Multicast. Private UNI.
Multipoint. Private Link.
1
. Private UNI and Link.
1
.
HSI. Rooted Unicast. Full.
Multipoint. Multicast.
1
.
BTV. Rooted Unicast. Full.
Multipoint. Multicast.
1
.

....................................................................................................................................................................................................................................
1350 OMS 19-49
8DG42227DAAA 9.6
Issue 3 December 2012
Bridge Network Management Create a Bridge EVC
Connection Less EVC Management
....................................................................................................................................................................................................................................
Table 19-2 Service Type, Type, Resource Sharing relations (continued)

Service Type. Type. Traffic Type. Resource Sharing.


Broadcast. Rooted Unicast. Full.
Multipoint. Private UNI.
Private Link.
Private UNI and Link.
1
.

Notes:
1. This case allows a selection of the parameters.

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Conditions
To get a positive result:
• The User Label must be different from any in use by another EVC.
• Only one Root termination is authorized.
• The EVC Type must be compatible with the service type of the associated Ethernet
Service.
• The EVC Type must be compatible with the selected Traffic Type.
• The role of each EVC termination must be compatible with the EVC Type.

Task
From the Multi Service GUI Main view:
...................................................................................................................................................................................................

1 Follow the path Action > Packet > Services > Connection Less (Bridge) > Create
Bridge EVC.
Result: The creation window is displayed.
...................................................................................................................................................................................................

2 General Panel.
Following data can be filled in the General Panel:
• Enter an EVC User Label.
• Service:

....................................................................................................................................................................................................................................
19-50 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Bridge Network Management Create a Bridge EVC
Connection Less EVC Management
....................................................................................................................................................................................................................................
Two different choices are possible:
– Choose an already created Ethernet Service by using the sensitive help (this field
is automatically filled if this window is required from the Service List).
– Choose a Service Type (EVPL, EPTL, EPL, EVPLAN, Extended EVPL,
Extended EVPLAN, HSI, BTV, Broadcast).
• The parameters: Type and Resource Sharing are assigned according to the chosen
Service Type as indicated in: Table 19-2, “Service Type, Type, Resource Sharing
relations” (p. 19-49).
• Select a Type (Point to Point, Routed Multipoint, Any to Any (=Multipoint to
multipoint)). if allowed.
• Select a Traffic Type (Unicast, Multicast), the selection of the parameter depends on
the selected type.
• Select a Service Level (Premium, Gold, Silver, Bronze).
Resource Sharing: to manage the issue related to Shared or Dedicated Transport Link
usage, the Resource Sharing attribute at EVC Level can assume following values.
– Full: the EVC Service under definition can use every resource without any
restriction.
– Private UNI: the EVC Service under definition must use Private UNI, that is, the
UNI is uniquely used by the EVC Service.
– Private Link: The EVC Service under definition must use Private Links, that is,
Transport Links uniquely used by the EVC Service.
– Private UNI and LINK: The EVC Service under definition must use Private UNI
and Private Links, that is, chosen Transport Links and UNIs are uniquely used by
that EVC Service.
• Select a Domain Label.
• Select a Service Level (Premium, Gold, Silver, Bronze).
• C-VLAN Preservation: check it to keep the VLAN Id through the EVC.
(see: “C-VLAN and CoS Preservation” (p. 18-41)).
• C-VLAN CoS Preservation: check it to keep the Priority Bits through the EVC.
(see: “C-VLAN and CoS Preservation” (p. 18-41)).
• NAD: select a NAD value from the list.
• Enter a Comment (optional).
• Enter an External Mark (optional). It can be used to identify external systems having
relations with the EVC (for example an ownership).
...................................................................................................................................................................................................

3 Detail Panel.
Following data can be filled in the Detail Panel:
• Enter Vlan Distribution (Full mesh, Not full mesh).
• Enter s-Vlan Id the range of the VLAN over SDH path, an equal value can go on the
same domain.
• Define IGMP Snooping State (Not Meaningful, Enabled, Disabled).
....................................................................................................................................................................................................................................
1350 OMS 19-51
8DG42227DAAA 9.6
Issue 3 December 2012
Bridge Network Management Create a Bridge EVC
Connection Less EVC Management
....................................................................................................................................................................................................................................
This option is available only for EVPLAN, Extended EVPLAN and BTV EVC types
and can optionally be defined as:
– Enabled: to remind that the IGMP snooping protocol is used on top of the created
EVC. The IGMP is enabled immediately after the implementation of the EVC and
the IGMP is disabled immediately before the de-implementation the EVC.
– Disabled: to remind that the IGMP snooping protocol is not used on the created
EVC.
• Select the Frame Delivery parameters (see “Frame delivery” (p. 18-41))
– Unicast Service Frame Delivery.
– Multicast Service Frame Delivery.
– Broadcast Service Frame Delivery.
• Select the standard Vlan Type (8100).
• Enter a Vlan Bundle in the range of the local Vlan.
...................................................................................................................................................................................................

4 Layer-2 Control Protocol Panel.


If the entire set has the same value, then select the first parameter Put entire set to
• Default, all the set is put to Tunnel.
• Not Meaningful, all the set is put to Not Meaningful.
• Free, every value can be different.
Select which control Protocol must be tunneled or discarded. Such configuration is
propagated to all EVC terminations (this configuration ensures that all EVC terminations
use the same Tunneling criteria). A check is needed also toward Layer-2 Control Protocol
Processing defined at UNI level. This check allows a congruent management of Control
protocols crossing the EVC.
The default value is Tunnel. Checking the Set to Default box all values are set to Tunnel.
Checking the Set to Not Meaningful box all values are set to Not Meaningful.
The single L2 protocol can have different values, select a value for each protocol
selecting between Tunnel, Not Meaningful, and Discard.
...................................................................................................................................................................................................

5 Confirm the EVC creation with OK button.


E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
19-52 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Bridge Network Management Modify a Bridge EVC
Connection Less EVC Management
....................................................................................................................................................................................................................................

Modify a Bridge EVC


When to use
The EVC modification gives the possibility to modify parameters and relative values.

Related Information
If the User Label is modified, the new User Label must be different from the one which
is already used by another EVC.
For information about Connection Less EVC, see: “Bridge Traffic Management”
(p. 19-6).

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.

Task
From the MS-GUI Main view:
...................................................................................................................................................................................................

1 Follow the path Search > Packet > Services > Connection Less (Bridge) > Bridge EVCs.
Result: The Connection Less EVC list window is displayed.
...................................................................................................................................................................................................

2 Select the element to modify in the list.


...................................................................................................................................................................................................

3 Click the right mouse button and select Modify from the popup menu.
...................................................................................................................................................................................................

4 To modify an EVC (Ingress Flow):


• Enter a new User Label (optional).
• C-VLAN Preservation: check it to keep the VLAN Id through the EVC.
(see: “C-VLAN and CoS Preservation” (p. 18-41)).
• C-VLAN CoS Preservation: check it to keep the Priority Bits through the EVC.
(see: “C-VLAN and CoS Preservation” (p. 18-41)).

....................................................................................................................................................................................................................................
1350 OMS 19-53
8DG42227DAAA 9.6
Issue 3 December 2012
Bridge Network Management Modify a Bridge EVC
Connection Less EVC Management
....................................................................................................................................................................................................................................
• Modify the Comment (optional).
• Modify the External Mark (optional).

Figure 19-5 EVC Modification window (Details)

To modify an EVC (Details Panel):


• Modify VLAN distribution (optional).
• Modify S-Vlan Id value (optional).
• Modify Unicast Service Frame Delivery (optional).
• Modify Multicast Service Frame Delivery (optional).
• Modify Broadcast Service Frame Delivery (optional).
• Modify VLAN Type (optional).
• Modify VLAN Bundle (optional).

....................................................................................................................................................................................................................................
19-54 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Bridge Network Management Modify a Bridge EVC
Connection Less EVC Management
....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

5 Click Ok button to confirm the changes.


Result: Then, the EVC list, the tree area, and the opened graphical views are updated.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS 19-55
8DG42227DAAA 9.6
Issue 3 December 2012
Bridge Network Management Delete a Bridge EVC
Connection Less EVC Management
....................................................................................................................................................................................................................................

Delete a Bridge EVC


When to use
This function consists in deleting an EVC from the 1350 OMS PKT supervision.

Related Information
For information about Connection Less EVC, see: “Bridge Traffic Management”
(p. 19-6).
After confirmation, the following checks are performed:
• the 1350 OMS PKT checks that no Ethernet Segment is referring the EVCs.
• the EVCs are dissociated from the related service (if no more EVC are associated to
the service, the service is also removed).
• the EVCs are removed.

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Conditions
To get a positive result:
• The provisioning state of the EVC must be defined.
• No Ethernet Segment is referring the EVC.
• No operation is pending on the EVC.

Task
From the Multi Service GUI Main view:
...................................................................................................................................................................................................

1 Follow the path Search > Packet > Services > Connection Less (Bridge) > Bridge EVCs.
...................................................................................................................................................................................................

2 On the Bridge EVCsr List Window, select the EVC to delete. Select Action > Bridge EVC
> Delete from the Action menu.
...................................................................................................................................................................................................

3 Select one of the options in the confirmation box. Refer to the procedure “Confirm the
action” (p. 11-40).

....................................................................................................................................................................................................................................
19-56 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Bridge Network Management Delete a Bridge EVC
Connection Less EVC Management
....................................................................................................................................................................................................................................
Result: The EVC is deleted.
The EVC list, the tree area, and the opened graphical views are updated.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS 19-57
8DG42227DAAA 9.6
Issue 3 December 2012
Bridge Network Management Get the EVC properties
Connection Less EVC Management
....................................................................................................................................................................................................................................

Get the EVC properties


When to use
This function gets information about an Ethernet Virtual Connection.

Related Information
For general information about Transport Links, see: “Transport link management”
(p. 11-50).

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.

Task
From the Multi Service GUI Main view:
...................................................................................................................................................................................................

1 Select the path Search > Packet > Services > Connection Less (Bridge) > Bridge EVCs.
Result: The Bridge EVC list is displayed.
...................................................................................................................................................................................................

2 Select a Bridge EVC element from the list.


...................................................................................................................................................................................................

3 From the Main Menu follow the path Action > Properties.

....................................................................................................................................................................................................................................
19-58 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Bridge Network Management Get the EVC properties
Connection Less EVC Management
....................................................................................................................................................................................................................................
Result: The Bridge EVC Properties window is displayed.
See the following topic in this document: “Details of a Bridge EVC” (p. 19-60)

Figure 19-6 EVC Properties window

E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS 19-59
8DG42227DAAA 9.6
Issue 3 December 2012
Bridge Network Management Details of a Bridge EVC
Connection Less EVC Management
....................................................................................................................................................................................................................................

Details of a Bridge EVC


Attributes of a Bridge EVC
The attributes displayed for each EVC are:
• Id.
• User Label.
• Service Id Label.
• Ethernet Service User Label.
• Type (Point to point, Routed multi-point, Any to any).
• Traffic Type (Unicast, Multicast).
• Directionality.
• Service Level.
• Comment.
• External Mark.
• Action Type.
• Action Date.
• Working State (Normal, Configuring, Allocating, De-allocating, Implementing,
De-implementing, Commissioning, De-commissioning, Termination adding,
Termination removing, Constraint adding, Constraint removing, removing).
• Provisioning State (Defined, Partially allocated, Allocated, Partially implemented,
Implemented, Commissioned).
• Service State (Not in Service, In Service).
• Availability Status (Normal, Degraded, In Failure, Not Meaningful).
• ETS Id Label.
• ETS LABEL label.
• Vlan Type.
• Resource sharing.
• Domain Id.
• Domain.
• VLAN distribution.
• S-VLAN Id.

....................................................................................................................................................................................................................................
19-60 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Bridge Network Management Configure a Bridge or an ETS EVC
Connection Less EVC Management
....................................................................................................................................................................................................................................

Configure a Bridge or an ETS EVC


When to use
The configuration of an EVC consists in associating a Traffic Descriptor to the EVC. This
function is available for Connection Oriented and Connection Less EVCs.

Related Information
See “EVC Management” (p. 11-53).

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.

Task
From the Multi Service GUI Main view:
...................................................................................................................................................................................................

1 Select one the following commands:


• Search > Packet > Services > Connection Less (Bridge) > Bridge EVCs
• Search > Packet > Services > Connection Oriented (ETS) > ETS EVCs
Result: The EVC list window is displayed.
...................................................................................................................................................................................................

2 Select the EVC in the list.


...................................................................................................................................................................................................

3 Follow the path Action > Bridge EVC > EVC Configuration.
Result: The EVC Configuration window is displayed.
...................................................................................................................................................................................................

4 Select a Traffic Descriptor using the sensitive help.


...................................................................................................................................................................................................

5 Click Ok.
Result: The Traffic Descriptor is assigned to the EVC.
A correlation with the EVC is created.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS 19-61
8DG42227DAAA 9.6
Issue 3 December 2012
Bridge Network Management Add bridge Transport Link to EVC
Connection Less EVC Management
....................................................................................................................................................................................................................................

Add bridge Transport Link to EVC


When to use
This function adds a Transport Link to a Connection Less EVC.

Related Information
For information about Connection Less EVC, see: “Bridge Traffic Management”
(p. 19-6).

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Conditions
To get a positive result:
• The EVC provisioning state must be set to Defined.
• No operation is pending on the selected EVC.

Task
From the MS-GUI Main view:
...................................................................................................................................................................................................

1 Select the path Search > Packet > Services > Connection Less (Bridge) > Bridge EVCs.
...................................................................................................................................................................................................

2 Select the Bridge EVC.


...................................................................................................................................................................................................

3 Select the path Action > Bridge EVC > Add Transport Link to EVC.
...................................................................................................................................................................................................

4 Click Ok button to save the operation.


E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
19-62 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Bridge Network Management Remove bridge Transport Link to EVC
Connection Less EVC Management
....................................................................................................................................................................................................................................

Remove bridge Transport Link to EVC


When to use
This function disassociates a Transport Link from a Connection Less EVC.

Related Information
For information about Connection Less EVC, see: “Bridge Traffic Management”
(p. 19-6).

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Conditions
To get a positive result:
• The EVC provisioning state must be set to Defined.
• No operation is pending on the selected EVC.

Task
From the MS-GUI Main view:
...................................................................................................................................................................................................

1 Select the path Search > Packet > Services > Connection Less (Bridge) > Bridge EVCs.
Result: The EVC list is shown.
...................................................................................................................................................................................................

2 Select the Bridge EVC and select the path Search > Bridge EVC > Transport Link.
Result: The list shows the Transport Links belonging to the selected EVC.
...................................................................................................................................................................................................

3 Select a Transport Link.


...................................................................................................................................................................................................

4 Select the path Action > Transport Link > Remove Transport Link from EVC.
...................................................................................................................................................................................................

5 Select one of the options in the confirmation box. Refer to the procedure “Confirm the
action” (p. 11-40).
Result: If the command is confirmed, The Transport Link is disassociated from EVC.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS 19-63
8DG42227DAAA 9.6
Issue 3 December 2012
Bridge Network Management Inventory of bridge Transport Links of an EVC
Connection Less EVC Management
....................................................................................................................................................................................................................................

Inventory of bridge Transport Links of an EVC


When to use
This function shows a Transport Links from a Connection Less EVC.

Related Information
For information about Connection Less EVC, see: “Bridge Traffic Management”
(p. 19-6).

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Conditions
To get a positive result:
• The EVC provisioning state must be set to Defined.
• No operation is pending on the selected EVC.

Task
From the MS-GUI Main view:
...................................................................................................................................................................................................

1 Select the path Search > Packet > Services > Connection Less (Bridge) > Bridge EVCs.
Result: The EVC list is shown.
...................................................................................................................................................................................................

2 Select the Bridge EVC and select the path Search > Bridge EVC > Transport Link.
Result: The list shows the Transport Links belonging to the selected EVC.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
19-64 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Bridge Network Management EVC Fault Localization
Connection Less EVC Management
....................................................................................................................................................................................................................................

EVC Fault Localization


When to use
This function allows the user to display the localization of alarms on an EVC.

Related Information
The function is available for implemented EVCs.
For more information about EVC, refer to “EVC description” (p. 18-37).
For details about Fault Localization, see: “Fault Localization” (p. 11-69).

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.

Task
From the Multi Service GUI Main view:
...................................................................................................................................................................................................

1 Follow the path Search > Packet > Services > Connection Less (Bridge) > Bridge EVCs.
...................................................................................................................................................................................................

2 Select the EVC in the list.


...................................................................................................................................................................................................

3 Follow the path Search > Fault Localization.

....................................................................................................................................................................................................................................
1350 OMS 19-65
8DG42227DAAA 9.6
Issue 3 December 2012
Bridge Network Management EVC Fault Localization
Connection Less EVC Management
....................................................................................................................................................................................................................................
Result: The Bridge EVC Fault Localization window is displayed.
See the following topic in this document: “Description of the list of Fault
Localization” (p. 19-68)

Figure 19-7 EVC Fault Localization window

...................................................................................................................................................................................................

4 Select an alarmed port on the list, navigate to the Equipment View of the NE by issuing
Search > External Navigation to > USM.

....................................................................................................................................................................................................................................
19-66 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Bridge Network Management EVC Fault Localization
Connection Less EVC Management
....................................................................................................................................................................................................................................
Result: The NE User Interface window is displayed.

Figure 19-8 Show Equipment from EVC Fault Localization

E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS 19-67
8DG42227DAAA 9.6
Issue 3 December 2012
Bridge Network Management Description of the list of Fault Localization
Connection Less EVC Management
....................................................................................................................................................................................................................................

Description of the list of Fault Localization


Attributes of a Fault Localization
The Fault Localization window displays:
• The User Label of the alarmed entity.
• The Entity Type of the alarmed entity.
• The Alarm /Availability State.
• The Specific Fault Date.
• The Probable Cause.
• The Operator Label.
• The NE User Label
• The Global Alarm Date.
Note: The list is not refreshed automatically, click Actualize button to refresh it.

....................................................................................................................................................................................................................................
19-68 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Bridge Network Management Description of the list of Alarms
Connection Less EVC Management
....................................................................................................................................................................................................................................

Description of the list of Alarms


Attributes of an Alarm
The alarm list window displays:
• The Perceived Severity.
• The Event Date & Time.
• The Friendly Name.
• The Alarm Type.
• The Probable Cause.

....................................................................................................................................................................................................................................
1350 OMS 19-69
8DG42227DAAA 9.6
Issue 3 December 2012
Bridge Network Management Navigation to AS
Connection Less EVC Management
....................................................................................................................................................................................................................................

Navigation to AS
When to use
Starting from an implemented EVC, the corresponding alarm list can be displayed in AS
window.

Related Information
The function is available for implemented EVCs.
For general information about Fault Localization, see: “Fault Localization” (p. 11-69).

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.

Task
From the Multi Service GUI Main view:
...................................................................................................................................................................................................

1 Follow the path Search > Packet > Services > Connection Less (Bridge) > Bridge EVCs.
...................................................................................................................................................................................................

2 Select the EVC in the list.


...................................................................................................................................................................................................

3 Follow the path from the popup menu Search > External Navigation to > AS.

....................................................................................................................................................................................................................................
19-70 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Bridge Network Management Navigation to AS
Connection Less EVC Management
....................................................................................................................................................................................................................................
Result: The Fault Management window is displayed with the alarms concerning the
selected EVC.

Figure 19-9 AS window for EVC Alarms

E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS 19-71
8DG42227DAAA 9.6
Issue 3 December 2012
Bridge Network Management View the list of EVC terminations
Bridge EVC Termination Management
....................................................................................................................................................................................................................................

Bridge EVC Termination Management

View the list of EVC terminations


When to use
The EVC Termination List window presents all the terminations of the selected EVC and
their attributes.

Related Information
From list, the user displays the extremity of an EVC or deletes EVC.
If the list is required from the Ethernet Service List (or from the EVC List), only the EVC
terminations associated to the selected service (or EVC) are displayed.
For information about Connection Less EVC, see: “Bridge Traffic Management”
(p. 19-6).

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.

Task
From the MS-GUI Main view:
...................................................................................................................................................................................................

1 Select Search > Packet > Services > Connection Less (Bridge) > Bridge EVCs.
...................................................................................................................................................................................................

2 Select the bridge EVC in the list.


...................................................................................................................................................................................................

3 Select the path Search > Inventory from Bridge EVC > List EVC Terminations.
Result: The list window is displayed.
See the following topic in this document: “Description of the list of EVC
Terminations” (p. 19-73)
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
19-72 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Bridge Network Management Description of the list of EVC Terminations
Bridge EVC Termination Management
....................................................................................................................................................................................................................................

Description of the list of EVC Terminations


Attributes of a EVC Termination
The attributes displayed for each EVC termination are:
• EVC Termination User Label.
• Rate.
• Network Element.
• EVC User Label.
• Role (Root, Leaf, Both).
• Usage State.
• VLAN Type.

....................................................................................................................................................................................................................................
1350 OMS 19-73
8DG42227DAAA 9.6
Issue 3 December 2012
Bridge Network Management Add Connection Less EVC Termination
Bridge EVC Termination Management
....................................................................................................................................................................................................................................

Add Connection Less EVC Termination


When to use
This function consists in adding terminations to a Connection Less EVC.

Related Information
For information about Connection Less EVC, see: “Bridge Traffic Management”
(p. 19-6).

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Conditions
To get a positive result:
• The EVC provisioning state must be set to Defined.
• Only one termination can have "Root" role.
• EVC Termination Role must be congruent with the EVC topology.
• No operation is pending on the selected EVC.

Task
From the MS-GUI Main view:
...................................................................................................................................................................................................

1 Select the path Search > Packet > Services > Connection Less (Bridge) > Bridge EVCs.
...................................................................................................................................................................................................

2 Select the Bridge EVC in the list where the termination must be added.
...................................................................................................................................................................................................

3 Select the path Action > Bridge EVC > Add Connection Less EVC Termination.

....................................................................................................................................................................................................................................
19-74 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Bridge Network Management Add Connection Less EVC Termination
Bridge EVC Termination Management
....................................................................................................................................................................................................................................
Result: The Add Termination window is displayed.

Figure 19-10 Add EVC termination window (General Panel)

...................................................................................................................................................................................................

4 The Add Termination window has four different panels: General, Ingress Flow, Egress
Flow, and Layer-2 Control Protocol.

....................................................................................................................................................................................................................................
1350 OMS 19-75
8DG42227DAAA 9.6
Issue 3 December 2012
Bridge Network Management Add Connection Less EVC Termination
Bridge EVC Termination Management
....................................................................................................................................................................................................................................
On the General Panel, insert following data:
• Select a NE or ENE using the popup list window with available NEs.
• Select an Edge Port using the popup list window with available Edge Ports.
• Select the termination Role (Root, Leaf, Both).
...................................................................................................................................................................................................

5 On the Ingress Flow panel insert following data:


At least one Input Ethernet Flow OR at least one Output Ethernet Flow must be defined:
this allowing to cover following cases:
• To define some Source EVC Termination point in Broadcasting Topologies only
Input Ethernet Flows are defined.
• To define some Sink EVC Termination point in Broadcasting Topologies only Output
Ethernet Flows are defined.
• To define some Bidirectional EVC Termination point in PTP, Rooted MultiPoint or
Multi Point To Multi Point topologies, Input Ethernet Flows, and Output Ethernet
Flows are defined; such point can be either balanced (that is, having equal I/O
characteristics) or Unbalanced (that is, having Input characteristics different from
output characteristics both in term of classification, bandwidth, Qos, and so forth).
Execute the following steps:
• Select a Traffic Descriptor.
• Select Color Profile and Policy Mode (optional).
• Check or clear the Vlan Pop Enabled.

....................................................................................................................................................................................................................................
19-76 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Bridge Network Management Add Connection Less EVC Termination
Bridge EVC Termination Management
....................................................................................................................................................................................................................................
• Select the Classification Mode (Priority, DSCP).
• Select a Traffic Classifier clicking the button that displays the available Traffic
Classifier list.

...................................................................................................................................................................................................

6 On the Egress Flow panel insert following data:

....................................................................................................................................................................................................................................
1350 OMS 19-77
8DG42227DAAA 9.6
Issue 3 December 2012
Bridge Network Management Add Connection Less EVC Termination
Bridge EVC Termination Management
....................................................................................................................................................................................................................................
Execute following steps:
• Select the Class of Service (if Same as Ingress Flow not selected).
• Insert the VLAN and Priority for the Push operation.

Figure 19-11 Add EVC termination window (Egress Flow)

....................................................................................................................................................................................................................................
19-78 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Bridge Network Management Add Connection Less EVC Termination
Bridge EVC Termination Management
....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

7 On the Layer-2 Control Protocol Panel the control protocol is set for the termination. The
selection which control Protocol must be tunneled or discarded can be made also at
termination level.
If the entire set has the same value, then select the first parameter Put entire set to
• Default, all the set is put to Tunnel.
• Not Meaningful, all the set is put to Not Meaningful.
• Free, every value can be different.
A check is needed also toward Layer-2 Control Protocol Processing defined at UNI level.
This check allows a congruent management of Control protocols crossing the EVC.

....................................................................................................................................................................................................................................
1350 OMS 19-79
8DG42227DAAA 9.6
Issue 3 December 2012
Bridge Network Management Add Connection Less EVC Termination
Bridge EVC Termination Management
....................................................................................................................................................................................................................................
The single L2 protocol can have different values. Select a value for each protocol
selecting between Tunnel, Not Meaningful, and Discard.

Figure 19-12 Add EVC termination window (L2 Control Protocol Panel)

...................................................................................................................................................................................................

8 Click Ok button to save the operation.


E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
19-80 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Bridge Network Management Delete a Bridge EVC Termination
Bridge EVC Termination Management
....................................................................................................................................................................................................................................

Delete a Bridge EVC Termination


When to use
This function consists in deleting an EVC termination from the 1350 OMS PKT
supervision.

Related Information
For information about Connection Less EVC, see: “Bridge Traffic Management”
(p. 19-6).

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Conditions
To get a positive result:
• The specified EVC termination is not used as Ethernet Segment extremity.
• No operation is pending on the selected EVC termination.

Task
From the MS-GUI Main view:
...................................................................................................................................................................................................

1 Follow the path Search > Packet > Services > Connection Less (Bridge) > Bridge EVCs.
Result: The bridge EVC list window is displayed.
...................................................................................................................................................................................................

2 Select the bridge EVC in the list where the termination is to delete.
...................................................................................................................................................................................................

3 Select the path Search > Inventory from Bridge EVC > List EVC Terminations.
Result: The EVC termination list window is displayed.
...................................................................................................................................................................................................

4 On the Bridge EVCs termination List Window, select the EVC termination to delete.
Select Action > EVC Port > Delete from the Action menu.
...................................................................................................................................................................................................

5 Select one of the options in the confirmation box. Refer to the procedure “Confirm the
action” (p. 11-40).

....................................................................................................................................................................................................................................
1350 OMS 19-81
8DG42227DAAA 9.6
Issue 3 December 2012
Bridge Network Management Delete a Bridge EVC Termination
Bridge EVC Termination Management
....................................................................................................................................................................................................................................
Result: The EVC termination is deleted.
After confirmation:
• the EVC terminations are dissociated from the related EVC.
• the EVC terminations are removed.
The EVC Termination list is updated.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
19-82 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Bridge Network Management Configure a Bridge EVC Termination
Bridge EVC Termination Management
....................................................................................................................................................................................................................................

Configure a Bridge EVC Termination


When to use
This function consists in configuring an Ethernet Virtual Connection termination.

Related Information
For information about Connection Less EVC, see: “Bridge Traffic Management”
(p. 19-6).

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.

Task
From the MS-GUI Main view:
...................................................................................................................................................................................................

1 Follow the path Search > Packet > Services > Connection Less (Bridge) > Bridge EVCs.
Result: The EVC list window is displayed.
...................................................................................................................................................................................................

2 Select the EVC in the list.


...................................................................................................................................................................................................

3 Select the path Search > Inventory from Bridge EVC > List EVC Terminations.
Result: The EVC Termination list window is displayed.
...................................................................................................................................................................................................

4 Select the termination to configure in the list and follow the path Action > EVC Port >
EVC Termination Configuration.

....................................................................................................................................................................................................................................
1350 OMS 19-83
8DG42227DAAA 9.6
Issue 3 December 2012
Bridge Network Management Configure a Bridge EVC Termination
Bridge EVC Termination Management
....................................................................................................................................................................................................................................
Result: The EVC Port Configuration window is displayed.

Figure 19-13 EVC Termination Configuration window

...................................................................................................................................................................................................

5 On the Configuration Window.


To configure the EVC termination:
• Select a Traffic Descriptor using the list of the available Traffic Descriptors
displayed.
...................................................................................................................................................................................................

6 Click Ok.
Result: The Traffic Descriptor is assigned to the EVC termination.
A correlation with the EVC is created.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
19-84 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Bridge Network Management Get the EVC termination properties
Bridge EVC Termination Management
....................................................................................................................................................................................................................................

Get the EVC termination properties


When to use
This function gets information about an Ethernet Virtual Connection termination.

Related Information
For information about Connection Less EVC, see: “Bridge Traffic Management”
(p. 19-6).

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.

Task
From the MS-GUI Main view:
...................................................................................................................................................................................................

1 Select the path Search > Packet > Services > Connection Less (Bridge) > Bridge EVCs.
Result: The Bridge EVC list is displayed.
...................................................................................................................................................................................................

2 Select a Bridge EVC element from the list.


...................................................................................................................................................................................................

3 To display the EVC terminations, select the path Search > Inventory from Bridge EVC >
List EVC Terminations.
Result: The EVC Termination list window is displayed.
...................................................................................................................................................................................................

4 From the Main Menu follow the path Action > Properties.

....................................................................................................................................................................................................................................
1350 OMS 19-85
8DG42227DAAA 9.6
Issue 3 December 2012
Bridge Network Management Get the EVC termination properties
Bridge EVC Termination Management
....................................................................................................................................................................................................................................
Result: The Bridge EVC termination Properties window is displayed.
See the following topic in this document: “Details of an EVC Termination” (p. 19-87)

Figure 19-14 EVC Termination Properties window

E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
19-86 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Bridge Network Management Details of an EVC Termination
Bridge EVC Termination Management
....................................................................................................................................................................................................................................

Details of an EVC Termination


Attributes of an EVC Termination
The attributes displayed for each EVC termination are:
• Id.
• EVC Termination User Label.
• Rate.
• NE Id Label
• Network Element.
• EVC Id
• EVC User Label.
• Role (Root, Leaf, Both).
• Usage State.
• Type
• Service Id Label
• Ethernet Service
• VLAN Id
• VLAN Type.
• VLAN Protocol Type
• VLAN Bundle
• Policy Mode
• Traffic Descriptor
• Color Profile
• VLAN Pop
• Class Of Service
• VLAN Id
• Green Priority
• Yellow Priority

....................................................................................................................................................................................................................................
1350 OMS 19-87
8DG42227DAAA 9.6
Issue 3 December 2012
Bridge Network Management Overview about Workflow
Workflow for Bridge Management
....................................................................................................................................................................................................................................

Workflow for Bridge Management

Overview about Workflow


Description
The workflow to manage bridge is part of the more general workflow for the Ethernet
Service management.
For information about bridge network, see: “Bridge Network Management” (p. 19-4).
Spanning Tree Protocol is a control protocol running inside a Bridge Network able to
build tree based Active Topologies. The following Spanning Tree Protocols are available:
STP, RSTP, PVSTP, MISTP.
For information about Spanning Tree, see: “Spanning Tree Instance Management”
(p. 19-8).

Domain definition
A Domain is a distributed infrastructure made of NE, ENE, Transport Links and Edge
Ports managed together to supply a Connection Less infrastructure. Its main properties
are the bridge type (MAC, Virtual or Provider) and the STP type (STP, RSTP, PVSTP,
MSTP or none). For Connection Oriented infrastructures, a default domain encompassing
all such entities is considered existing by definition.
There can be two ways of defining a domain:
• Define a unique domain that includes all the NE and ENE that supplies the same
service or.
• Define more domains that includes NE and ENE that supplies the same service, but
are subdivided for example by customer.
The ETS domain is the default domain and is equal to the MAC domain.
The Domain List window presents all the domains and their attributes.
The domain ETS is created by defaults and cannot be deleted.

Domain configuration
The Provider Bridge operation Mode allows to define the global QoS policy to be applied
to all Ethernet Ports of a given Provider Bridge. Such value is mirrored on all Ports when
each Port has configured the PCP Port Table Profile with its default value (that is, 0).
The Provider Bridge Operation Mode can be configured on NE basis.
The new attribute Provider Bridge Operation Mode (5P3D, 8P0D, 7P1D, 6P2D,
CustomerDefined) is added to the Domain.

....................................................................................................................................................................................................................................
19-88 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Bridge Network Management Overview about Workflow
Workflow for Bridge Management
....................................................................................................................................................................................................................................
The value is derived from the corresponding value set at NE level, from all NEs contained
in the Provider Bridge Domain. In particular, if all NEs have a homogeneous
configuration of Provider Bridge Operation Mode, then the Domain reflects a real value,
in all other cases, the value for the domain is set to "None".
The Attribute can be configured at any time, this implying the automatic provisioning of
the chosen value on all NEs contained in the Provider Bridge Domain. This operation
forces all the ETB ports present in each Provider Bridge to be reset at the same Bridge
NE PbOperationMode value and must be made paying attention.
This attribute is meaningful only in case of Domain configured as Provider Bridge.
The management performed at Domain level, ensures that all NEs contained inside the
Provider Bridge domain really use the same QoS management. In fact, when all NEs are
defined to use the same Priority Code Point All incoming Ethernet frames are interpreted
in the same way: a defined meaning is assigned to each received sequence of Priority bits
and such meaning/behavior is made common to a whole domain.

NE configuration
The Provider Bridge operation Mode allows to define the global QoS policy to be applied
to all Ethernet Ports of a given Provider Bridge. Such value is mirrored on all Ports when
each Port has configured the PCP (priority code point) Port Table Profile with its default
value (that is, 0).
The Provider Bridge Operation Mode can be configured on NE basis.
The configuration of the Provider Bridge Operation Mode on a Network Element is
possible as described in the procedure“Configure a Network Element” (p. 19-98).

....................................................................................................................................................................................................................................
1350 OMS 19-89
8DG42227DAAA 9.6
Issue 3 December 2012
Bridge Network Management Create a Domain
Workflow for Bridge Management
....................................................................................................................................................................................................................................

Create a Domain
When to use
This function allows the operator to define a domain in the managed network.

Related Information
For information, see: “Overview about Workflow ” (p. 19-88).

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Conditions
To get a positive result:
• The maximum number of domains must not be reached.
• The User Label must be not in use by another domain.

Task
From the MS-GUI Main view:
...................................................................................................................................................................................................

1 Follow the path Action > Packet > Construction > Create Domain.
...................................................................................................................................................................................................

2 On the Create Domain Window.


To create a domain:
• Enter a User Label.
• Enter a Bridge Type (None, MAC, Virtual, Provider, Not Meaningful, No Bridge).
• Enter an STP Type (None, MSTP, PVSTP, RSTP, STP, Disabled).
• Enter a Comment (optional).
...................................................................................................................................................................................................

3 Click Ok.
Result: The domain is created.
The Domain list is updated.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
19-90 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Bridge Network Management Add NE to a Domain
Workflow for Bridge Management
....................................................................................................................................................................................................................................

Add NE to a Domain
When to use
The user adds a NE to a domain to manage the NE in that domain.

Related Information
For information, see: “Overview about Workflow ” (p. 19-88).

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.

Task
From the MS-GUI Main view:
...................................................................................................................................................................................................

1 Follow the path Search > Packet > Construction > Network Elements > Defined NEs.
...................................................................................................................................................................................................

2 Select the NE in the list.


...................................................................................................................................................................................................

3 Follow the path Action > Network Element > Assign Network Element to Domain.

....................................................................................................................................................................................................................................
1350 OMS 19-91
8DG42227DAAA 9.6
Issue 3 December 2012
Bridge Network Management Add NE to a Domain
Workflow for Bridge Management
....................................................................................................................................................................................................................................
Result: The assign window is displayed.

...................................................................................................................................................................................................

4 Click the Bridge Domain field.

....................................................................................................................................................................................................................................
19-92 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Bridge Network Management Add NE to a Domain
Workflow for Bridge Management
....................................................................................................................................................................................................................................
Result: The list of available bridge domain is displayed.

...................................................................................................................................................................................................

5 Select the desired domain and Click the check sign to confirm it.
...................................................................................................................................................................................................

6 Click Ok.
Result: The NE is assigned to the Domain previously created. This operation is
repeated for all the NEs that must be assigned to a domain. The domain must be the
same or a different domain as explained in previous paragraph.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS 19-93
8DG42227DAAA 9.6
Issue 3 December 2012
Bridge Network Management Domain Configuration
Workflow for Bridge Management
....................................................................................................................................................................................................................................

Domain Configuration
When to use
This function allows the configuration of the Provider Bridge Operation mode of a
provider domain.

Related Information
For information, see: “Domain configuration” (p. 19-88).
For information, see: “Overview about Workflow ” (p. 19-88).

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.

Task
From the MS-GUI Main view:
...................................................................................................................................................................................................

1 Follow the path Search > Packet > Services > Connection Less (Bridge) > Bridge
Domains.
...................................................................................................................................................................................................

2 Select the Domain in the list.


...................................................................................................................................................................................................

3 Follow the path Action > Domain > Configure Domain.

....................................................................................................................................................................................................................................
19-94 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Bridge Network Management Domain Configuration
Workflow for Bridge Management
....................................................................................................................................................................................................................................
Result: The configuration window is displayed.

Figure 19-15 Provider Domain Configuration window

...................................................................................................................................................................................................

4 Select the Provider Bridge Operation Mode from the list.


...................................................................................................................................................................................................

5 If the Operation mode must be propagated to NEs belonging to the domain, select true;
otherwise, select false.
...................................................................................................................................................................................................

6 Click Ok.
Result: The Domain is configured consequently.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS 19-95
8DG42227DAAA 9.6
Issue 3 December 2012
Bridge Network Management Domain Modification
Workflow for Bridge Management
....................................................................................................................................................................................................................................

Domain Modification
When to use
This function modifies the VLAN Type for the domain.

Related Information
For information, see: “Overview about Workflow ” (p. 19-88).

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.

Task
From the MS-GUI Main view:
...................................................................................................................................................................................................

1 Follow the path Search > Packet > Services > Connection Less (Bridge) > Bridge
Domains.
...................................................................................................................................................................................................

2 Select the Domain in the list.


...................................................................................................................................................................................................

3 Follow the path Action > Modify.

....................................................................................................................................................................................................................................
19-96 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Bridge Network Management Domain Modification
Workflow for Bridge Management
....................................................................................................................................................................................................................................
Result: The modification window is displayed.

Figure 19-16 Domain Modification window

...................................................................................................................................................................................................

4 If the Set Standard VLAN Type (8100) is set to False, select the VLAN TYPE from the list
of defined VLAN Types.
...................................................................................................................................................................................................

5 If the Set Standard VLAN Type (8100) is set to True, the VLAN TYPE is already set.
...................................................................................................................................................................................................

6 Click Ok.
Result: The Domain is modified consequently.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS 19-97
8DG42227DAAA 9.6
Issue 3 December 2012
Bridge Network Management Configure a Network Element
Workflow for Bridge Management
....................................................................................................................................................................................................................................

Configure a Network Element


When to use
Configure the Provider Bridge Operation Mode on NE basis.

Related Information
For information, see: “Overview about Workflow ” (p. 19-88).

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.

Task
From the MS-GUI Main view:
...................................................................................................................................................................................................

1 Follow the path Search > Packet > Services > Connection Less (Bridge) > Bridge NEs.
...................................................................................................................................................................................................

2 Select the Network Element in the list.


...................................................................................................................................................................................................

3 Follow the path Action > Network Element > Configure.

....................................................................................................................................................................................................................................
19-98 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Bridge Network Management Configure a Network Element
Workflow for Bridge Management
....................................................................................................................................................................................................................................
Result: The configuration window is displayed.

Figure 19-17 Network Element Configure window

...................................................................................................................................................................................................

4 To configure a Network Element:


• Choose the Provider Bridge Operation Mode (As Container, 5P3D, 8P0D).
• If the operation mode must be propagated to the edge ports associated to NE, choose
True for Propagate to Edge Ports parameter; in any other case, choose False.
...................................................................................................................................................................................................

5 Click Ok.
Result: The Network Element is configured consequently.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS 19-99
8DG42227DAAA 9.6
Issue 3 December 2012
Bridge Network Management Link Over TDM configuration
Workflow for Bridge Management
....................................................................................................................................................................................................................................

Link Over TDM configuration


When to use
Configure the Link Over TDM.

Related Information
For information, see: “Overview about Workflow ” (p. 19-88).
For Link Over TDM, see: “Managing Links Over TDM” (p. 14-17).

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.

Task
From the MS-GUI Main view:
...................................................................................................................................................................................................

1 Follow the path Search > Packet > Construction > Link Over TDM.
...................................................................................................................................................................................................

2 Select the Link Over TDM in the list.


...................................................................................................................................................................................................

3 Follow the path Action > Link Over TDM > Configure.

....................................................................................................................................................................................................................................
19-100 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Bridge Network Management Link Over TDM configuration
Workflow for Bridge Management
....................................................................................................................................................................................................................................
Result: The configuration window is displayed.

Figure 19-18 Client Type Selection

...................................................................................................................................................................................................

4 Select the Client Type ETB in the Configuration window.


...................................................................................................................................................................................................

5 Click Ok.
Result: The Link Over TDM is configured consequently.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS 19-101
8DG42227DAAA 9.6
Issue 3 December 2012
Bridge Network Management NE Ethernet Physical Port Configuration
Workflow for Bridge Management
....................................................................................................................................................................................................................................

NE Ethernet Physical Port Configuration


When to use
The NE Ethernet physical ports (local ports) are configured as ETS-P in a provider bridge
configuration.

Related Information
For information, see: “Overview about Workflow ” (p. 19-88).

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.

Task
From the MS-GUI Main view:
...................................................................................................................................................................................................

1 Follow the path Search > Packet > Construction > Network Elements > Defined NEs.
...................................................................................................................................................................................................

2 Select the Network Element in the list.


...................................................................................................................................................................................................

3 Follow the path Search > Inventory from Network Element > Ethernet Physical Port
List.
Result: The Ethernet Physical port list window is displayed.

Figure 19-19 Ethernet Physical Port

....................................................................................................................................................................................................................................
19-102 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Bridge Network Management NE Ethernet Physical Port Configuration
Workflow for Bridge Management
....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

4 The Ethernet Physical Port list of the selected Network Element is displayed, select the
port to configure and from the popup menu the item Configure.
Result: The configuration window is displayed.

Figure 19-20 Ethernet Physical Port Configuration window

...................................................................................................................................................................................................

5 Select the Client Type ETS-P and confirm with OK Button.


Result: The Ethernet Physical Port is configured consequently.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS 19-103
8DG42227DAAA 9.6
Issue 3 December 2012
Bridge Network Management Create a Customer
Workflow for Bridge Management
....................................................................................................................................................................................................................................

Create a Customer
When to use
This function allows the user to define the characteristics of the owner (=customer) of one
or more NE(s) to allow the usage of services defined across the boundaries of the
managed network.

Related Information
The first step to perform in EOT User Interface is the Customer creation to be able to
create the desired Ethernet Service.
For information, see: “Overview about Workflow ” (p. 19-88).

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Conditions
To get a positive result:
• The maximum number of customers must not be reached.
• The User Label must be not in use by another customer.

Task
From the MS-GUI Main view:
...................................................................................................................................................................................................

1 Follow the path Action > Packet > Services > Create Customer.

....................................................................................................................................................................................................................................
19-104 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Bridge Network Management Create a Customer
Workflow for Bridge Management
....................................................................................................................................................................................................................................
Result: The customer creation window opens.

Figure 19-21 Customer Creation window

...................................................................................................................................................................................................

2 On the Create Customer Window insert the required data.

....................................................................................................................................................................................................................................
1350 OMS 19-105
8DG42227DAAA 9.6
Issue 3 December 2012
Bridge Network Management Create a Customer
Workflow for Bridge Management
....................................................................................................................................................................................................................................
To create a customer:
• Enter a User Label.
• Enter a Company (optional).
• Enter an Address (optional).
• Enter a Comment (optional).
...................................................................................................................................................................................................

3 Click Ok.
Result: The customer is created.
The tree area and the Customer list are updated.
The user can define services related to this customer.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
19-106 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Bridge Network Management Create an Ethernet Service
Workflow for Bridge Management
....................................................................................................................................................................................................................................

Create an Ethernet Service


When to use
This function allows creating an Ethernet Service (related to a selected customer).

Related Information
If this list is required from the Customer List, the Customer field of this creation window
is automatically filled with the customer value selected in the Customer List.
For general information, see: “Overview about Workflow ” (p. 19-88).

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Conditions
To get a positive result:
• Before the action, define one customer at least.
• The User Label must be not in use by another service.

Task
From the MS-GUI Main view:
...................................................................................................................................................................................................

1 Follow the path Action > Packet > Services > Create Ethernet Service.
...................................................................................................................................................................................................

2 On the Create Service Window.


Execute the following steps:
• Enter a Service User label.
• Select the Customer from the available customer list, which opens when you enter the
Customer field.
• Select the Service Type Extended EVPL.
• No other data are required.
• Click Ok.
...................................................................................................................................................................................................

3 Click Ok.
Result: The service is created.
A correlation with the selected customer is created.
....................................................................................................................................................................................................................................
1350 OMS 19-107
8DG42227DAAA 9.6
Issue 3 December 2012
Bridge Network Management Create an Ethernet Service
Workflow for Bridge Management
....................................................................................................................................................................................................................................
Then, the tree area and the Ethernet Service List are updated.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
19-108 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Bridge Network Management Traffic Descriptor Definition
Workflow for Bridge Management
....................................................................................................................................................................................................................................

Traffic Descriptor Definition


When to use
Creation of the Traffic Descriptor.

Related Information
For information, see: “Overview about Workflow ” (p. 19-88).

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.

Task
From the MS-GUI Main view:
...................................................................................................................................................................................................

1 Follow the path Action > Packet > Services > Create Traffic Descriptor.
Result: The creation window is displayed.
...................................................................................................................................................................................................

2 On the Create Traffic Descriptor Window.


To create a Traffic Descriptor:
• Enter a User Label.
• Select the Class of Service (Best Effort, Guaranteed, Regulated, Regulated1,
Regulated3, Regulated4, Guaranteed2, Background).
• Enter a CIR value (set automatically to '0' if the selected Class of Service is 'Best
Effort').
• Enter a PIR value.
• Enter a CBS value (set automatically to '0' if the selected Class of Service is 'Best
Effort').
• Enter a PBS value (if the selected Class of Service is 'Guaranteed', PBS value is
automatically set to CBS value - but could be modified).
...................................................................................................................................................................................................

3 Click Ok.
Result: The Traffic Descriptor is created.
A correlation with the selected customer is created.

....................................................................................................................................................................................................................................
1350 OMS 19-109
8DG42227DAAA 9.6
Issue 3 December 2012
Bridge Network Management Traffic Descriptor Definition
Workflow for Bridge Management
....................................................................................................................................................................................................................................
Then, the tree area and the Ethernet Service List are updated.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
19-110 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Bridge Network Management EVC Allocation and Implementation
Workflow for Bridge Management
....................................................................................................................................................................................................................................

EVC Allocation and Implementation


When to use
To complete the Provider Bridge Workflow: create a Connection Less EVC, allocate, and
implement it.

Related Information
For information, see: “Overview about Workflow ” (p. 19-88).

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.

Task
From the MS-GUI Main view:
...................................................................................................................................................................................................

1 Follow the menu path Search > Packet > Services > Connection Less (Bridge) > Bridge
EVCs.
Result: The Bridge EVC list window is displayed.
...................................................................................................................................................................................................

2 Select the EVC in the list and follow the path Action > Bridge EVC > Allocate.
Result: The allocation window is displayed.
...................................................................................................................................................................................................

3 Click Ok.
Result: The EVC is allocated.
The Provisioning State is changed to Allocated.
...................................................................................................................................................................................................

4 Select again the EVC in the list and follow the path Action > Bridge EVC > Implement.
Result: The implementation window is displayed.
...................................................................................................................................................................................................

5 Click Ok.
Result: The EVC is implemented.
The Provisioning State is changed to Implemented.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS 19-111
8DG42227DAAA 9.6
Issue 3 December 2012
Bridge Network Management Dynamic change capability

....................................................................................................................................................................................................................................

EVC Bandwidth Management

Dynamic change capability


Object applicability
The possibility to change dynamically the bandwidth assigned to an active (that is,
implemented) Ethernet connectivity is one of the most important capabilities in the scope
of Data Network Management.
The dynamic change (increment/decrement) of bandwidth is possible for:
• Connection Oriented EVC:
for Connection Oriented Networks, in the following cases:
– The EVC is multicast, the traffic is broadcasted from one source UNI to leaves
UNI.
– All contained Ethernet Segment are balanced that is, have the same bandwidth
parameters definitions.
– All contained Ethernet Segment are not balanced that is, have different bandwidth
parameters definitions; new parameters can cause the increment for one or more
Ethernet Segment and the reduction for others.
• Connection Less EVC:
for Networks based on Provider Bridge, in the following cases:
– All EVC Terminations are balanced that is, have the same bandwidth parameters
definitions.
– All EVC Terminations are not balanced that is, have different bandwidth
parameters definitions; in this case it is possible that new parameters cause the
bandwidth increment for some EVC termination and the reduction for some other.
• Ethernet Segments for Connection Oriented Networks, when the bandwidth of a
single specific flow is changed.
• EVC Terminations for Connection Less Networks, Provider Bridge based when the
bandwidth of a specific EVC termination is changed.
• LSP Tunnel for MPLS networks, when the LSP Tunnel bandwidth is changed.
• VC-LSP for MPLS networks, when the VC-LSP bandwidth is changed.

....................................................................................................................................................................................................................................
19-112 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Bridge Network Management Function Description
EVC Bandwidth Management
....................................................................................................................................................................................................................................

Function Description
Object status applicability
The applicability of the Bandwidth management is restricted to the following cases:
• Implemented and allocated EVC (Connection Oriented Networks) which
automatically affects all contained Ethernet Segments.
• Implemented and allocated EVC (Connection Less Networks) which automatically
affects all contained EVC Terminations.
• Implemented and allocated Ethernet Segments (Connection Oriented Networks).
• EVC Terminations of Implemented and allocated EVCs (Connection Less Networks,
Provider Bridge based).
• Implemented and Allocated LSP Tunnels.
• Implemented and Allocated VC-LSPs.
The Bandwidth management can also be requested on Allocated resources.

Implemented Object applicability


Consider the following cases:
• “EVC Connection Oriented Based (Implemented)” (p. 19-113).
• “EVC Connection Oriented Based (Allocated)” (p. 19-114).
• “EVC Connection Less Based (Implemented or Allocated)” (p. 19-114).
• “Ethernet Segments (Implemented)” (p. 19-115).
• “Ethernet Segments (Allocated)” (p. 19-116).

EVC Connection Oriented Based (Implemented)


When all contained Ethernet Segments are implemented, acting at EVC level significantly
simplifies the effort for the user that is requested to provide only once the new bandwidth
parameters, either to enlarge or to reduce current values.
Acting at EVC level, the bandwidth change is propagated to all contained Ethernet
Segments; in particular:
• The EVC must be implemented, all Ethernet Segments must be implemented.
• The bandwidth change is applied on each Ethernet Segment.
• When the bandwidth change is successfully propagated to all Ethernet Segments, the
EVC continue to be Implemented.
• The new Class of Service must be compliant with the one in use by contained
Ethernet Segments (in particular, if the EVC is realized by non homogeneous Class
Of Services, then to avoid errors, the user must proceed on Ethernet Segment basis).

....................................................................................................................................................................................................................................
1350 OMS 19-113
8DG42227DAAA 9.6
Issue 3 December 2012
Bridge Network Management Function Description
EVC Bandwidth Management
....................................................................................................................................................................................................................................
• In case of errors, the procedure is immediately stopped and one of the following
situation are identified:
– the EVC provisioning state is put in partially Implemented: this case occurs when
at least one Ethernet Segment become partially Implemented because of
unrecoverable errors during provisioning.
– The EVC provisioning state remain as implemented: this case occurs when an
Ethernet Segment has no room to allocate new bandwidth parameters. In this case
the Ethernet Segment remain implemented with old bandwidth parameters.

EVC Connection Oriented Based (Allocated)


When all contained Ethernet Segments are Allocated, acting at EVC level significantly
simplifies the effort for the user that is requested to provide only once the new bandwidth
parameters, either to enlarge or to reduce current values.
Acting at EVC level, the bandwidth change is propagated to all contained Ethernet
Segments; in particular:
• The EVC must be Allocated (this implying that all Ethernet Segments are allocated).
• The bandwidth change is applied on each Ethernet Segment.

EVC Connection Less Based (Implemented or Allocated)


Acting at EVC level significantly simplifies the effort for the user that is requested to
provide only once the new bandwidth parameters, either to enlarge or to reduce current
values.
Acting at EVC level, the bandwidth change is propagated to all contained EVC
Terminations; in particular:
• Care must be taken about the new Class of Service that must be compliant with the
one in use by contained EVC Terminations. If the EVC is realized by non
homogeneous Class Of Services, then to avoid errors, the user must proceed on EVC
Termination basis.
• The EVC can be implemented, if all EVC Terminations are activated, or allocated, if
the bandwidth change for EVC Terminations is accomplished only inside 1350 OMS
PKT database.
• The bandwidth change is applied on each contained EVC Termination.
• In case of errors, the procedure is immediately stopped. The EVC provisioning state
remain with the previous provisioning state. The following situation is identified:
– if provisioning state was implemented, it remains implemented. This case occurs
when the provisioning for an EVC termination fails (that is the EVC termination
remain active with old bandwidth parameters).
In this case the EVC become made by “non homogeneous” (in terms of
bandwidth) EVC Termination.
– if provisioning state was allocated, it remains allocated. The EVC become made
with non homogeneous EVC terminations Bandwidth characteristics.

....................................................................................................................................................................................................................................
19-114 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Bridge Network Management Function Description
EVC Bandwidth Management
....................................................................................................................................................................................................................................
Ethernet Segments (Implemented)
This case covers Implemented Ethernet Segments on Connection Oriented Networks;
• The bandwidth change is only admitted in the scope of the same QoS (for example:
change from BE to Guaranteed is not allowed as well as other mixed possibilities).
• The bandwidth change is performed through the Ethernet Segment modification: the
parameter modified is the Traffic Descriptor reference, so allowing the Ethernet
Segment to point toward another TD.
• The bandwidth change is allowed, without restrictions, on all Transport Links types
(that is Link Over TDM, Link Over Cable and Link Over MPLS).
• In case of increment, an internal check is performed along the Ethernet Segment
following the current routing verifying that enough bandwidth is available. In
particular:
– In case of positive check,.
- The Ethernet Segments starts pointing to another TD that reflects the new
bandwidth parameters.
- The values of used/available bandwidth values must be updated on used
Transport Links and Edge Ports if an increment on Guaranteed parameter is
required.
- The behavior for bandwidth increment is performed on the Network, starting
from last NE and proceeding in reverse way along the Ethernet Segment routing.
- In case of error during provisioning operation, the global operation is stopped
and the Provisioning state is set to partially implemented.
– In case of Negative check:
The operation is stopped, a specific error message is displayed indicating the error
reason. The Provisioning state remains set to implemented.
• In case of reduction, no internal checks are needed and the operation is accepted; In
particular:
– The Ethernet Segments starts pointing to another Traffic Descriptor, that reflects
the new bandwidth parameters.
– If a reduction on Guaranteed parameter is required, the values of used/available
bandwidth values are updated on used Transport Links and Edge Ports.
– The behavior for bandwidth reduction is performed on the Network, starting from
first NE and proceeding in forward way along the Ethernet Segment routing.
– In case of error during provisioning operation, the global operation is stopped and
the Provisioning state is set to partially implemented.

....................................................................................................................................................................................................................................
1350 OMS 19-115
8DG42227DAAA 9.6
Issue 3 December 2012
Bridge Network Management Function Description
EVC Bandwidth Management
....................................................................................................................................................................................................................................
Ethernet Segments (Allocated)
The bandwidth change is:
• only admitted in the scope of the same QoS (for example: change from BE to
Guaranteed is not allowed as well as other mixed possibilities).
• performed through the Ethernet Segment modification: the parameter modified is the
Traffic Descriptor reference, so allowing the Ethernet Segment to point toward
another Traffic Descriptor.
• allowed, without restrictions, on all Transport Links types (that is Link Over TDM,
Link Over Cable and Link Over MPLS).
• In case of increment, an internal check is performed along the Ethernet Segment
following the current routing, verifying that enough bandwidth is available. In
particular:
– In case of positive check,.
- The Ethernet Segments starts pointing to a Traffic Descriptor that reflects the
new bandwidth parameters.
- The values of used/available bandwidth values must be updated on used
Transport Links and Edge Ports if an increment on Guaranteed parameter is
required.
• In case of reduction, no internal checks are needed and the operation is accepted; In
particular:
– The Ethernet Segments starts pointing to a Traffic Descriptor that reflects the new
bandwidth parameters.
– The values of used/available bandwidth values must be updated on used Transport
Links and Edge Ports if a reduction on Guaranteed parameter is required.

EVC Terminations
The terminations are Activated EVC Terminations belonging to Implemented or Allocated
EVCs based on Connection Less Networks.
The same behavior is performed both for bandwidth increments and for bandwidth
reduction, no internal checks are needed and the operation is accepted; In particular:
• The EVC Termination starts pointing to another Traffic Descriptor that reflects the
new bandwidth parameters.
• Only in case of Implemented EVCs, a specific behavior is started to propagate the
modification toward NEs.
• The behavior for bandwidth change is performed on the Network, acting on the NE
containing the EVC Termination.
• On NEs, a specific Traffic Descriptor creation is needed if a reusable one compliant
with new bandwidth characteristics not exist.
• In case of error during provisioning operation, the global operation is stopped and the
Provisioning state of the EVC does not change.

....................................................................................................................................................................................................................................
19-116 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Bridge Network Management Vlan Push/Pop On Provider Bridge UNI/IWI Management
Service Delimiting
....................................................................................................................................................................................................................................

Service Delimiting

Vlan Push/Pop On Provider Bridge UNI/IWI Management


Definition
The Service Delimiting allows the finalization of Vlan Push/Pop operations also at EVCs
UNI/IWI based on Provider Bridge technology.
This function enhances EVC Termination characteristics definition. For this reason, all
the following consideration must be taken into account:
• For each EVC termination, the user can define, in addition to existing characteristics,
an optional POP operation to be performed on Ethernet Traffic in the Provider Bridge
Domain at ingress (that is, at UNI/IWI).
• For each EVC termination, the user can define, for traffic egress the Provider Bridge
domain (that is, at UNI/IWI):
Define in following way:
– One or more Cos.
– A PUSH operation for a given Cos.
• For each EVC termination, the user must define at least one Input Ethernet Flow or at
least one Output Ethernet Flow.
This operation allowing to cover all following cases:
– Definition of "Source" EVC Termination point in Broadcasting Topologies in case
that only Input Ethernet Flows are defined.
– Definition of "Sink" EVC Termination point in Broadcasting Topologies, in case
that only Output Ethernet Flows are defined.
– Definition of Bidirectional EVC Termination point in Point-to-point,
Rooted-MultiPoint, or MultiPoint-To-MultiPoint topologies. In case that both
Input Ethernet Flows and Output Ethernet Flows are defined, Termination point
can be either balanced or unbalanced. Balanced means having equal I/O
characteristics. Unbalanced means having Input characteristics different from
output characteristics. Characteristics are classification, bandwidth, Qos, and so
forth.

Operation and expected behavior


Operation and expected behavior in service delimiting are:
• EVC Definition (Provider Bridge).
At EVC definition, EVC Terminations can optionally be supplied. For each EVC
Termination, the user can define Input or Output Ethernet Flows characteristics.
If the created EVC is empty, then all EVC Termination characteristics definition is
delegated to the operation: “Add EVC Termination”.
• Add EVC Termination (Provider Bridge).

....................................................................................................................................................................................................................................
1350 OMS 19-117
8DG42227DAAA 9.6
Issue 3 December 2012
Bridge Network Management Vlan Push/Pop On Provider Bridge UNI/IWI Management
Service Delimiting
....................................................................................................................................................................................................................................
When the user wants to add a new EVC Termination to an existing EVC, for each
EVC Termination the user must define Input or Output Ethernet Flows characteristics.
• Get EVC Extremities (Provider Bridge).
For the selected EVC, this inventory must report the generic characteristics of all
EVC Terminations, Input Ethernet Flows, and Output Ethernet Flows included.
• Modify EVC Termination (Provider Bridge).
After having defined the characteristics of an EVC termination, the user can change
such characteristics for example adding or removing a POP or a PUSH.
• Get Properties - EVC Termination (Provider Bridge).
For the selected EVC Termination, this inventory must report the relevant
characteristics, Input and Output Characteristics included.

....................................................................................................................................................................................................................................
19-118 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Bridge Network Management Overview
Spanning Tree
....................................................................................................................................................................................................................................

Spanning Tree

Show the Spanning Tree Instance of EVC


When to use
This function shows Spanning Tree Instance of a Connection Less EVC.

Related Information
For information, see: “Spanning Tree Instance Management” (p. 19-8).

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Conditions
To get a positive result:
• The EVC provisioning state must be set to Defined.
• No operation is pending on the selected EVC.

Task
From the MS-GUI Main view:
...................................................................................................................................................................................................

1 Select the path Search > Packet > Services > Connection Less (Bridge) > Bridge EVCs.
Result: The EVC list is shown.
...................................................................................................................................................................................................

2 Select the Bridge EVC and select the path Search > Bridge EVC > Show Spanning Tree
Instance.
Result: The Spanning Tree Instance belonging to the selected EVC is shown.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS 19-119
8DG42227DAAA 9.6
Issue 3 December 2012
Bridge Network Management Show the Spanning Tree Instance
Spanning Tree
....................................................................................................................................................................................................................................

Show the Spanning Tree Instance


When to use
This function shows Spanning Tree Instances.

Related Information
For information about STI, see: “Spanning Tree Instance Management” (p. 19-8).

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.

Task
From the MS-GUI Main view:
...................................................................................................................................................................................................

1 Select the path Search > Packet > Services > Connection Less (Bridge).
Result: The Connection Less menu is shown.
...................................................................................................................................................................................................

2 Select Show Spanning Tree Instance.


Result: The Spanning Tree Instance belonging is shown.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
19-120 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Bridge Network Management Spanning Tree Instance configuration
Spanning Tree
....................................................................................................................................................................................................................................

Spanning Tree Instance configuration


When to use
This function configures a Spanning Tree Instance.

Related Information
For information, see: “Spanning Tree Instance Management” (p. 19-8).

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.

Task
From the MS-GUI Main view:
...................................................................................................................................................................................................

1 Follow the menu path Search > Packet > Services > Connection Less (Bridge) >
Spanning Tree Instance.
Result: The Spanning Tree Instance list window is displayed.
...................................................................................................................................................................................................

2 Select the Spanning Tree Instance in the list and follow the path Action > Spanning Tree
Instance > Configure.

....................................................................................................................................................................................................................................
1350 OMS 19-121
8DG42227DAAA 9.6
Issue 3 December 2012
Bridge Network Management Spanning Tree Instance configuration
Spanning Tree
....................................................................................................................................................................................................................................
Result: The Spanning Tree configuration window is displayed.

Figure 19-22 Spanning Tree Instance Configuration window

...................................................................................................................................................................................................

3 Select one of the options then click OK.


Result: The Spanning Tree Instance is configured.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
19-122 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Bridge Network Management Spanning Tree Instance Implementation
Spanning Tree
....................................................................................................................................................................................................................................

Spanning Tree Instance Implementation


When to use
This function Implement a Spanning Tree Instance.

Related Information
For information, see: “Spanning Tree Instance Management” (p. 19-8).

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.

Task
From the MS-GUI Main view:
...................................................................................................................................................................................................

1 Follow the menu path Search > Packet > Services > Connection Less (Bridge) >
Spanning Tree Instance.
Result: The Spanning Tree Instance list window is displayed.
...................................................................................................................................................................................................

2 Select the Spanning Tree Instance in the list and follow the path Action > Spanning Tree
Instance > Implement.
...................................................................................................................................................................................................

3 Select one of the options in the confirmation box. Refer to the procedure “Confirm the
action” (p. 11-40).
Result: If the command is confirmed, the Spanning Tree Instance is Implemented.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS 19-123
8DG42227DAAA 9.6
Issue 3 December 2012
Bridge Network Management Spanning Tree Instance Deimplementation
Spanning Tree
....................................................................................................................................................................................................................................

Spanning Tree Instance Deimplementation


When to use
This function Deimplement a Spanning Tree Instance .

Related Information
For information, see: “Spanning Tree Instance Management” (p. 19-8).

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.

Task
From the MS-GUI Main view:
...................................................................................................................................................................................................

1 Follow the menu path Search > Packet > Services > Connection Less (Bridge) >
Spanning Tree Instance .
Result: The Spanning Tree Instance list window is displayed.
...................................................................................................................................................................................................

2 Select the Spanning Tree Instance in the list and follow the path Action > Spanning Tree
Instance > Deimplement.
...................................................................................................................................................................................................

3 Select one of the options in the confirmation box. Refer to the procedure “Confirm the
action” (p. 11-40).
Result: If the command is confirmed, the Spanning Tree Instance is Deimplemented.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
19-124 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
20 20
Provider Backbone Bridge
Network Management

Overview
Purpose
This chapter describes how to set up a Provider Backbone Bridge (PBB) network.

Contents

Provider Backbone Bridge (PBB) Networks 20-5


Provider Backbone Bridge Management 20-5
PBB EVC provisioning 20-8
Ethernet Ring Protocol (ERP) 20-10
Network Configuration 20-11
Network Configuration 20-11
PBB Domain Create 20-12
Define NE 20-14
Provisioning 20-17
Provisioning hardware reference 20-17
Transport link 20-20
Create Ethernet Physical Connection 20-21
Assign Link over Cable to PBB domain 20-24
ERP configuration 20-30
Create ERP Ring 20-30
Create an ERP Instance 20-38
Backbone VLAN ID 20-46
B-VID configuration 20-46
EVC-EVPLAN Service in PBB/ERP 20-52
Additional Info on PBB/ERP Service 20-52
PBB EVC Termination Management 20-56

...................................................................................................................................................................................................................................
1350 OMS 20-1
8DG42227DAAA 9.6
Issue 3 December 2012
Provider Backbone Bridge Network Management Overview

....................................................................................................................................................................................................................................

Add PBB EVC Termination 20-56


Remove PBB EVC Termination 20-59
Provider Backbone Bridge EVC Management 20-60
View the PBB EVC list 20-61
Description of the list of PBB EVCs 20-62
Create PBB EVC 20-63
Allocate PBB EVC 20-65
Deallocate PBB EVC 20-67
Implement PBB EVC 20-68
Deimplement PBB EVC 20-70
Add Termination on implemented PBB EVC 20-71
Remove Termination on implemented EVC 20-72
Configure PBB EVC 20-73
Bridge Flows of PBB EVC 20-74
PBB EVC Broadcast Domain Containment 20-76
Enable Broadcast Domain Containment 20-77
Disable Broadcast Domain Containment 20-78
Automatic association UNI port - default VT 20-79
Manual association UNI port - user VT 20-80
Configuration of the DEI bit 20-81
B-VID Management 20-82
View the B-VID list 20-83
Create PBB B-VID 20-84
Delete PBB B-VID 20-86
Allocate PBB B-VID 20-87
Deallocate PBB B-VID 20-88
Implement PBB B-VID 20-89
Deimplement PBB B-VID 20-91
Domain Wide VID distribution 20-93
Ring Association to a B-VID 20-95
Ring Dissociation from B-VID 20-97
Change ERP of a B-VID 20-99
List ERP instances of a B-VID 20-101
Association of Transport Link to B-VID 20-102
Dissociation of Transport Link to B-VID 20-104

....................................................................................................................................................................................................................................
20-2 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Provider Backbone Bridge Network Management Overview

....................................................................................................................................................................................................................................

Ethernet Ring Protection (ERP) Management 20-107


View the ERP ring list 20-108
Description of the list of ERP 20-109
Create/delete ERP Ring 20-110
Implement/deimplement the ERP 20-112
ERP Switch Command 20-113
ERP Switch Command From Port 20-114
Add/remove Transport Link in a Ring 20-115
Add/remove Node in a Ring 20-116
Create/delete ERP Ring bundle 20-117
Add/remove ERP Ring in a bundle 20-118
ERP Instance Management 20-120
View the ERP instance list 20-121
Description of the list of ERP instances 20-122
Create/delete ERP instance 20-123
Implement/deimplement the ERP instance 20-125
Associate OAM to the ERP instance 20-126
Get a graphical view of the ERP instance 20-127
Modify Defined ERP instance 20-129
Modify implemented ERP instance 20-131
PBB Fault Management 20-133
PBB Fault Localization and navigation to AS 20-134
Workflow for PBB Management 20-135
Overview about Workflow 20-135
Create a PBB Domain 20-137
Add NE to a Domain 20-138
Add Transport Link to a Domain 20-139
ERP provisioning 20-141
Configure B-VID 20-143
Create a PBB EVC 20-144
PBB EVC traffic classification 20-153
Traffic Descriptor Definition 20-154
EVC Allocation and Implementation 20-155
In Band Management 20-156
Address Configuration of the Network Elements 20-157

....................................................................................................................................................................................................................................
1350 OMS 20-3
8DG42227DAAA 9.6
Issue 3 December 2012
Provider Backbone Bridge Network Management Overview

....................................................................................................................................................................................................................................

Lag Port Creation (Via Zic) 20-165


NMS Start Supervision (NE Not Defined On NMS) 20-183

....................................................................................................................................................................................................................................
20-4 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Provider Backbone Bridge Network Management Provider Backbone Bridge Management
Provider Backbone Bridge (PBB) Networks
....................................................................................................................................................................................................................................

Provider Backbone Bridge (PBB) Networks

Provider Backbone Bridge Management


PBB description
Provider Backbone Bridges (PBB) is a networking standard approved by IEEE as 802.1ah
standard.
Provider Backbone Bridges is a set of architecture and protocols for routing of a customer
network over a provider's network
Provider Backbone Bridges allows interconnection of multiple Provider Bridge Networks
without losing each customer's individually defined VLANs.
Provider Backbone Bridges offers a complete separation of customer and provider
domains.

Objectives of Provider Backbone Bridging


PBB is designed to address limitations of Provider Bridge:
• VID-space scalability. A 24-bit field is added to each frame to contain an enlarged
space for customer service identification. 16 M services.
• FDB-size scalability. The MAC addresses of all customer equipment that passes
through a core node must be learned and/or looked-up in the FDB. If FDB is “full”,
addresses cannot be learned, so return traffic is flooded and not unicasted: Bandwidth
inefficiency. A ‘backbone’ MAC destination and source address pair is added to each
frame for forwarding between PBB Nodes. This header “hides” the Customer
Destination Address and Customer Source Address fields.

PBB frames
The PBB header may take multiple different forms, but the main components of the
header are:
• Backbone component:
– Backbone destination address (B-DA) (six bytes).
– Backbone source address (B-SA) (six bytes).
– EtherType 0x88A8 (two bytes).
– B-TAG/B-VID (two bytes), this is the backbone VLAN indicator.
• Service encapsulation:
– EtherType 0x88E7 (two bytes).
– Flags that contain priority, DEI and indication, if there are no customer addresses
present (e.g. OAM frames).
– I-SID, the service identifier (three bytes).

....................................................................................................................................................................................................................................
1350 OMS 20-5
8DG42227DAAA 9.6
Issue 3 December 2012
Provider Backbone Bridge Network Management Provider Backbone Bridge Management
Provider Backbone Bridge (PBB) Networks
....................................................................................................................................................................................................................................
• Original customer frame:
– Customer source address (six bytes).
– Customer destination address (six bytes).
– EtherType 0x8100 (two bytes).
– Customer VLAN identifier (two bytes).
– EtherType (e.g. 0x0800).
– Customer payload.
Bridges learn based on the B-SA and ingress port value and hence is completely unaware
of the customer MAC addresses. I-SID allows to distinguish the services within a PBB
domain.

PBB Services Types


A service is identified by a Backbone Service Instance Identifier (I-SID).
The Service Type is determined by the mapping of Customer Network Port traffic to a
particular I-SID. Service Types (IEEE 802.1ah):
• Port based: All untagged and priority tagged frames ↔I-SID. This service type can be
used to connect 802.1Q or 802.1D bridges to a CNP. All S-Tagged frames are
dropped.
• S-tagged one-to-one: Frames with a single specific S-VID ↔I-SID.
• S-tagged bundled many-to-one: Frames with an S-VID in a specific set of N values
↔I-SID.
• S-tagged bundled all-to-one: Frames with any non-zero S-VID ↔I-SIDcomplement
of “Port Based” service.
Note: 1350 OMS implementation of some service types is less rigid. For example
“Port-based” does not necessarily discard all S-tagged frames.

PBB Services Multiplexing


The frames are split in more than one “service”, each mapped to its own I-SID.
Service Types that are incompatible with Service Multiplexing:
• Port Based Service
• S-Tagged Service –All-to-One
Service Types that can be used with Service Multiplexing
• S-Tagged Service –1:1.
• S-Tagged Service –N:1
Note: A given S-VID can map to only a single I-SID.
Mapping single S-VID to multiple I-SIDs is not allowed:
• Can create an unintentional loop in the PBB network.
• Loop cannot be guarded by xSTP: PIP-CBP barrier for STPDUs

....................................................................................................................................................................................................................................
20-6 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Provider Backbone Bridge Network Management Provider Backbone Bridge Management
Provider Backbone Bridge (PBB) Networks
....................................................................................................................................................................................................................................
PBB Ethernet Virtual Connection
MEF defines Ethernet Virtual Connection (EVC) services:
• EVC: Transparent connection service between a set of UNIs
• In a PBB context the UNI is a CNP port
The EVCs have been classified in three Service Types:
• E-Line: Point-to-point EVC. Connects 2 UNIs bi-directionally.
• E-LAN: Multipoint EVC. Connects more than 2 UNIs bi-directionally.
• E-Tree: Rooted-multipoint EVC. Connects at least one “Root” UNI and at least two
“Leaf” UNIs bi-directionally, but blocking direct traffic between “Leaf” UNIs
The following Service Types are supported:
• E-Line: Any Port-based or S-tagged service can be supported over E-LINE.
• E-LAN: Any Port-based or S-tagged service can be supported over E-LAN.
• E-Tree: Not supported within PBB: Requires non-standard additions to PBB toolset.
E-TREE service requires that traffic between ‘Leaves’ is blocked.
• Service Multiplexing: E-LINE and E-LAN services can be multiplexed on same CNP
port. Restriction: S-VID to I-SID mapping constraints.

....................................................................................................................................................................................................................................
1350 OMS 20-7
8DG42227DAAA 9.6
Issue 3 December 2012
Provider Backbone Bridge Network Management PBB EVC provisioning
Provider Backbone Bridge (PBB) Networks
....................................................................................................................................................................................................................................

PBB EVC provisioning


PBB EVC provisioning description

Figure 20-1 PBB EVC provisioning

....................................................................................................................................................................................................................................
20-8 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Provider Backbone Bridge Network Management PBB EVC provisioning
Provider Backbone Bridge (PBB) Networks
....................................................................................................................................................................................................................................
The figure shows that the only provisioning needed to implement an EVC over PBB is
the one done at its EVC Terminations (both the one directly related to the EVC
Termination itself and the one related to the association of the I-SID to the B-VID that is
perfomed on the NNIs of the B-VID in the same NE of the EVC Termination).
“Ethernet Ring Protocol (ERP)” (p. 20-10)
To implement an EVC over PBB, the system only perform provisioning on the NEs that
host EVC Terminations for that EVC.
This is true only if the EVC is not under OAM.
If the EVC is under OAM, things are different.
In general, OAM is possible for the I-SID (to monitor the single EVC) and for the B-VID
(in order to monitor the virtual infrastructure common to more EVCs).
I-SID monitoring, as for the standard, only takes into account the points where the EVC is
provisioned. This means that internal points are not taken into consideration: link trace is
not so meaningful in that case.
The choice done for PKT is a bit different: we choose to monitor only the I-SID (so, no
B-VID monitoring) but, willing to see also the intermediate points in the network, we
provision the I-SID also wherever the B-VID is, so that a link trace, for example, will
report all the NEs crossed by the traffic.
The provisioning of an EVC under OAM requires the distribution of the I-SID to all the
places wherever the B-VID is distributed (for example: to all the NNIs in the network that
are in NEs that do not host any Termination of the monitored EVC). The distribution of
the I-SID is done in addition to any other I-SID distribution.

....................................................................................................................................................................................................................................
1350 OMS 20-9
8DG42227DAAA 9.6
Issue 3 December 2012
Provider Backbone Bridge Network Management Ethernet Ring Protocol (ERP)
Provider Backbone Bridge (PBB) Networks
....................................................................................................................................................................................................................................

Ethernet Ring Protocol (ERP)


ERP Objectives
Suitable to operate in the Ethernet transport plane, which implies Connectionless
forwarding Automatic address learning Ageing and flushing mechanisms
Ethernet Ring Protection (Switching) –ERP(S) – is standardized by ITU-T to establish a
“Carrier Class” protection switching mechanism in the Ethernet transport plane. Main
objectives:
• Protect single ring and more complicated topologies.
• Fast: 50 ms traffic restoration time (Compared with multiple seconds for xSTP).
• Suitable to operate in the Ethernet transport plane.
Operate in the Ethernet transport plane implies:
– Connection less forwarding.
– Automatic address learning.
– Ageing and flushing mechanisms.

ERP Protocol Tuning


ERP Protocol Tuning parameters explanation:
• Switch behavior [Revertive/Not Revertive]: revert or not to the main resource when
failure clears.
• Wait Time to Restore [0..12 Minutes in step of 1 minute]: meaningful only in case the
swicthing behavior is revertive, is the time the main resource must be free of failures
before reverting to.
• Hold-Off time [0..1000 millisec in step of 10 millisec]: time to wait, after failure
detection, before starting protection in order to see if other protection recovers the
failure
• Guard Time [10..2000 millisec in step of 10 millisec]: during guard time RPL owner
discards the received R-APS OAM frames. It s started according to the ERP state
machine specifications (see ERP specifications for more details)

....................................................................................................................................................................................................................................
20-10 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Provider Backbone Bridge Network Management Network Configuration
Network Configuration
....................................................................................................................................................................................................................................

Network Configuration

Network Configuration
PBB Introduction
PBB is a type of Bridge domain:
No specific PBB provisioning attributes is necessary. Control protocol is ERP.
Inside PBB domain there are no Provider Bridge NEs. Control protocol is based on ERP
only. In theory there could be a mix of xSTP (Spanning Tree Protocol) and ERP.

....................................................................................................................................................................................................................................
1350 OMS 20-11
8DG42227DAAA 9.6
Issue 3 December 2012
Provider Backbone Bridge Network Management PBB Domain Create
Network Configuration
....................................................................................................................................................................................................................................

PBB Domain Create


When to use
The scope of this procedure is to create a PBB Domain. In Connection Less Networks,
the Domain represents an homogeneous set of Network Elements dedicated to MAC,
Virtual Provider or Provider Backbone Bridging.

Related Information
A Domain is a distributed infrastructure made of NE, External-Network (aka virtual NE),
Transport Links and Edge Ports managed together to supply a Connection Less
infrastructure.
Its main properties are the domain type (ETS, Bridge, T-MPLS), bridge type (MAC,
Virtual, Provider or Provider Backbone Bridge) and the Control Plane Type (ERP, STP,
RSTP, PVSTP, MSTP or none)
The list of possible Control protocols depends on the selected Bridge Type.
In case of PBB the only possible choice for Control Protocol is ERP.

Before you begin


This task does not have any preconditions.

Task
...................................................................................................................................................................................................

1 From the main menu bar select Actions > Packet > Construction > Create Domain.

Figure 20-2 Actions>Packet>Construction>Create Domain

....................................................................................................................................................................................................................................
20-12 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Provider Backbone Bridge Network Management PBB Domain Create
Network Configuration
....................................................................................................................................................................................................................................
Result: The Create PBB Domain window is displayed.
...................................................................................................................................................................................................

2 In the Create PBB Domain window enter following data:


• User Label : a friendly name identifying the Domain
• Domain Type: select the value Bridge
• Bridge Type: select the value PBB
• Control Protocol Type: select the value ERP
• Reserved B-VIDs for ERP: insert a range
Click Apply or OK button to confirm the operation.

Figure 20-3 Create PBB Domain

E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS 20-13
8DG42227DAAA 9.6
Issue 3 December 2012
Provider Backbone Bridge Network Management Define NE
Network Configuration
....................................................................................................................................................................................................................................

Define NE
When to use
The scope of this procedure is to assign a Network Element to PBB domain.

Related Information
This procedure applies to all NEs belonging to PBB domain.

Before you begin


This task does not have any preconditions.

Task
...................................................................................................................................................................................................

1 Issue a search of the NEs available following the path Search > Packet > Construction
> Network Elements > Available NEs.

Figure 20-4 Search>Packet>Construction>Network Elements>Available NEs

...................................................................................................................................................................................................

2 The list of the available NEs is displayed.

....................................................................................................................................................................................................................................
20-14 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Provider Backbone Bridge Network Management Define NE
Network Configuration
....................................................................................................................................................................................................................................
Select the involved Network Element and follow the path Actions > Define Network
Element from the popup menu.

Figure 20-5 Available NE: Actions>Define Network Element

Result: The Define Network Element window is displayed.


...................................................................................................................................................................................................

3 Enter or select following data:


• User Label: a friendly name for the Network Element to be defined.
• Working Mode: select PBB
• STP type: select disabled
Click Apply or OK to confirm the operation.

Figure 20-6 Define Network Element dialog box

...................................................................................................................................................................................................

4 From the main menu bar select Search> Packet > Construction > Network Elements >
Defined NEs.
....................................................................................................................................................................................................................................
1350 OMS 20-15
8DG42227DAAA 9.6
Issue 3 December 2012
Provider Backbone Bridge Network Management Define NE
Network Configuration
....................................................................................................................................................................................................................................
The list of the defined NEs is displayed.

Figure 20-7 Defined NE list

E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
20-16 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Provider Backbone Bridge Network Management Provisioning hardware reference
Provisioning
....................................................................................................................................................................................................................................

Provisioning

Provisioning hardware reference


When to use
The scope of this procedure is to give a reference for port create. For more detail refer to
the equipment User Provisioning Guide

Related Information
The involved NEs are defined in PBB domain.

Before you begin


Insert the port terminations in the correct position.

Task
...................................................................................................................................................................................................

1 Once 1850 TSS is supervised, navigation to the ZIC GUI management application is
allowed selecting the TSS Network Element in the list and from the popup menu Search
> Show Equipment
Access the Show Equipment view of the originating NE.

Figure 20-8 Show Equipment view

....................................................................................................................................................................................................................................
1350 OMS 20-17
8DG42227DAAA 9.6
Issue 3 December 2012
Provider Backbone Bridge Network Management Provisioning hardware reference
Provisioning
....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

2 In the Show Equipment, navigate the left-h-side tree and select the termination.
The physical real image is shown in the right-h-side after bar down scrolling.

Figure 20-9 Show Equipment: select the termination

...................................................................................................................................................................................................

3 Click twice on the termination. In the right-hand box click Save to confirm.

Figure 20-10 Module setting

....................................................................................................................................................................................................................................
20-18 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Provider Backbone Bridge Network Management Provisioning hardware reference
Provisioning
....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

4 Access the Show Equipment view of the terminating NE.


The module setting is the same as above described for the originating NE.

Figure 20-11 Show Equipment view of the terminating NE

...................................................................................................................................................................................................

5 From the Node list select the node involved in hardware recent change and follow the
path Actions > Physical > Synchronize > Synchronize NE

Figure 20-12 Node: Actions>Physical>Synchronize>Synchronize NE

E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS 20-19
8DG42227DAAA 9.6
Issue 3 December 2012
Provider Backbone Bridge Network Management Transport link
Provisioning
....................................................................................................................................................................................................................................

Transport link
Transport link introduction
The transport infrastructure is named Transport Link.
The Transport Link can be supported by:
• A TDM path. The link is called Link Over TDM. It carries directly Ethernet
Segments, Tunnels or PWs.
• A Tunnel/PW. The link is called Link Over (T-)MPLS. A Link Over TDM or a Link
Over Cable (Martini) carries it.
• An Ethernet cable. The link is called Link Over Cable.
• A WDM link. The link is called Link Over WDM.

....................................................................................................................................................................................................................................
20-20 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Provider Backbone Bridge Network Management Create Ethernet Physical Connection
Provisioning
....................................................................................................................................................................................................................................

Create Ethernet Physical Connection


When to use
The scope of this procedure is to create an Ethernet Physical Connection

Related Information
The involved ports have already been provisioned.

Before you begin


This task does not have any preconditions.

Task
...................................................................................................................................................................................................

1 From the map view, select the nodes to connect and follow the path Actions > Physical >
Create Physical Connection

Figure 20-13 Actions>Physical>Create Physical Connection

Result: The Create Physical connection window is displayed.


...................................................................................................................................................................................................

2 Set the following attributes:


• Enter a User Label to identify the transport link.
• Select Connection type equal to Ethernet
• Choose the Transport Alarm Enabling Rule (On Definition)
• Only for TDM, select Implement rule
• Only for TDM, select allocation cost

....................................................................................................................................................................................................................................
1350 OMS 20-21
8DG42227DAAA 9.6
Issue 3 December 2012
Provider Backbone Bridge Network Management Create Ethernet Physical Connection
Provisioning
....................................................................................................................................................................................................................................
Click Next button.

Figure 20-14 Create Physical Connection

...................................................................................................................................................................................................

3 The second step is customized according to the “Connection Type” selected (here below
Ethernet physical link creation window is shown):
Only NEs with Ethernet Ports are proposed as possible choices to user.

....................................................................................................................................................................................................................................
20-22 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Provider Backbone Bridge Network Management Create Ethernet Physical Connection
Provisioning
....................................................................................................................................................................................................................................
Only free ports of selected NE and with rate compatible with the link rate are proposed as
possible choices to user.
• Select the Physical Connection Rate of Ethernet link
• Select the end nodes, if not already selected, click on A-node and Z-node empty box,
then select the node from the selection list.
• Select the end ports, by means of the usual selection mechanism.

Figure 20-15 Create> Physical Connection step2

...................................................................................................................................................................................................

4 Click OK or Apply to confirm the creation.


E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS 20-23
8DG42227DAAA 9.6
Issue 3 December 2012
Provider Backbone Bridge Network Management Assign Link over Cable to PBB domain
Provisioning
....................................................................................................................................................................................................................................

Assign Link over Cable to PBB domain


When to use
The scope of this procedure is to assign a Link over Cable to PBB domain.

Related Information
The involved ports have already been provisioned.

Before you begin


The Physical connection to assign has been created.

Task
...................................................................................................................................................................................................

1 From the main menu bar follow the path Search > Packet > Construction > Transport
Links > Links over Cable

Figure 20-16 Search>Packet>Construction>Transport Links>Links over Cable

....................................................................................................................................................................................................................................
20-24 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Provider Backbone Bridge Network Management Assign Link over Cable to PBB domain
Provisioning
....................................................................................................................................................................................................................................
Result: The Links over Cable list is displayed.

Figure 20-17 Links over Cable list

...................................................................................................................................................................................................

2 Select the Link over Cable to assign and follow the path Actions > Assign Resources to
Domain

Figure 20-18 Link over Cable: Actions>Assign Resources to Domain

Result: The Assign Resources to Domain window is displayed.


...................................................................................................................................................................................................

3 Click the selection list icon (right side of the window).


From the list select the relevant PBB domain.
....................................................................................................................................................................................................................................
1350 OMS 20-25
8DG42227DAAA 9.6
Issue 3 December 2012
Provider Backbone Bridge Network Management Assign Link over Cable to PBB domain
Provisioning
....................................................................................................................................................................................................................................
Click Apply or OK to confirm.

Figure 20-19 Assign Resources to Domain

....................................................................................................................................................................................................................................
20-26 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Provider Backbone Bridge Network Management Assign Link over Cable to PBB domain
Provisioning
....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

4 In the Link over Cable list you can verify that the relevant Link over Cable has the
domain attribute accordingly.

Figure 20-20 Link over Cable list

E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS 20-27
8DG42227DAAA 9.6
Issue 3 December 2012
Provider Backbone Bridge Network Management Assign Link over Cable to PBB domain
Provisioning
....................................................................................................................................................................................................................................
Delete Transport Link
...................................................................................................................................................................................................

1 Select the Link over Cable to delete in the list and follow the path from the popup menu
Actions > Delete.

Figure 20-21 Link over Cable:Actions>Delete

...................................................................................................................................................................................................

2 Select the related Physical Connection and follow the path from the popup menu Actions
> Remove.

Figure 20-22 Physical Connection:Actions>Remove

....................................................................................................................................................................................................................................
20-28 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Provider Backbone Bridge Network Management Assign Link over Cable to PBB domain
Provisioning
....................................................................................................................................................................................................................................

E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS 20-29
8DG42227DAAA 9.6
Issue 3 December 2012
Provider Backbone Bridge Network Management Create ERP Ring
ERP configuration
....................................................................................................................................................................................................................................

ERP configuration

Create ERP Ring


When to use
The scope of this procedure is to configure major ring and sub-rings by selecting the links
in the map.

Related Information
This task does not have any related information.

Before you begin


From the physical topology view (physical map) the user configures major ring and
sub-rings by selecting the links in the map.

Task
...................................................................................................................................................................................................

1 From the main menu bar follow the path Actions > Packet > ERP > Create ERP Ring.

Figure 20-23 Actions>Packet>ERP>Create ERP Ring

...................................................................................................................................................................................................

2 In the Create ERP window enter or select following data:


• ERP User Label
• Ring type : select Major or Subring
• Activation status [active/not active] : this value is used to enable or disable the ERP
protocol.
....................................................................................................................................................................................................................................
20-30 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Provider Backbone Bridge Network Management Create ERP Ring
ERP configuration
....................................................................................................................................................................................................................................
With the usual selection mechanism, select the PBB domain.

Figure 20-24 Create ERP Ring

...................................................................................................................................................................................................

3 Select the Transport Links to associate to ERP ring. Click the selection icon, the
following list is displayed.
Select all Transport Links.

....................................................................................................................................................................................................................................
1350 OMS 20-31
8DG42227DAAA 9.6
Issue 3 December 2012
Provider Backbone Bridge Network Management Create ERP Ring
ERP configuration
....................................................................................................................................................................................................................................
Note: The multiple selection is allowed by means of the mouse small wheel.

Figure 20-25 Bridge Transport Links

Click OK to confirm the selection.


...................................................................................................................................................................................................

4 The selected Transport Links are now displayed in the Create ERP Ring main window.

....................................................................................................................................................................................................................................
20-32 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Provider Backbone Bridge Network Management Create ERP Ring
ERP configuration
....................................................................................................................................................................................................................................
Click OK to confirm the creation.

Figure 20-26 Create ERP Ring

....................................................................................................................................................................................................................................
1350 OMS 20-33
8DG42227DAAA 9.6
Issue 3 December 2012
Provider Backbone Bridge Network Management Create ERP Ring
ERP configuration
....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

5 To verify the successful creation follow the path Search > Packet > ERP > Rings

Figure 20-27 Search>Packet>ERP>Rings

...................................................................................................................................................................................................

6 The list of the ERP Rings is shown below, containing the ERP ring which has been just
created.

Figure 20-28 List of ERP Rings

....................................................................................................................................................................................................................................
20-34 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Provider Backbone Bridge Network Management Create ERP Ring
ERP configuration
....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

7 Select the ring which has just been created and follow the path from the popup menu
Actions > Implement ERP Ring

Figure 20-29 ERP ring: Actions>Implement ERP Ring

...................................................................................................................................................................................................

8 The ERP Ring has been implemented.

Figure 20-30 ERP Ring implemented

....................................................................................................................................................................................................................................
1350 OMS 20-35
8DG42227DAAA 9.6
Issue 3 December 2012
Provider Backbone Bridge Network Management Create ERP Ring
ERP configuration
....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

9 From the ERP Ring you can search the nodes on the ring.

Figure 20-31 ERP Ring:Search>Nodes

...................................................................................................................................................................................................

10 The list of the nodes belonging to the ring is displayed.

Figure 20-32 Nodes belonging to the ring

...................................................................................................................................................................................................

11 From the ERP Ring you can search the physical links belonging to the ring.

Figure 20-33 ERP Ring:Search>Physical Links

....................................................................................................................................................................................................................................
20-36 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Provider Backbone Bridge Network Management Create ERP Ring
ERP configuration
....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

12 The list of the physical connections belonging to the ring is displayed.

Figure 20-34 Physcons belonging to the ring

E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS 20-37
8DG42227DAAA 9.6
Issue 3 December 2012
Provider Backbone Bridge Network Management Create an ERP Instance
ERP configuration
....................................................................................................................................................................................................................................

Create an ERP Instance


When to use
The scope of this procedure is to create an ERP instance.

Related Information
The ERP ring has been configured and implemented.

Before you begin


The ERP ring has been configured and implemented

Task
...................................................................................................................................................................................................

1 Before creating a new instance, it is opportune to search the existing instances on the
involved ring.
On the same ERP ring many instances can be created, according to the customer traffic
needs.
Select the ERP ring in the list and follow the path on the popup menu Search > ERP
Instances.

Figure 20-35 ERP ring: Search>ERP Instances

...................................................................................................................................................................................................

2 A search of the ERP instances can be done also fro Show Equipment of an involved NE.

....................................................................................................................................................................................................................................
20-38 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Provider Backbone Bridge Network Management Create an ERP Instance
ERP configuration
....................................................................................................................................................................................................................................
Select folder Ethernet Ring protection.

Figure 20-36 Search of the ERP instances

ERP 1 has 2 instances, one per port and one per VLAN.
ERP2 has no instance.
...................................................................................................................................................................................................

3 The user can display the ERP Instances for a PBB domain.
Select the PBB domain in the domain list and follow the path on the popup menu Search
> ERP Instances.

Figure 20-37 PBB domain:Search>ERP Instances

....................................................................................................................................................................................................................................
1350 OMS 20-39
8DG42227DAAA 9.6
Issue 3 December 2012
Provider Backbone Bridge Network Management Create an ERP Instance
ERP configuration
....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

4 From the main menu bar follow the path Actions > Packet > ERP > Create ERP
Instance

Figure 20-38 Actions>Packet>ERP>Create ERP Instance

...................................................................................................................................................................................................

5 The Create ERP Instance window is displayed.


Folder General is already selected.
Enter instance User Label and select the following attributes:
• R-APS VLAN ID Insert a value between 1 and 4093, the value is unique per ring or
group of interconnected rings
• R-APS PCP [0..7] this is the priority bits value for R-APS.
• Maintenance Entity Level [0..7] this is an integer value indicating the OAM level
assigned to R-APS- ring autoprotection switch.
• Scope of ERP instance . You can select per port or per VLAN
• PBB domain. Select the target PBB domain.
• ERP Ring: the ring to which the instance will be applied.

....................................................................................................................................................................................................................................
20-40 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Provider Backbone Bridge Network Management Create an ERP Instance
ERP configuration
....................................................................................................................................................................................................................................
• RPL (ring protection link) Owner It is the NE that has the master role on ERP instance
• RPL (East/west link that is Blocked by RPL owner in nominal conditions)

Figure 20-39 Create ERP Instance: General

...................................................................................................................................................................................................

6 Select folder Timers and proceed with Protocol Tuning:


• Switch behavior [Revertive/Not Revertive] : revert or not to the main resource
when failure clears
• Wait Time to Restore [0..12 Minutes,steps of 1] : meaningful only in case the
swicthing behavior is revertiv. It is the time the main resource must be free of failures
before reverting to.

....................................................................................................................................................................................................................................
1350 OMS 20-41
8DG42227DAAA 9.6
Issue 3 December 2012
Provider Backbone Bridge Network Management Create an ERP Instance
ERP configuration
....................................................................................................................................................................................................................................
• Hold-Off time [0..1000 millisec, steps of 10]: time to wait, after failure detection,
before starting protection in order to see if other protection recovers the failure.
• Guard Time [10..2000 millisec, steps of 10] : during guard time RPL owner discards
the received R-APS OAM frames. It is started according to the ERP status state.

Figure 20-40 Create ERP Instance: Timers

...................................................................................................................................................................................................

7 Select folder Failures


Optional Alarms that can be included/excluded in the list of Switch Criteria:
• Signal Degrade
• Partial Loss of Capacity (if ring ports are LAG)
• Loss Of Continuity (CCM) defect
• Link OAM Critical Events

....................................................................................................................................................................................................................................
20-42 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Provider Backbone Bridge Network Management Create an ERP Instance
ERP configuration
....................................................................................................................................................................................................................................
Note: If Loss of Continuity defect or Link OAM Critical Events are used as Switch
Criteria it is necessary to assign Down MEPs to Ring Ports (on all the NEs inside the
ring)

Figure 20-41 Create ERP Instance: Failures

....................................................................................................................................................................................................................................
1350 OMS 20-43
8DG42227DAAA 9.6
Issue 3 December 2012
Provider Backbone Bridge Network Management Create an ERP Instance
ERP configuration
....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

8 In the Create ERP Instance wizard, click Apply or OK to confirm the creation.

Figure 20-42 Create ERP Instance

...................................................................................................................................................................................................

9 Select the ERP Instance and follow the path on the popup menu Actions > Implement
ERP Instance

Figure 20-43 ERP Instance: Actions>Implement ERP Instance

....................................................................................................................................................................................................................................
20-44 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Provider Backbone Bridge Network Management Create an ERP Instance
ERP configuration
....................................................................................................................................................................................................................................

E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS 20-45
8DG42227DAAA 9.6
Issue 3 December 2012
Provider Backbone Bridge Network Management B-VID configuration
Backbone VLAN ID
....................................................................................................................................................................................................................................

Backbone VLAN ID

B-VID configuration
When to use
The scope of this procedure is to define a B-VID in a PBB domain and to associate it to
the ERP instance:
The B-VID is the VLAN.

Related Information
The related descriptions are contained in the previous procedures.

Before you begin


The configuration of NEs, Transport Links, ERP ring, ERP Instance has been previously
completed with success.

Task
...................................................................................................................................................................................................

1 From the main menu bar follow the path Actions > Packet > Services >
ConnectionLess(Bridge) > Create B-VID

Figure 20-44 Actions>Packet>Services>ConnectionLess(Bridge)>Create B-VID

...................................................................................................................................................................................................

2 In the B-VID creation wizard window enter or select following data:


• User Label. Enter the userlabel to identify the B-VID.
• Domain. Select the domain.

....................................................................................................................................................................................................................................
20-46 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Provider Backbone Bridge Network Management B-VID configuration
Backbone VLAN ID
....................................................................................................................................................................................................................................
• VLAN ID. Select a unique number.
• VLAN distribution
You can select:
– Manual. In this case the user will specify all relevant Transports Links.
– Domain Wide. In this case the VLAN is distributed over all Transport Links of all
rings belonging to the Domain.
• Select Manual.
Click ERP. Select the ERP ring to which the B-VID is to be assigned.
Select the ERP instance. The selected ERP instance is now contained in the bottom box.

Figure 20-45 Create B-VID wizard step1

...................................................................................................................................................................................................

3 Click Transport Links.

....................................................................................................................................................................................................................................
1350 OMS 20-47
8DG42227DAAA 9.6
Issue 3 December 2012
Provider Backbone Bridge Network Management B-VID configuration
Backbone VLAN ID
....................................................................................................................................................................................................................................
Select the Transport/s to which the B-VID is assigned

Figure 20-46 B-VID:Transport Links selection

....................................................................................................................................................................................................................................
20-48 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Provider Backbone Bridge Network Management B-VID configuration
Backbone VLAN ID
....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

4 After selecting all ERP and Transport Links, click Apply or OK to confirm the creation.

Figure 20-47 Create B-VID

...................................................................................................................................................................................................

5 To verify the successful creation, from the main menu bar follow the path Search >
Packet > Services > Connection Less(Bridge) > B-VIDs
...................................................................................................................................................................................................

6 The B-VID list is displayed, containing the B-VID which has been just created (status =
defined).

....................................................................................................................................................................................................................................
1350 OMS 20-49
8DG42227DAAA 9.6
Issue 3 December 2012
Provider Backbone Bridge Network Management B-VID configuration
Backbone VLAN ID
....................................................................................................................................................................................................................................
Select the B-VID which has been just created and follow the path from the popup menu
Actions > Allocate.

Figure 20-48 B-VID list

...................................................................................................................................................................................................

7 The B-VID Provisioning State changes to allocated.


Select the B-VID from the list and follow the path from the popup menu Actions >
Implement..

Figure 20-49 B-VID: Actions>Implement

....................................................................................................................................................................................................................................
20-50 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Provider Backbone Bridge Network Management B-VID configuration
Backbone VLAN ID
....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

8 The B-VID Provisioning State changes to implemented passing thorough intermediate


status partially implemented.

Figure 20-50 B-VID partially implemented (few secs)

E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS 20-51
8DG42227DAAA 9.6
Issue 3 December 2012
Provider Backbone Bridge Network Management Additional Info on PBB/ERP Service
EVC-EVPLAN Service in PBB/ERP
....................................................................................................................................................................................................................................

EVC-EVPLAN Service in PBB/ERP

Additional Info on PBB/ERP Service


When to use
The scope of this procedure is to define Additional Info on PM, QoS and Managing
Traffic Descriptor.

Related Information
Refer to“PBB Ethernet Virtual Connection” (p. 20-7)

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.

Additional Info on PM
...................................................................................................................................................................................................

1 MEG (maint-entity-grp) is characterized by:


• MEG Identifier: made by a Format and a Name. Format can be (to be confirmed by
NE which will be implemented).
• String
• Dns-Like Name
• MAC Address
• integer
• Associated Maintenance Domain
• MIP creation policy [none, All points, Lower-level MEP exists]: which policy is used
inside MEG for MIP Creation. Default is inherited from Maintenance Domain. See
next step.
• CC Interval [1 sec(Default), 10 sec, 1 min, 10 min] (interval between CCM PDUs)
CC Priority [0..7]( Class-of-Service to be used for CCM PDU).
• The Monitored Resource is automatically determined by NMS from domain type: in
case of PBB.
• S-VLAN in case of Provider Bridge.
• C-VLAN in case of Virtual Bridge.

....................................................................................................................................................................................................................................
20-52 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Provider Backbone Bridge Network Management Additional Info on PBB/ERP Service
EVC-EVPLAN Service in PBB/ERP
....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

2 MIP creation policy can be illustrated by an example:


• MEG#1, MEG#2, MEG#3 all refers to a given EVC.
• MEG#3 is created with “none”, so no MIPs are created.
• MEG#2 is created with “All points”, so MIPs are created in all the points (ports)
where the EVC is passing through.
• MEG#1 is created with “Lower-level MEP exists”, so MIPs are present only where
MEP of MEG#2 and MEG#3 are present.

Figure 20-51 MIP creation policy

...................................................................................................................................................................................................

3 For each EVC termination the user defines the traffic classification rules by associating a
Traffic Classifier and QoS attributes.
Traffic Classifier allows to specify classification rules based on:
• VLAN (single or range)
• Priority bit (single or range)
• IP DSCP (single or range)
• Payload type
• QoS attributes are: Policing mode [color blind, color aware, none]
• Colour profile (applicable if policing mode is color blind or color aware)
• CoS and bandwidth profile are specified associating a Traffic Descriptor

E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS 20-53
8DG42227DAAA 9.6
Issue 3 December 2012
Provider Backbone Bridge Network Management Additional Info on PBB/ERP Service
EVC-EVPLAN Service in PBB/ERP
....................................................................................................................................................................................................................................
QoS – Managing Traffic Descriptor
The Traffic Descriptor describes the characteristics of an Ethernet segment in term of
Class of Service (CoS) and bandwidth.
...................................................................................................................................................................................................

1 Another step towards the MEF alignment is provided by possibility to display bandwidth
parameters following both IETF definitions (as already available) and MEF definitions.
For reminder, the following definitions are applicable for IETF: CIR, PIR, PBS, CBS
while the following one are applicable for MEF: CIR, EIR, CBS, EBS.
The existing relationships are described as in the following:
• EIR = PIR – CIR.
• EBS = PBS – CBS.

Figure 20-52 Traffic Descriptor create step1

...................................................................................................................................................................................................

2 The range of the supported classes of service (CoS, also named forwarding classes) is
extended from the basic set (best effort, regulated and guaranteed) to the enhanced set
(best effort and background, four types of regulated, two types of guaranteed).
....................................................................................................................................................................................................................................
20-54 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Provider Backbone Bridge Network Management Additional Info on PBB/ERP Service
EVC-EVPLAN Service in PBB/ERP
....................................................................................................................................................................................................................................
The frame association to a CoS is performed at the ingress port.
Differentiated quality of service (QoS) management is implemented mapping each CoS to
a specific output queue at the egress port.
Color management allows also frame prioritization within a given forwarding class.
The frame per hop behavior (PHB) is therefore implemented by CoS and color
management.

Figure 20-53 Traffic Descriptor create step2

E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS 20-55
8DG42227DAAA 9.6
Issue 3 December 2012
Provider Backbone Bridge Network Management Add PBB EVC Termination
PBB EVC Termination Management
....................................................................................................................................................................................................................................

PBB EVC Termination Management

Add PBB EVC Termination


When to use
This function consists in adding terminations to a implemented PBB EVC.

Related Information
For information about PBB EVC, Refer to
“PBB Ethernet Virtual Connection” (p. 20-7)

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.

Task
...................................................................................................................................................................................................

1 From the Bridge EVC list select the EVC to which a termination must be added and
follow the path on the popup menu Search > EVC Termination..
The list of the terminations is displayed.

Figure 20-54 EVC Termination list

....................................................................................................................................................................................................................................
20-56 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Provider Backbone Bridge Network Management Add PBB EVC Termination
PBB EVC Termination Management
....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

2 From the Bridge EVC list select the EVC to which a termination must be added and
follow the path on the popup menu Actions > Add Connection Less EVC Termination..

Figure 20-55 Actions> Add Connection Less EVC Termination

...................................................................................................................................................................................................

3 In the Add Connection Less EVC Termination window the EVC is already selected.

....................................................................................................................................................................................................................................
1350 OMS 20-57
8DG42227DAAA 9.6
Issue 3 December 2012
Provider Backbone Bridge Network Management Add PBB EVC Termination
PBB EVC Termination Management
....................................................................................................................................................................................................................................
By means of the usual selection mechanism select the Network Element and the Edge
Port to add.

Figure 20-56 Add Connection Less EVC Termination dialog box

Click OK/Apply to confirm.


...................................................................................................................................................................................................

4 To verify that the new termination has been added successfully, refresh the EVC
Terminations list. The new termination is displayed.

Figure 20-57 The new termination has been added

E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
20-58 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Provider Backbone Bridge Network Management Remove PBB EVC Termination
PBB EVC Termination Management
....................................................................................................................................................................................................................................

Remove PBB EVC Termination


When to use
This function consists in removing terminations to a implemented PBB EVC.

Related Information
For information about PBB EVC, Refer to“PBB Ethernet Virtual Connection” (p. 20-7)

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.

Task
...................................................................................................................................................................................................

1 From the EVC Termination list select the termination to remove and issue the pop-up
menu Actions> Delete.
...................................................................................................................................................................................................

2 A confirmation box is presented. Click OK to confirm the delete operation.


Result: The termination is removed and no longer present.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS 20-59
8DG42227DAAA 9.6
Issue 3 December 2012
Provider Backbone Bridge Network Management Overview
Provider Backbone Bridge EVC Management
....................................................................................................................................................................................................................................

Provider Backbone Bridge EVC Management

Overview
Purpose
This section describes how to manage Provider Backbone Bridge EVC.

Contents

View the PBB EVC list 20-61


Description of the list of PBB EVCs 20-62
Create PBB EVC 20-63
Allocate PBB EVC 20-65
Deallocate PBB EVC 20-67
Implement PBB EVC 20-68
Deimplement PBB EVC 20-70
Add Termination on implemented PBB EVC 20-71
Remove Termination on implemented EVC 20-72
Configure PBB EVC 20-73
Bridge Flows of PBB EVC 20-74
PBB EVC Broadcast Domain Containment 20-76
Enable Broadcast Domain Containment 20-77
Disable Broadcast Domain Containment 20-78
Automatic association UNI port - default VT 20-79
Manual association UNI port - user VT 20-80
Configuration of the DEI bit 20-81

....................................................................................................................................................................................................................................
20-60 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Provider Backbone Bridge Network Management View the PBB EVC list
Provider Backbone Bridge EVC Management
....................................................................................................................................................................................................................................

View the PBB EVC list


When to use
The PBB Ethernet Virtual Connection List window presents all the PBB EVCs and their
attributes.

Related Information
For information about PBB EVC, Refer to
“PBB Ethernet Virtual Connection” (p. 20-7)

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.

Task
From the MS-GUI Main view:
...................................................................................................................................................................................................

1 Select Search > Packet > Services.


Result: The menu of the Services is shown.
...................................................................................................................................................................................................

2 Select Connection Less (Bridge) > Bridge EVCs.


Result: The list window is displayed.
See the following topic in this document: “Description of the list of PBB EVCs”
(p. 20-62)
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS 20-61
8DG42227DAAA 9.6
Issue 3 December 2012
Provider Backbone Bridge Network Management Description of the list of PBB EVCs
Provider Backbone Bridge EVC Management
....................................................................................................................................................................................................................................

Description of the list of PBB EVCs


Attributes of a PBB EVC
The attributes displayed for each EVC are:
• User Label.
• Ethernet Service User Label.
• Topology (Point to point, Routed multi-point, Any to any).
• Service Type.(EVPL, EPL, EVPLAN, Broadcast).
• Traffic Type (Unicast, Multicast).
• Domain Type.(Backbone)
• Working State (Normal, Configuring, Allocating, De-allocating, Implementing,
De-implementing, Commissioning, De-commissioning, Termination adding,
Termination removing, Constraint adding, Constraint removing, removing).
• Provisioning State (Defined, Partially allocated, Allocated, Partially implemented,
Implemented, Commissioned).
• Service State.(In Service, Not In service)
• Availability Status (Normal, Degraded, In Failure, Not Meaningful).
• B-VID
• Broadcast Domain Containment (Enabled, Disabled)

....................................................................................................................................................................................................................................
20-62 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Provider Backbone Bridge Network Management Create PBB EVC
Provider Backbone Bridge EVC Management
....................................................................................................................................................................................................................................

Create PBB EVC


When to use
The function creates a PBB Ethernet Virtual Connection.

Related Information
The user specifies the characteristics of the EVC (userlabel, type, terminations, flows,
etc.) and, in addition:
• I-VID
• I-SID
• Broadcast Domain Containment. (Enabled, Disabled). Refer to “PBB EVC Broadcast
Domain Containment” (p. 20-76)
The specified B-VID must:
• exist;
• be in the Domain specified for the EVC;
• have been created by the operator (B-VIDs created by ERP BB are not allowed).
The I-SID must not have been already used by another EVC in the same Domain.
The allowed values for the Resource Sharing attribute are FULL or PRIVATE UNI.
The allowed types for a PBB EVC are:
• EPL
• EVPL
• EPLAN
• EVPLAN
• BROADCAST
If the specified B-VID has a non empty I-SID Bundle, the I-SID specified for the EVC
must be within that bundle.
The creation of the EVC is similar to the creation of PB EVC, except for the fact that the
association between the EVC, I-SID and B-VID is stored.
For information about PBB EVC, Refer to“PBB Ethernet Virtual Connection” (p. 20-7).

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.

....................................................................................................................................................................................................................................
1350 OMS 20-63
8DG42227DAAA 9.6
Issue 3 December 2012
Provider Backbone Bridge Network Management Create PBB EVC
Provider Backbone Bridge EVC Management
....................................................................................................................................................................................................................................
Task
From the MS-GUI Main view:
...................................................................................................................................................................................................

1 Select Action > Packet > Services.


Result: The menu of the Services is shown.
...................................................................................................................................................................................................

2 Select Connection Less (Bridge) > Create PBB EVC. See workflow “Create a PBB EVC”
(p. 20-144)
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
20-64 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Provider Backbone Bridge Network Management Allocate PBB EVC
Provider Backbone Bridge EVC Management
....................................................................................................................................................................................................................................

Allocate PBB EVC


When to use
To allocate a PBB EVC

Related Information
The allocation of a PBB EVC is possible only if the B-VID is at least allocated and is
rejected in all other cases (i.e. when the B-VID is defined).
In no case, a PBB EVC can have an EVC Termination on one NE that is not embraced by
it's B-VID (either through a TL or through a ring). In other words: if no TL or ring
associated to a B-VID reaches/crosses a NE, the latter can't host any EVC Termination
served by that B-VID.
Since no private use of Transport Links is allowed (Resource Sharing only admitted
values are FULL and PRIVATE UNI), no check on Transport Links sharing is performed.
The allocation, that for the most part (EVC Terminations and Flows) is identical to the
one of a PB EVC, specifically concerns:
• the allocation of the association between each Port supporting an EVC Termination
and the I-SID
• the allocation of the association between the B-VID, the I-SID and all the NNIs,
belonging to NEs where there are EVC Terminations, associated to the B-VID of the
EVC;
• for each flow, the allocation of a cross connection that has, as a server at one side, the
I-SID;
• if the EVC is under OAM, the I-SID has to be distributed also in all the places where
the B-VID is.
For information, Refer to“PBB Ethernet Virtual Connection” (p. 20-7).

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.

Task
From the MS-GUI Main view:
...................................................................................................................................................................................................

1 Follow the menu path Search > Packet > Services > Connection Less (Bridge) > Bridge
EVCs.

....................................................................................................................................................................................................................................
1350 OMS 20-65
8DG42227DAAA 9.6
Issue 3 December 2012
Provider Backbone Bridge Network Management Allocate PBB EVC
Provider Backbone Bridge EVC Management
....................................................................................................................................................................................................................................
Result: The Bridge EVC list window is displayed.
...................................................................................................................................................................................................

2 Select the EVC in the list and follow the path Action > Bridge EVC > Allocate.
...................................................................................................................................................................................................

3 Select one of the options in the confirmation box. Refer to the procedure “Confirm the
action” (p. 11-40).
Result: The EVC is allocated.
The Provisioning State is changed to Allocated.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
20-66 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Provider Backbone Bridge Network Management Deallocate PBB EVC
Provider Backbone Bridge EVC Management
....................................................................................................................................................................................................................................

Deallocate PBB EVC


When to use
To deallocate PBB EVC.

Related Information
The deallocation, that for the most part (EVC Terminations and Flows) is identical to the
one of a PB EVC, specifically concerns:
• the deallocation of the associations between the Ports of the EVC Terminations and
the I-SID;
• the deallocation of the associations between the B-VID, the I-SID and the NNIs
associated to the B-VID of the EVC;
• if the EVC is under OAM, its I-SID has to be un-distributed also in all the places
where the B-VID has been.
For information, Refer to“PBB Ethernet Virtual Connection” (p. 20-7).

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.

Task
From the MS-GUI Main view:
...................................................................................................................................................................................................

1 Follow the menu path Search > Packet > Services > Connection Less (Bridge) > Bridge
EVCs.
Result: The Bridge EVC list window is displayed.
...................................................................................................................................................................................................

2 Select the EVC in the list and follow the path Action > Bridge EVC > Deallocate.
...................................................................................................................................................................................................

3 Select one of the options in the confirmation box. Refer to the procedure “Confirm the
action” (p. 11-40).
Result: The EVC is deallocated.
The Provisioning State is changed to Defined.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS 20-67
8DG42227DAAA 9.6
Issue 3 December 2012
Provider Backbone Bridge Network Management Implement PBB EVC
Provider Backbone Bridge EVC Management
....................................................................................................................................................................................................................................

Implement PBB EVC


When to use
To implement PBB EVC.

Related Information
The implementation of a PBB EVC is possible only if the B-VID is implemented and is
rejected in all other cases (included partially implemented B-VID).
The implementation, that for the most part (EVC Terminations and Flows) is identical to
the one of a PB EVC, specifically concerns:
• the implementation of the association between each Port supporting an EVC
Termination and the I-SID (opticsIMPbbInstanceTable);
• the implementation of the association between the B-VID, the I-SID and all the NNIs,
belonging to NEs where there are EVC Terminations, associated to the B-VID of the
EVC (opticsIMPbbInstanceTable);
• for each flow, the implementation of a cross connection that has as a server at one side
the I-SID (i.e. opticsIMETSInFlowServiceType = PBB and opticsIMETSInFlowSer-
viceID = index of row of opticsIMPbbInstanceTable for the I-SID, for either
opticsIMETSInFlowTable or opticsIMETSOutFlowTable);
• if the EVC is under OAM, the I-SID has to be distributed also in all the places where
the B-VID is.
For information:
Refer to“PBB Ethernet Virtual Connection” (p. 20-7).
Refer to “PBB EVC provisioning” (p. 20-8).

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.

Task
From the MS-GUI Main view:
...................................................................................................................................................................................................

1 Follow the menu path Search > Packet > Services > Connection Less (Bridge) > Bridge
EVCs.
Result: The Bridge EVC list window is displayed.
...................................................................................................................................................................................................

2 Select the EVC in the list and follow the path Action > Bridge EVC > Implement.
....................................................................................................................................................................................................................................
20-68 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Provider Backbone Bridge Network Management Implement PBB EVC
Provider Backbone Bridge EVC Management
....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

3 Select one of the options in the confirmation box. Refer to the procedure “Confirm the
action” (p. 11-40).
Result: The EVC is implemented.
The Provisioning State is changed to Implemented.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS 20-69
8DG42227DAAA 9.6
Issue 3 December 2012
Provider Backbone Bridge Network Management Deimplement PBB EVC
Provider Backbone Bridge EVC Management
....................................................................................................................................................................................................................................

Deimplement PBB EVC


When to use
To deimplement PBB EVC.

Related Information
The deimplementation, that for the most part (EVC Terminations and Flows) is identical
to the one of a PB EVC, specifically concerns:
• the deimplementation of the association between each Port supporting an EVC
Termination and the I-SID (opticsIMPbbInstanceTable);
• the deimplementation of the association between the B-VID, the I-SID and all the
NNIs, belonging to NEs where there are EVC Terminations, associated to the B-VID
of the EVC (opticsIMPbbInstanceTable);
• if the EVC is under OAM, its I-SID has to be un-distributed also in all the places
where the B-VID has been.
For information, Refer to“PBB Ethernet Virtual Connection” (p. 20-7).

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.

Task
From the MS-GUI Main view:
...................................................................................................................................................................................................

1 Follow the menu path Search > Packet > Services > Connection Less (Bridge) > Bridge
EVCs.
Result: The Bridge EVC list window is displayed.
...................................................................................................................................................................................................

2 Select the EVC in the list and follow the path Action > Bridge EVC > deimplement.
...................................................................................................................................................................................................

3 Select one of the options in the confirmation box. Refer to the procedure “Confirm the
action” (p. 11-40).
Result: The EVC is deimplemented.
The Provisioning State is changed to Allocated.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
20-70 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Provider Backbone Bridge Network Management Add Termination on implemented PBB EVC
Provider Backbone Bridge EVC Management
....................................................................................................................................................................................................................................

Add Termination on implemented PBB EVC


When to use
This function consists in adding terminations to a implemented PBB EVC.

Related Information
Termination addition means I-SID distribution.
In no case an EVC Termination can be added on a NE that is not used by the EVC's
B-VID. In particular:
• implementation of the association between the Termination's Port supporting and the
I-SID (opticsIMPbbInstanceTable);
• (only if does not exist an implemented Termination of the same EVC in the same NE)
implementation of the association between the B-VID, the I-SID and all the NNIs,
belonging to the Termination's NE, associated to the B-VID of the EVC
(opticsIMPbbInstanceTable).
For information, Refer to“PBB Ethernet Virtual Connection” (p. 20-7).

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.

Task
From the MS-GUI Main view:
...................................................................................................................................................................................................

1 Select the path Search > Packet > Services > Connection Less (Bridge) > Bridge EVCs.
...................................................................................................................................................................................................

2 Select the EVC in the list where the termination must be added.
...................................................................................................................................................................................................

3 Select the path Action > Bridge EVC > Add Connection Less EVC Termination.
Result: The Add Termination window is displayed.
...................................................................................................................................................................................................

4 Click Ok.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS 20-71
8DG42227DAAA 9.6
Issue 3 December 2012
Provider Backbone Bridge Network Management Remove Termination on implemented EVC
Provider Backbone Bridge EVC Management
....................................................................................................................................................................................................................................

Remove Termination on implemented EVC


When to use
This function consists in removing terminations to an implemented PBB EVC.

Related Information
Termination removal means undo of I-SID distribution.
In no case an EVC Termination can be added on a NE that is not used by the EVC's
B-VID. In particular:
• deimplementation of the association between the Termination's Port supporting and
the I-SID (opticsIMPbbInstanceTable);
• (only if this is the last implemented Termination of the same EVC in the same NE)
deimplementation of the association between the B-VID, the I-SID and all the NNIs,
belonging to the Termination's NE, associated to the B-VID of the EVC
(opticsIMPbbInstanceTable).
For information about PBB EVC, Refer to“PBB Ethernet Virtual Connection” (p. 20-7).

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.

Task
From the MS-GUI Main view:
...................................................................................................................................................................................................

1 Select the path Search > Packet > Services > Connection Less (Bridge) > Bridge EVCs.
...................................................................................................................................................................................................

2 Select the EVC in the list where the termination must be removed.
...................................................................................................................................................................................................

3 Select the path Action > Bridge EVC > Remove Connection Less EVC Termination.
...................................................................................................................................................................................................

4 Click Ok.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
20-72 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Provider Backbone Bridge Network Management Configure PBB EVC
Provider Backbone Bridge EVC Management
....................................................................................................................................................................................................................................

Configure PBB EVC


When to use
This function changes attributes of PBB EVC.

Related Information
For information, Refer to“PBB Ethernet Virtual Connection” (p. 20-7).

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.

Task
From the MS-GUI Main view:
...................................................................................................................................................................................................

1 Select the path Search > Packet > Services > Connection Less (Bridge) > Bridge EVCs.
...................................................................................................................................................................................................

2 Select the PBB EVC in the list .


...................................................................................................................................................................................................

3 Select the path Action > Bridge EVC > Configure PBB EVC.
Result: The Configuration window is displayed. The user can change:
• EVC.
• Traffic descriptor.
...................................................................................................................................................................................................

4 Click Ok.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS 20-73
8DG42227DAAA 9.6
Issue 3 December 2012
Provider Backbone Bridge Network Management Bridge Flows of PBB EVC
Provider Backbone Bridge EVC Management
....................................................................................................................................................................................................................................

Bridge Flows of PBB EVC


When to use
This function shows bridge flows of a PBB EVC.

Related Information
For information, Refer to“PBB Ethernet Virtual Connection” (p. 20-7).

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.

Task
From the MS-GUI Main view:
...................................................................................................................................................................................................

1 Select the path Search > Packet > Services > Connection Less (Bridge) > Bridge EVCs.
...................................................................................................................................................................................................

2 Select the PBB EVC in the list .


...................................................................................................................................................................................................

3 Select the path Action > Bridge EVC > Bridge Flows.
Result: The List Bridge Flow is displayed.
• EVC
• Bridge Ingress Flows
– Id
– Network Element
– Edge Port
– Policy Mode
– Traffic Descriptor
– Color Profile
– VLAN Pop
– Classification
• Bridge Egress Flows
– Id
– Network Element
– Edge Port
....................................................................................................................................................................................................................................
20-74 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Provider Backbone Bridge Network Management Bridge Flows of PBB EVC
Provider Backbone Bridge EVC Management
....................................................................................................................................................................................................................................
– Class Of Service
– VLAN Id
– Priority Mode
– Green Priority
– Yellow Priority

E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS 20-75
8DG42227DAAA 9.6
Issue 3 December 2012
Provider Backbone Bridge Network Management PBB EVC Broadcast Domain Containment
Provider Backbone Bridge EVC Management
....................................................................................................................................................................................................................................

PBB EVC Broadcast Domain Containment


Definition
Broadcast domain containment is implemented through the provisioning of I-SID
instances also in intermediate nodes.
Algorithm to determine the involved NEs and ports in a broadcast domain containment
for an EVC:
• get all the EVC Terminations and determine the paths between each pair of them (in
other words: given a pair of EVC Terminations, determine a path between them
(inside the involved B-VID, of course), in terms of the rings and/or single TLs that
must be crossed to reach one from the other);
• enrich the set of rings and TLs, determined at the previous step, by adding all the
main rings for any sub-ring that is already included in the set;
• take all the NEs of the rings and TLs of the set and provision the I-SID there (if not
yet provisioned because of an EVC Termination) associating to it the NNI ports of the
involved B-VID in that NE that are linked to another NE of the set.
Broadcast domain containment provisioning is alternative to I-SID for OAM
provisioning: if broadcast domain containment is enabled no I-SID for OAM is
provisioned.

....................................................................................................................................................................................................................................
20-76 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Provider Backbone Bridge Network Management Enable Broadcast Domain Containment
Provider Backbone Bridge EVC Management
....................................................................................................................................................................................................................................

Enable Broadcast Domain Containment


When to use
This function activates the broadcast domain containment on an EVC , regardless of EVC
Provisioning State.

Related Information
The operator may enable the broadcast domain containment on an EVC by simply
invoking the modify (in case of defined or allocated EVC) or the configure (in all other
cases) of the EVC.
Within the form of modify/configure the operator is able to change the Broadcast Domain
Containment attribute from "Disabled" to "Enabled".
If the EVC is in defined or allocated state, the impacts are only within the PKT (i.e. DB).
If the EVC is in implemented state, the impacts are both on DB and on the involved NEs.
Refer to“PBB EVC Broadcast Domain Containment” (p. 20-76).
If the EVC is under OAM, the I-SID modifications/provisioning for broadcast domain
containment replace the ones existing for OAM.

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.

Task
From the MS-GUI Main view:
...................................................................................................................................................................................................

1 Select the path Search > Packet > Services > Connection Less (Bridge) > Bridge EVCs.
...................................................................................................................................................................................................

2 Select The EVC in the list


...................................................................................................................................................................................................

3 Select the path Action > Bridge EVC> Modify.


...................................................................................................................................................................................................

4 Select the tab Details and set Enable Broadcast Domain Containment to Enabled.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS 20-77
8DG42227DAAA 9.6
Issue 3 December 2012
Provider Backbone Bridge Network Management Disable Broadcast Domain Containment
Provider Backbone Bridge EVC Management
....................................................................................................................................................................................................................................

Disable Broadcast Domain Containment


When to use
This function deactivates the broadcast domain containment on an EVC , regardless of
EVC Provisioning State.

Related Information
The operator may disable the broadcast domain containment on an EVC by simply
invoking the modify (in case of defined or allocated EVC) or the configure (in all other
cases) of the EVC.
Within the form of modify/configure the operator is able to change the Broadcast Domain
Containment attribute from "Enabled" to "Disabled".
If the EVC is in defined or allocated state, the impacts are only within the PKT (i.e. DB).
If the EVC is in implemented state, the impacts are both on DB and on the involved NEs.
Refer to “PBB EVC Broadcast Domain Containment” (p. 20-76).
If the EVC is under OAM, the I-SID situation on DB/NE is restored as if on the EVC was
just put under OAM. This is needed since previous broadcast domain containment
enabling could have removed some of the I-SID instances on some NE and modified
other ones.

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.

Task
From the MS-GUI Main view:
...................................................................................................................................................................................................

1 Select the path Search > Packet > Services > Connection Less (Bridge) > Bridge EVCs.
...................................................................................................................................................................................................

2 Select The EVC in the list


...................................................................................................................................................................................................

3 Select the path Action > Bridge EVC> Modify.


...................................................................................................................................................................................................

4 Select the tab Details and set Enable Broadcast Domain Containment to Disabled.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
20-78 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Provider Backbone Bridge Network Management Automatic association UNI port - default VT
Provider Backbone Bridge EVC Management
....................................................................................................................................................................................................................................

Automatic association UNI port - default VT


Automatic association of the default VT to an EVC Termination
At EVC definition time, by default, the EVC termination is associated to the default VT,
only for those cards that support VT management.
The operator can specify at EVC definition time or modify at EVC configuration time,
the reserved bandwidth (ISID-CIR/ISID-PIR) associated to a given EVC termination.
If the reserved bandwidth (ISID-CIR/ISID-PIR) has been not specified by operator at
EVC definition time, then the system assumes:
• ISID-CIR = 0
• ISID-PIR = VT-PR
At allocation time, each egress I-SID is automatically associated to the default VT of the
ETS-P UNI interface.
When a PBB EVC is allocated, the reserved VT-CR of the default VT is automatically
increased by an amount equal to: ISID-CIR
The reserved VT-PR of the default VT is automatically updated to take into account the
contribution of: ISID-PIR
For the default VT, VT-CR, VT-Reserved-CR, VT-PR and VT-Reserved-PR are
automatically computed according to ANY aggregation criterion in Table 2 of PKT 9.1
QOS Management Technical Functional Specification.

....................................................................................................................................................................................................................................
1350 OMS 20-79
8DG42227DAAA 9.6
Issue 3 December 2012
Provider Backbone Bridge Network Management Manual association UNI port - user VT
Provider Backbone Bridge EVC Management
....................................................................................................................................................................................................................................

Manual association UNI port - user VT


Manual association of the user VT to an EVC Termination
The operator is allowed to manually define (during EVC definition) or modify (during
EVC configuration) the association between the I-SID and the VT at the ETS-P UNI (i.e.
the association between an EVC Termination and a VT).
The operator has to specify at EVC definition time and can modify at EVC configuration
time, the reserved bandwidth (ISID-CIR/ISID-PIR) associated to a given EVC
termination. By default, the system assumes that:
• ISID-CIR = 0
• ISID-PIR = VT-PR
The system checks that the required bandwidth is available on the user VT.
When a PBB EVC is allocated, the reserved VT-CR of the user VT is automatically
increased by an amount equal to:
• ISID-CIR
The reserved VT-PR of the user VT is automatically updated to take into account the
contribution of:
• ISID-PIR
For the user VT, VT-Reserved-CR and VT-Reserved-PR are automatically computed
according to the following parameters checks:
• VT-CR >= VT-Reserved-CR = ΣFixed-VT ISID-CIRi , over all ISID using the VT.
• VT-PR>= VT-Reserved-PR = Max (ISID-PIRi) , over all ISID using the VT.

....................................................................................................................................................................................................................................
20-80 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Provider Backbone Bridge Network Management Configuration of the DEI bit
Provider Backbone Bridge EVC Management
....................................................................................................................................................................................................................................

Configuration of the DEI bit


Configuration of the DEI bit support on PBB NNI ports
The operator specifies a PBB NNI port (PNP client type) and tells whether he wants to
activate or deactivate the DEI bit support.
The system configures the port accordingly.
Activating the DEI bit support means that from that port will be possible to manage 8
CoS each with two colors (green and yellow), thus giving a different meaning to the PCP
attribute on the same port: 8P0D means, in fact, 8P8D.
Activating the DEI bit is meaningful (and useful) only for PCP = 8P0D .

....................................................................................................................................................................................................................................
1350 OMS 20-81
8DG42227DAAA 9.6
Issue 3 December 2012
Provider Backbone Bridge Network Management Overview
B-VID Management
....................................................................................................................................................................................................................................

B-VID Management

Overview
Purpose
This section describes how to manage B-VID.

Contents

View the B-VID list 20-83


Create PBB B-VID 20-84
Delete PBB B-VID 20-86
Allocate PBB B-VID 20-87
Deallocate PBB B-VID 20-88
Implement PBB B-VID 20-89
Deimplement PBB B-VID 20-91
Domain Wide VID distribution 20-93
Ring Association to a B-VID 20-95
Ring Dissociation from B-VID 20-97
Change ERP of a B-VID 20-99
List ERP instances of a B-VID 20-101
Association of Transport Link to B-VID 20-102
Dissociation of Transport Link to B-VID 20-104

....................................................................................................................................................................................................................................
20-82 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Provider Backbone Bridge Network Management View the B-VID list
B-VID Management
....................................................................................................................................................................................................................................

View the B-VID list


When to use
The PBB B-VID List window presents all the B-VIDand their attributes.

Related Information
For information about PBB EVC, Refer to“PBB Ethernet Virtual Connection” (p. 20-7).

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.

Task
From the MS-GUI Main view:
...................................................................................................................................................................................................

1 Select Search > Packet > Services.


Result: The menu of the Services is shown.
...................................................................................................................................................................................................

2 Select Connection Less (Bridge) > B-VIDs.


Result: The list window is displayed.
The attributes displayed for each B-VID are:
• User Label.
• Domain (must be a PBB Domain).
• VLAN Id
• Provisioning state.(Defined, Allocated, Partially implemented, Implemented, )
• Availability State(Normal)

E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS 20-83
8DG42227DAAA 9.6
Issue 3 December 2012
Provider Backbone Bridge Network Management Create PBB B-VID
B-VID Management
....................................................................................................................................................................................................................................

Create PBB B-VID


When to use
The function creates a PBB B-VID. B-VID is used as an infrastructure for EVCs.

Related Information
About the parameters:
• Domain must be PBB Domain.
• I-SID spcify the bundle of I-SIDs allowed to be supported by this B-VID. An empty
set means no restrictions apply.
• VLAN ID must not be already assigned to another B-VID in the Domain.
Specified VID must be:
– If the request is from ERP BB: specified VID must be in the R-APS B-VID
VLAN Bundle of the Domain.
– If the request is not from ERP BB: specified VID must not be in the R-APS
B-VID VLAN Bundle of the Domain.
• VLAN Distribution is Manual means the Rings and the Transport Links to be
associated to the B-VID must be explicitly chosen by the operator. Optionally the
operator can choose the ERP instance of each chosen Ring to be associated to the
B-VID. For each chosen Ring for which no ERP instance has been specified the
per-Port ERP instance is automatically chosen. If no ERP instance is specified for a
ring and that ring has no per-Port ERP instance, the creation of the B-VID fails and a
detailed error is reported to the operator.
If VLAN distribution is Manual, the user specify:
– a subset of the Rings of the Domain and for each Ring, optionally, the ERP
instance to be used;
– a subset of the Transport Links of the Domain that do not already belong to a Ring
• VLAN Distribution is Domain Wide means that, once created, the B-VID will have all
the Rings and the Transport Links of the Domain associated to it. In this case the
per-Port ERP of each chosen ring is automatically associated to the B-VID. If no
per-Port ERP exists for at least one ring of the Domain, the creation of the B-VID
fails and a detailed error is reported to the operator.

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.

....................................................................................................................................................................................................................................
20-84 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Provider Backbone Bridge Network Management Create PBB B-VID
B-VID Management
....................................................................................................................................................................................................................................
Task
From the MS-GUI Main view:
...................................................................................................................................................................................................

1 Select Action > Packet > Services.


Result: The menu of the Services is shown.
...................................................................................................................................................................................................

2 Select Connection Less (Bridge) > Create B-VID.


...................................................................................................................................................................................................

3 Enter the following parameters:


• Enter a Userlabel.
• Select a Domain from list. Must be aPBB Domain.
• Enter VLAN ID. (A value from 1 to 4094, a unique value in the Domain).
• VLAN distribution. (Manual, Domain Wide)
• Click ERP and select one or more rings from list.
• For each ring, select one or more ERP instances from list.
• Click Transport link and select one or more Transport links from list.
...................................................................................................................................................................................................

4 Click Ok.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS 20-85
8DG42227DAAA 9.6
Issue 3 December 2012
Provider Backbone Bridge Network Management Delete PBB B-VID
B-VID Management
....................................................................................................................................................................................................................................

Delete PBB B-VID


When to use
The function deletes a PBB B-VID. B-VID is used as an infrastructure for EVCs.

Related Information
A B-VID can only be deleted when is in Defined state and does not support any EVC.
A B-VID created by ERP BB can only be deleted by ERP BB.
A B-VID created by the USM can only be deleted by the USM.

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.

Task
From the MS-GUI Main view:
...................................................................................................................................................................................................

1 Select the path Search > Packet > Services > Connection Less (Bridge) > B-VIDs.
...................................................................................................................................................................................................

2 Select the object in the list.


...................................................................................................................................................................................................

3 Select the path Action > B-VIDs > Delete.


...................................................................................................................................................................................................

4 Select one of the options in the confirmation box. Refer to the procedure “Confirm the
action” (p. 11-40).
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
20-86 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Provider Backbone Bridge Network Management Allocate PBB B-VID
B-VID Management
....................................................................................................................................................................................................................................

Allocate PBB B-VID


When to use
The function allocates resources for a PBB B-VID.

Related Information
This phase consists in the creation, on DB, of the VLAN Distribution information (for
each NE on which terminates/passes a TL/Ring associated to the B-VID).
A B-VID created by ERP BB can only be allocated by ERP BB.
A B-VID created by the USM can only be allocated by the USM.

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.

Task
From the MS-GUI Main view:
...................................................................................................................................................................................................

1 Select the path Search > Packet > Services > Connection Less (Bridge) > B-VIDs.
...................................................................................................................................................................................................

2 Select the object in the list.


...................................................................................................................................................................................................

3 Select the path Action > B-VIDs > Allocate.


...................................................................................................................................................................................................

4 Select one of the options in the confirmation box. Refer to the procedure “Confirm the
action” (p. 11-40).
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS 20-87
8DG42227DAAA 9.6
Issue 3 December 2012
Provider Backbone Bridge Network Management Deallocate PBB B-VID
B-VID Management
....................................................................................................................................................................................................................................

Deallocate PBB B-VID


When to use
The function de-allocates resources for a PBB B-VID.

Related Information
This phase consists in the removal of the DB objects created during the allocation .
A B-VID can't be de-allocated if it supports one or more EVCs that are allocated: all the
EVCs supported by a B-VID (if any) must be all in defined state in order for the B-VID to
be deallocated.
A B-VID created by ERP BB can only be de-allocated by ERP BB.
A B-VID created by the USM can only be de-allocated by the USM.

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.

Task
From the MS-GUI Main view:
...................................................................................................................................................................................................

1 Select the path Search > Packet > Services > Connection Less (Bridge) > B-VIDs.
...................................................................................................................................................................................................

2 Select the object in the list.


...................................................................................................................................................................................................

3 Select the path Action > B-VIDs > Deallocate.


...................................................................................................................................................................................................

4 Select one of the options in the confirmation box. Refer to the procedure “Confirm the
action” (p. 11-40).
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
20-88 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Provider Backbone Bridge Network Management Implement PBB B-VID
B-VID Management
....................................................................................................................................................................................................................................

Implement PBB B-VID


When to use
The function provisions the elementary objects involved with a PBB B-VID.

Related Information
Provisioning on the involved NEs (i.e. the ones identified during the allocation phase) of
the (in this order):
1. creation of the B-VID instance and of the associations B-VID - Port;
2. associations B-VID - ERP (for any non-per-Port ERP).
Step 1 involves the creation of a row in the opticsIMPbbInstanceTable, in each involved
NE, that contains among the other things the ports to be associated to the B-VID instance
(i.e. the ports, in that NE, belonging to TLs or Rings associated to the B-VID). This
provisioning is requested by EoT to Adaptation.
Step 2 involves the request to ERP BB to perform the association for each involved ERP
(only in case of per-VLAN ERP). Step 2 is not performed for B-VIDs created by ERP BB
(the association, in fact, is provisioned by the ERP BB before invoking the B-VID
implementation; This avoids deadlocks between ERP BB and EoT BB (both being single
threaded processes).
A complete failure on step 1 causes the B-VID to remain in Allocated state.
A partial failure on step 1 or a failure during step 2 causes the B-VID to go in Partially
Implemented state.

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.

Task
From the MS-GUI Main view:
...................................................................................................................................................................................................

1 Select the path Search > Packet > Services > Connection Less (Bridge) > B-VIDs.
...................................................................................................................................................................................................

2 Select the object in the list.


...................................................................................................................................................................................................

3 Select the path Action > B-VIDs > Implement.

....................................................................................................................................................................................................................................
1350 OMS 20-89
8DG42227DAAA 9.6
Issue 3 December 2012
Provider Backbone Bridge Network Management Implement PBB B-VID
B-VID Management
....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

4 Select one of the options in the confirmation box. Refer to the procedure “Confirm the
action” (p. 11-40).
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
20-90 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Provider Backbone Bridge Network Management Deimplement PBB B-VID
B-VID Management
....................................................................................................................................................................................................................................

Deimplement PBB B-VID


When to use
The function releses the elementary objects involved with a PBB B-VID.

Related Information
Un-provisioning on the involved NEs (i.e. the ones identified during the allocation phase)
of the objects provisioned during the implementation with the same interactions of EoT
with other BBs.
This means:
1. removal of associations B-VID - ERP (for any non-per-Port ERP), requested to ERP
BB by EoT BB;
2. removal of the B-VID instance (with automatic removal of B-VID - Port associations)
performed by Adaption on behalf of EoT.
Step 1 is not performed for B-VIDs created by ERP BB (the association, in fact, is
un-provisioned by the ERP BB after invoking the B-VID de-implementation; This avoids
deadlocks between ERP BB and EoT BB (both being single threaded processes).
A complete failure on step 1 causes the B-VID to remain in Implemented state.
A partial failure on step 1 or a failure during step 2 causes the B-VID to go in Partially
Implemented state.

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.

Task
From the MS-GUI Main view:
...................................................................................................................................................................................................

1 Select the path Search > Packet > Services > Connection Less (Bridge) > B-VIDs.
...................................................................................................................................................................................................

2 Select the object in the list.


...................................................................................................................................................................................................

3 Select the path Action > B-VIDs > Deimplement.

....................................................................................................................................................................................................................................
1350 OMS 20-91
8DG42227DAAA 9.6
Issue 3 December 2012
Provider Backbone Bridge Network Management Deimplement PBB B-VID
B-VID Management
....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

4 Select one of the options in the confirmation box. Refer to the procedure “Confirm the
action” (p. 11-40).
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
20-92 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Provider Backbone Bridge Network Management Domain Wide VID distribution
B-VID Management
....................................................................................................................................................................................................................................

Domain Wide VID distribution


When to use
The function associates all the Rings and Transport Links of a Domain to a B-VID.

Related Information
This procedure applies to any provisioning state.
Defined case
This procedure applies when the operator requires an existing B-VID in Defined state to
be Domain-Wide distributed.
This operation causes the B-VID to be associated to all the Rings and TLs of the Domain,
as if it was been created with VLAN Distribution = "Domain Wide".
Allocated case
This procedure applies when the operator requires an existing B-VID in Allocated or
Partially Implemented state (in any case, no provisioning is performed) to be
Domain-Wide distributed.
This operation causes the B-VID to be associated to all the Rings and TLs of the Domain,
as if it was created with VLAN Distribution = "Domain Wide" and then immediately
allocated.
This operation could also be seen as an equivalent of a series of ring association
(allocated case) and transport link association (allocated case) in order to associate all TLs
and Rings (only one Ring per Bundle) not associated to the B-VID.
Implemented case
This procedure applies when the operator requires an existing B-VID in Implemented
state to be Domain-Wide distributed.
This operation causes the B-VID to be associated to all the Rings and TLs of the Domain,
as if it was been created with VLAN Distribution = "Domain Wide" and then immediately
allocated and implemented.
This operation could also be seen as an equivalent of a series of ring association
(implemented case) and transport link association (implemented case) in order to
associate all TLs and Rings (only one Ring per Bundle) not associated to the B-VID.
As a result of this operation the B-VID can be either in Implemented (if each TL/Ring
association either failed completely or succeeded) or Partially Implemented (if at least
one TL/Ring association failed half-way) and can be associated to all Rings and TLs of
the Domains or not (in case at least one TL/Ring associated failed completely).
In case of unsuccessful operation the operator is informed of which TLs/Rings where not
associated properly or not associated at all.

....................................................................................................................................................................................................................................
1350 OMS 20-93
8DG42227DAAA 9.6
Issue 3 December 2012
Provider Backbone Bridge Network Management Domain Wide VID distribution
B-VID Management
....................................................................................................................................................................................................................................
Before you begin
The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.

Task
From the MS-GUI Main view:
...................................................................................................................................................................................................

1 Select the path Search > Packet > Services > Connection Less (Bridge) > B-VIDs.
...................................................................................................................................................................................................

2 Select the object in the list.


...................................................................................................................................................................................................

3 Select the path Action > B-VIDs > Distribute VID domain-wide.
Result: VLAN ID is distributed in the domain.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
20-94 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Provider Backbone Bridge Network Management Ring Association to a B-VID
B-VID Management
....................................................................................................................................................................................................................................

Ring Association to a B-VID


When to use
The function associates a Ring and an ERP instance to a B-VID.

Related Information
This function applies to any provisioning state.
Defined case
To add a Ring to a B-VID, the operator must specify:
• the B-VID
• the Ring
• an ERP instance on that Ring
For a Ring to be associated to a B-VID, the following must be true:
• no other Ring of the same Bundle is already associated to the B-VID (a Ring can't be
associated to a B-VID if another Ring of the same Bundle is already associated to it:
only one ring per bundle can be associate to a B-VID)
• B-VID and Ring must belong to the same Domain
• B-VID and Ring must not be already associated
If all checks are ok the B-VID is associated to the specified Ring and ERP instance.
Allocated case
This is almost the same case of ring association defined case, in addition the allocation of
the B-VID - Ring association is performed:
• allocation on DB of the VLAN Distribution information (for each NE involved, the
two involved Ports are associated to the B-VID)
• allocation on DB of the I-SID Distribution information, for each allocated EVC that is
supported by the B-VID:
– in case the EVC is not under OAM: the I-SID must be distributed in all the NEs,
of the newly associated ring, that contain at least one EVC Termination
– in case the EVC is under OAM: the I-SID must be distributed in all the NEs of the
newly associated ring.
This case applies both to allocated and partially implemented B-VIDs (in any case, no
provisioning is performed).
Implemented case
This is almost the same case of ring association in allocated case, in addition part of the
implementation of the B-VID and of all the implemented EVCs that the former supports
is performed:
• for each NE of the Ring in which the B-VID instance has not yet been provisioned:
creation of the B-VID instance and of the associations B-VID - Port
• for each NE of the Ring in which the B-VID instance already exists: modification of
the member set of the B-VID instance to include the two ports of the Ring for that NE
....................................................................................................................................................................................................................................
1350 OMS 20-95
8DG42227DAAA 9.6
Issue 3 December 2012
Provider Backbone Bridge Network Management Ring Association to a B-VID
B-VID Management
....................................................................................................................................................................................................................................
• request to ERP BB to provision the association between the B-VID and the specified
ERP (only in case of per-VLAN ERP);
• for each EVC supported by the B-VID:
– for each implemented EVC Termination residing on a NE crossed by the Ring:
provisioning of the association Port - B-VID - I-SID, that can either mean creation
of a row in opticsIMPbbInstanceTable (if the row did not existed) or modification
of a row in opticsIMPbbInstanceTable (if the row did existed)
– if the EVC is implemented and under OAM: the I-SID of the EVC has to be
provisioned also in all the NEs of the newly added ring that do not contain an
implemented EVC Termination.

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.

Task
From the MS-GUI Main view:
...................................................................................................................................................................................................

1 Select the path Search > Packet > Services > Connection Less (Bridge) > B-VIDs.
...................................................................................................................................................................................................

2 Select the object in the list.


...................................................................................................................................................................................................

3 Select the path Action > B-VIDs > Associate/Disassociate Ring.


...................................................................................................................................................................................................

4 In the Associate/Dissociate window:


• Select Select Operation (Associate).
• Select B-VID from list.
• Select Erp Ring from list.
• Select Erp Instance from list.
...................................................................................................................................................................................................

5 Click Ok.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
20-96 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Provider Backbone Bridge Network Management Ring Dissociation from B-VID
B-VID Management
....................................................................................................................................................................................................................................

Ring Dissociation from B-VID


When to use
The function dissociates a Ring from a B-VID.

Related Information
This function applies to any provisioning state.
Defined case
The operator specifies the B-VID and the Ring.
B-VID and Ring must be associated.
PKT dissociates the B-VID and the Ring (together with the associated ERP instance).
Allocated case
This is almost the same case of ring dissociation (defined case); in addition, before the
removal of the B-VID - Ring association, its de-allocation is performed:
• de-allocation of the I-SID Distribution information, for each allocated EVC supported
by the B-VID in all the NEs that will no longer belong to the B-VID once the ring is
removed
• de-allocation of the VLAN Distribution information (for each NE involved, the two
involved Ports are dissociated from the B-VID).
In no case a ring can be dissociated from a B-VID if this action leaves an EVC of the
B-VID with an EVC Termination on a NE that is no more used by the B-VID.
In other words: if an EVC Termination belonging to the involved B-VID, is on one of the
NEs of the ring, and, on that NE, there are no other Transport Links or rings associated to
the involved B-VID, the latter can't be dissociated from the ring.
Implemented case
This is almost the same case of ring dissociation (allocated case), in addition, before the
de-allocation of the B-VID - Ring association, its de-implementation and the
de-implementation of the involved part of implemented and partially implemented EVCs
supported by that B-VID is performed:
• for each EVC supported by the B-VID:
– for each implemented or partially implemented EVC Termination residing on a
NE crossed by the Ring: un-provisioning of the association Port - B-VID - I-SID,
that means modification of a row in opticsIMPbbInstanceTable
– if the EVC is implemented or partially implemented, removal of all the I-SID
instances in all the NEs that will no longer belong to the B-VID once the ring is
removed (that means deletion of a row in opticsIMPbbInstanceTable). This also
covers the case of EVC under OAM
• un-provision the association between the B-VID and the associated ERP on that Ring
(only in case of per-VLAN ERP)

....................................................................................................................................................................................................................................
1350 OMS 20-97
8DG42227DAAA 9.6
Issue 3 December 2012
Provider Backbone Bridge Network Management Ring Dissociation from B-VID
B-VID Management
....................................................................................................................................................................................................................................
• for each NE of the Ring in which there are no other NNIs not belonging to the Ring
but associated to the B-VID instance: deletion of the B-VID instance and of the
associations B-VID - Port
• for each NE of the Ring in which there's at least another NNI not belonging to the
Ring but associated to the B-VID instance: modification of the member set of the
B-VID instance to remove the two ports of the Ring for that NE
This case applies both implemented and partially implemented B-VIDs.

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.

Task
From the MS-GUI Main view:
...................................................................................................................................................................................................

1 Select the path Search > Packet > Services > Connection Less (Bridge) > B-VIDs.
...................................................................................................................................................................................................

2 Select the object in the list.


...................................................................................................................................................................................................

3 Select the path Action > B-VIDs > Associate/Disassociate Ring.


...................................................................................................................................................................................................

4 In the Associate/Dissociate window:


• Select Select Operation (Dissociate).
• Select B-VID from list.
• Select Erp Ring from list.
• Select Erp Instance from list.
...................................................................................................................................................................................................

5 Click Ok.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
20-98 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Provider Backbone Bridge Network Management Change ERP of a B-VID
B-VID Management
....................................................................................................................................................................................................................................

Change ERP of a B-VID


When to use
The function moves a defined B-VID from a ring of a bundle to another ring of the same
bundle.

Related Information
This function applies to any provisioning state.
The operator specifies:
• the B-VID
• the associated Ring
• the Ring to be associated
The system checks that:
• the B-VID and the first Ring are associated
• the two Rings belong to the same Ring Bundle
This procedure is functionally equivalent to a Ring dissociation followed by a Ring
association.

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.

Task
From the MS-GUI Main view:
...................................................................................................................................................................................................

1 Select the path Search > Packet > Services > Connection Less (Bridge) > B-VIDs.
...................................................................................................................................................................................................

2 Select the object in the list.


...................................................................................................................................................................................................

3 Select the path Action > B-VIDs > Change ERP instance.
...................................................................................................................................................................................................

4 In the Change ERP window:


• Select B-VID from list.
• Select Erp Ring from list.
• Select Erp Instance from list.
....................................................................................................................................................................................................................................
1350 OMS 20-99
8DG42227DAAA 9.6
Issue 3 December 2012
Provider Backbone Bridge Network Management Change ERP of a B-VID
B-VID Management
....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

5 Click Ok.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
20-100 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Provider Backbone Bridge Network Management List ERP instances of a B-VID
B-VID Management
....................................................................................................................................................................................................................................

List ERP instances of a B-VID


When to use
The function lists all the ERP instances belonging to a B-VID.

Related Information
For information about ERP , see: “Ethernet Ring Protocol (ERP)” (p. 20-10).

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.

Task
From the MS-GUI Main view:
...................................................................................................................................................................................................

1 Select the path Search > Packet > Services > Connection Less (Bridge) > B-VIDs.
...................................................................................................................................................................................................

2 Select the object in the list.


...................................................................................................................................................................................................

3 Select the path Action > B-VIDs > List ERP instances from B-VID.
Result: The list window is displayed.
See the following topic in this document: “Description of the list of ERP” (p. 20-109).
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS 20-101
8DG42227DAAA 9.6
Issue 3 December 2012
Provider Backbone Bridge Network Management Association of Transport Link to B-VID
B-VID Management
....................................................................................................................................................................................................................................

Association of Transport Link to B-VID


When to use
The function adds a Transport Link to a B-VID.

Related Information
This function applies to any provisioning state.
Defined case
The operator specifies:
• the B-VID
• the Transport Link
For a Transport Link to be associated to a B-VID, the following must be true:
• the TL must not belong to a Ring
• B-VID and TL must belong to the same Domain
• B-VID and TL must not be already associated
If all checks are ok the B-VID is associated to the specified Transport Link.
Allocated case
This is almost the same case of transport link association (defined case), in addition:
• the allocation of the B-VID - TL association is performed: allocation on DB of the
VLAN Distribution information (the two involved Ports of the TL are associated to
the B-VID)
• the allocation on DB of the I-SID Distribution information is performed for each
allocated EVC that is supported by the B-VID:
– in case the EVC is not under OAM: the I-SID must be distributed at each
extremity of the TL that contain at least one EVC Termination
– in case the EVC is under OAM: the I-SID must be distributed at each extremity of
the TL
This case applies both to allocated and partially implemented B-VIDs (in any case, no
provisioning is performed).
Implemented case
This is almost the same case of transport link association (allocated case), in addition part
of the implementation of the B-VID and of all the implemented EVCs that the former
supports is performed:
• for each NE at the extremities of the TL in which the B-VID instance has not yet been
provisioned: creation of the B-VID instance and of the associations B-VID - Port
• for each NE at the extremities of the TL in which the B-VID instance already exists:
modification of the member set of the B-VID instance to include the extremity of the
TL in that NE;

....................................................................................................................................................................................................................................
20-102 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Provider Backbone Bridge Network Management Association of Transport Link to B-VID
B-VID Management
....................................................................................................................................................................................................................................
• for each EVC supported by the B-VID:
– for each implemented EVC Termination residing on a NE at the extremities of the
TL: provisioning of the association Port - B-VID - I-SID, that can either mean
creation of a row in opticsIMPbbInstanceTable (if the row did not existed) or
modification of a row in opticsIMPbbInstanceTable (if the row did existed)
– if the EVC is implemented and under OAM: the I-SID of the EVC has to be
provisioned also in all the NEs at the extremities of the TL that do not contain an
implemented EVC Termination.

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.

Task
From the MS-GUI Main view:
...................................................................................................................................................................................................

1 Select the path Search > Packet > Services > Connection Less (Bridge) > B-VIDs.
...................................................................................................................................................................................................

2 Select the object in the list.


...................................................................................................................................................................................................

3 Select the path Action > B-VIDs > Associate/Disassociate Transport Link.
...................................................................................................................................................................................................

4 In the Associate/Dissociate window:


• Select Select Operation (Associate, Dissociate)
• Select B-VID from list
• Select Transport Link from list
...................................................................................................................................................................................................

5 Click Ok.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS 20-103
8DG42227DAAA 9.6
Issue 3 December 2012
Provider Backbone Bridge Network Management Dissociation of Transport Link to B-VID
B-VID Management
....................................................................................................................................................................................................................................

Dissociation of Transport Link to B-VID


When to use
The function removes a Transport Link from a B-VID.

Related Information
This function applies to any provisioning state.
Defined case
The operator specifies:
• the B-VID
• the Transport Link
For a Transport Link to be dissociated from a B-VID, the following must be true:
• the TL must not belong to a Ring
• B-VID and TL must be associated
If all checks are ok the B-VID is dissociated to the specified Transport Link.
Allocated case
This is almost the same case of transport link dissociation (defined case), in addition,
before the B-VID - TL association is removed, its de-allocation is performed:
• de-allocation on DB of the I-SID Distribution information, for each allocated EVC
supported by the B-VID in all the NEs that will no longer belong to the B-VID once
the TL is removed
• de-allocation on DB of the VLAN Distribution information (for each NE involved,
the involved Port is dissociated from the B-VID).
In no case a TL can be dissociated from a B-VID if this action leaves an EVC of the
B-VID with an EVC Termination on a NE that is no more used by the B-VID.
In other words: if an EVC Termination ,of an EVC belonging to the involved B-VID, is
on one of the NEs at the extremity of the TL, and, on that NE, there are no other
Transport Links or rings associated to the involved B-VID, the latter can't be dissociated
from the Transport Link.

....................................................................................................................................................................................................................................
20-104 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Provider Backbone Bridge Network Management Dissociation of Transport Link to B-VID
B-VID Management
....................................................................................................................................................................................................................................
Implemented case
This is almost the same case of transport link dissociation (allocated case), in addition,
before the B-VID - TL association is de-allocated, part of the de-implementation of the
B-VID and of all the implemented or partially implemented EVCs that the former
supports is performed:
• for each EVC supported by the B-VID:
– for each implemented or partially implemented EVC Termination residing on a
NE at the extremities of the TL: un-provisioning of the association Port - B-VID -
I-SID, that means modification of a row in opticsIMPbbInstanceTable
– if the EVC is implemented or partially implemented, removal of all the I-SID
instances in all the NEs that will no longer belong to the B-VID once the TL is
removed (that means deletion of a row in opticsIMPbbInstanceTable). This also
covers the case of EVC under OAM.
• for each NE at the extremities of the TL in which there are no other NNIs associated
to the B-VID instance: deletion of the B-VID instance and of the associations B-VID -
Port
• for each NE at the extremities of the TL in which there's at least another NNI
associated to the B-VID instance: modification of the member set of the B-VID
instance to remove the port of the TL for that NE.
This case applies both implemented and partially implemented B-VIDs.

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.

Task
From the MS-GUI Main view:
...................................................................................................................................................................................................

1 Select the path Search > Packet > Services > Connection Less (Bridge) > B-VIDs.
...................................................................................................................................................................................................

2 Select the object in the list.


...................................................................................................................................................................................................

3 Select the path Action > B-VIDs > Associate/Disassociate Transport Link.

....................................................................................................................................................................................................................................
1350 OMS 20-105
8DG42227DAAA 9.6
Issue 3 December 2012
Provider Backbone Bridge Network Management Dissociation of Transport Link to B-VID
B-VID Management
....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

4 In the Associate/Dissociate window:


• Select Select Operation (Associate, Dissociate)
• Select B-VID from list
• Select Transport Link from list
...................................................................................................................................................................................................

5 Click Ok.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
20-106 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Provider Backbone Bridge Network Management Overview
Ethernet Ring Protection (ERP) Management
....................................................................................................................................................................................................................................

Ethernet Ring Protection (ERP) Management

Overview
Purpose
This document describes the functionality needed to manage ITU-T G.8032 Ethernet
Ring Protection v2 (ERP) protocol inside 1350 OMS PKT product.

Contents

View the ERP ring list 20-108


Description of the list of ERP 20-109
Create/delete ERP Ring 20-110
Implement/deimplement the ERP 20-112
ERP Switch Command 20-113
ERP Switch Command From Port 20-114
Add/remove Transport Link in a Ring 20-115
Add/remove Node in a Ring 20-116
Create/delete ERP Ring bundle 20-117
Add/remove ERP Ring in a bundle 20-118

....................................................................................................................................................................................................................................
1350 OMS 20-107
8DG42227DAAA 9.6
Issue 3 December 2012
Provider Backbone Bridge Network Management View the ERP ring list
Ethernet Ring Protection (ERP) Management
....................................................................................................................................................................................................................................

View the ERP ring list


When to use
The ERP List window presents all the rings and their attributes.

Related Information
For information about ERP , see: “Ethernet Ring Protocol (ERP)” (p. 20-10).

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.

Task
From the MS-GUI Main view:
...................................................................................................................................................................................................

1 Select Search > Packet.


Result: The menu of the Packet is shown.
...................................................................................................................................................................................................

2 Select ERP > Rings.


Result: The list window is displayed.
See the following topic in this document: “Description of the list of ERP” (p. 20-109).
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
20-108 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Provider Backbone Bridge Network Management Description of the list of ERP
Ethernet Ring Protection (ERP) Management
....................................................................................................................................................................................................................................

Description of the list of ERP


Attributes of a Ring
The attributes displayed for each Ring are:
• User Label.
• Ring Type (Major, Sub-ring).
• Closure (Closed, Open).
• Provisioning State (Defined, Allocated, Implemented).
• Def.Time.
• Working State (Normal).
• Last Operation (None, Allocation, Deallocation, Implementation,
Deimplementation).
• Availability Status. (Normal).

....................................................................................................................................................................................................................................
1350 OMS 20-109
8DG42227DAAA 9.6
Issue 3 December 2012
Provider Backbone Bridge Network Management Create/delete ERP Ring
Ethernet Ring Protection (ERP) Management
....................................................................................................................................................................................................................................

Create/delete ERP Ring


When to use
The function creates ERP Rings.

Related Information
Ring Types:
• A major ring is a ring that is self-containing, i.e. it has no need to use tunneling of
R-APS through other rings.
• A sub-ring is a ring that is closed by a “tunnel connectivity” provided by other rings
(either major rings or sub-ring).
A Ring can be created from:
• Links list
• Topological view
• Common Map
A ring can be done by transport link of one only domain.
It is possible that the links assigned to a ring are not implementing a closed ring: in this
case a warning should be raised to operator.
For PKT 9.3 only PBB domains are foreseen.
More then one major ring per domain is allowed.
A physical ring can be created also if the transport link is already used by traffic.
A physical ring can be deleted only when it is not-implemented. No check is done respect
to the usage of the links for traffic.

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.

Task
From the MS-GUI Main view:
...................................................................................................................................................................................................

1 Select Action > Packet > ERP > Create ERP Ring.

....................................................................................................................................................................................................................................
20-110 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Provider Backbone Bridge Network Management Create/delete ERP Ring
Ethernet Ring Protection (ERP) Management
....................................................................................................................................................................................................................................
Result: The creation window is shown.
...................................................................................................................................................................................................

2 Enter:
• Enter the User Label
• Select the Ring Type. (Major, Sub)
• Select the Activation Status
• Select the PBB Domain from list
• Select the Transport Linksfrom list
...................................................................................................................................................................................................

3 Click OK
Result: The ring is created
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS 20-111
8DG42227DAAA 9.6
Issue 3 December 2012
Provider Backbone Bridge Network Management Implement/deimplement the ERP
Ethernet Ring Protection (ERP) Management
....................................................................................................................................................................................................................................

Implement/deimplement the ERP


When to use
The function implements major ring or sub-ring.

Related Information
For information about ERP , see: “Ethernet Ring Protocol (ERP)” (p. 20-10).
A physical ring can be deimplemented only if no ERP instances are active on it. No check
is done respect to the usage of the links for traffic.

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.

Task
From the MS-GUI Main view:
...................................................................................................................................................................................................

1 Select Search > Packet > ERP > Rings.


Result: The list is shown.
...................................................................................................................................................................................................

2 Select the ring and select Implement or Deimplement.


...................................................................................................................................................................................................

3 Select one of the options in the confirmation box. Refer to the procedure “Confirm the
action” (p. 11-40).
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
20-112 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Provider Backbone Bridge Network Management ERP Switch Command
Ethernet Ring Protection (ERP) Management
....................................................................................................................................................................................................................................

ERP Switch Command


When to use
The function set ERP Switch Command.

Related Information
For information about ERP , see: “Ethernet Ring Protocol (ERP)” (p. 20-10).

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.

Task
From the MS-GUI Main view:
...................................................................................................................................................................................................

1 Select the menu item:


• Search > Packet > ERP > Rings
• Search > Packet > ERP > ERP Instances
Result: The list window is shown.
...................................................................................................................................................................................................

2 Select an item in the list and select Action > ERP Switch Command.
...................................................................................................................................................................................................

3 Select the following attributes:


• Select ERP Ring from list.
• Select ERP Instance from list.
• Select Target node of command from list.
• Select Adjacent node from list.
• Select Operator Command (Clear, Manual Switch, Force Switch).
• Select or unselect Force without Check ring status.
...................................................................................................................................................................................................

4 Click OK
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS 20-113
8DG42227DAAA 9.6
Issue 3 December 2012
Provider Backbone Bridge Network Management ERP Switch Command From Port
Ethernet Ring Protection (ERP) Management
....................................................................................................................................................................................................................................

ERP Switch Command From Port


When to use
The function set ERP Switch Command from ERP Port.

Related Information
For information about ERP , see: “Ethernet Ring Protocol (ERP)” (p. 20-10).

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.

Task
From the MS-GUI Main view:
...................................................................................................................................................................................................

1 Select the menu item:


• Search > Packet > ERP > ERP Instances
Result: The list window is shown.
...................................................................................................................................................................................................

2 Select an item in the list and select Search > ERP Port Inst on NE.
Result: The Port list window is shown.
...................................................................................................................................................................................................

3 Right Click the mouse and select the menu item:


• Action > Clear
• Action > Manual Switch
• Action > Force Switch

E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
20-114 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Provider Backbone Bridge Network Management Add/remove Transport Link in a Ring
Ethernet Ring Protection (ERP) Management
....................................................................................................................................................................................................................................

Add/remove Transport Link in a Ring


When to use
The function add a Transport Link in major ring or sub-ring.

Related Information
For information about ERP , see: “Ethernet Ring Protocol (ERP)” (p. 20-10)
The function applies to both defined or implemented ring.

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.

Task
From the MS-GUI Main view:
...................................................................................................................................................................................................

1 Select Search > Packet > ERP > Rings.


Result: The list is shown.
...................................................................................................................................................................................................

2 Select the ring and select Add link.


E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS 20-115
8DG42227DAAA 9.6
Issue 3 December 2012
Provider Backbone Bridge Network Management Add/remove Node in a Ring
Ethernet Ring Protection (ERP) Management
....................................................................................................................................................................................................................................

Add/remove Node in a Ring


When to use
The function add a Node in major ring or sub-ring.

Related Information
For information about ERP , see: “Ethernet Ring Protocol (ERP)” (p. 20-10).
The function applies to both defined or implemented ring.

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.

Task
From the MS-GUI Main view:
...................................................................................................................................................................................................

1 Select Search > Packet > ERP > Rings.


Result: The list is shown.
...................................................................................................................................................................................................

2 Select the ring and select Add Node.


E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
20-116 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Provider Backbone Bridge Network Management Create/delete ERP Ring bundle
Ethernet Ring Protection (ERP) Management
....................................................................................................................................................................................................................................

Create/delete ERP Ring bundle


When to use
The function creates ERP Rings bundle.

Related Information
When more rings are present on a given set of NEs, it is necessary to define the “stacked
ring bundle” (bundle).
Bundle can be composed by major rings or sub-rings (no mix of major and sub ring is
possible).
PKT automatically creates a bundle of rings as soon as two rings are created on the same
set of NEs. Name of the bundle is assigned by default to “Bundle x” where x is a number
that univocally identifies the bundle.

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.

Task
From the MS-GUI Main view:
...................................................................................................................................................................................................

1 Select Action > Packet > ERP > Create ERP Ring bundle.
Result: The creation window is shown.
...................................................................................................................................................................................................

2 Enter:
• Enter the Bundle name
• Select the ERP Rings
...................................................................................................................................................................................................

3 Click OK
Result: The bundle is created
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS 20-117
8DG42227DAAA 9.6
Issue 3 December 2012
Provider Backbone Bridge Network Management Add/remove ERP Ring in a bundle
Ethernet Ring Protection (ERP) Management
....................................................................................................................................................................................................................................

Add/remove ERP Ring in a bundle


When to use
The function adds/remove ERP Ring in a bundle.

Related Information
Operator can add a new ring to a bundle, given that:
• Ring is on the same set of NEs of already grouped ring(s)
• Ring is of the same type (major/sub) of already grouped rings (this condition is
automatically verified if the previous condition is true, but can be useful to filter the
list of rings to be proposed to operator)
• VLANs registered on the ring cannot be assigned to ring already grouped in the
bundle.

Removal of a ring from a bundle is always possible: operator has to take care of avoiding
registering VLAN on the ring after the removal: PKT cannot perform consistency checks
to avoid traffic loop.
PKT automatically add a ring to an existing bundle created on the same set of NEs.
PKT automatically remove a ring from an existing bundle when ring is deleted. This is
true independently from the way the ring has been assigned to the bundle (i.e. either
manually or automatically).

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.

Task
From the MS-GUI Main view:
...................................................................................................................................................................................................

1 Select Search > Packet > ERP > ERP Ring bundle.
Result: The creation window is shown.
...................................................................................................................................................................................................

2 Select the Bundle name


Select the Action > ERP Bundle > Add Ring
...................................................................................................................................................................................................

3 Click OK
....................................................................................................................................................................................................................................
20-118 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Provider Backbone Bridge Network Management Add/remove ERP Ring in a bundle
Ethernet Ring Protection (ERP) Management
....................................................................................................................................................................................................................................
Result: The ring is added.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS 20-119
8DG42227DAAA 9.6
Issue 3 December 2012
Provider Backbone Bridge Network Management Overview
ERP Instance Management
....................................................................................................................................................................................................................................

ERP Instance Management

Overview
Purpose
This document describes how to manage ITU-T G.8032 Ethernet Ring Protection v2
(ERP) instances inside 1350 OMS PKT product.

Contents

View the ERP instance list 20-121


Description of the list of ERP instances 20-122
Create/delete ERP instance 20-123
Implement/deimplement the ERP instance 20-125
Associate OAM to the ERP instance 20-126
Get a graphical view of the ERP instance 20-127
Modify Defined ERP instance 20-129
Modify implemented ERP instance 20-131

....................................................................................................................................................................................................................................
20-120 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Provider Backbone Bridge Network Management View the ERP instance list
ERP Instance Management
....................................................................................................................................................................................................................................

View the ERP instance list


When to use
The ERP Instance List window presents all the rings and their attributes.

Related Information
For information about ERP , see: “Ethernet Ring Protocol (ERP)” (p. 20-10).

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.

Task
From the MS-GUI Main view:
...................................................................................................................................................................................................

1 Select Search > Packet.


Result: The menu of the Packet is shown.
...................................................................................................................................................................................................

2 Select ERP > ERP intances.


Result: The list window is displayed.
See the following topic in this document: “Description of the list of ERP instances”
(p. 20-122).
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS 20-121
8DG42227DAAA 9.6
Issue 3 December 2012
Provider Backbone Bridge Network Management Description of the list of ERP instances
ERP Instance Management
....................................................................................................................................................................................................................................

Description of the list of ERP instances


Attributes of an ERP instances
The attributes displayed for each ERP instance are:
• User Label.
• ERP Scope (Per Port, Per VLAN).
• VLAN Id. VLAN used to tag R-APS PDU for this ERP instance.
• VLAN Priority. Priority of R-APS PDU for this ERP instance.
• Hold Off Time. Time to wait, after failure detection, before starting ERP protection.
• WTR Time. Wait time to restore (minutes) in case of switch mode is revertive. If
Switch behavior is “revertive” default is 5; If Switch behavior is “not revertive”
default is “not meaningful” and not modifiable.
• Guard Time. During guard time RPL owner discards the received R-APS OAM
frames.
• Switch Behaviour(Revertive, Non Revertive). Behavior of switch following clear of
failure.
• ERP State. (deactivated, idle, protection, manualSwitch, forcedSwitch, pending).
Status of the ERP protection.
• Maintenance Entity Level. Maintenance Entity Level of the ERP instance.
• Switch On Ploc. (False, True). Include/exclude Partial loss of capacity (LAG) alarm
in the list of ERP Switch Criteria
• Switch On Cfm Alarm. (False, True). Include/exclude ETH OAM CFM alarms (AIS,
Loss Of Continuity (LOC), MisMerge (MMG) , UNexpected Mep (UNM),
UNexpected Level (UNL) in the list of ERP Switch Criteria
• Provisioning State (Defined, Allocated, Implemented).
• Ring Userlabel.
• Def.Time.
• Working State (Normal).
• Last Operation (None, Allocation, Deallocation, Implementation,
Deimplementation).
• Switch On Anm. (False, True). Include/exclude auto-negotiation mismatch alarm in
the list of ERP Switch Criteria.
• Comment
• Availability Status. (Normal, Degraded, Failure).

....................................................................................................................................................................................................................................
20-122 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Provider Backbone Bridge Network Management Create/delete ERP instance
ERP Instance Management
....................................................................................................................................................................................................................................

Create/delete ERP instance


When to use
The function creates ERP instances.

Related Information
Definition is always possible. Checks to be done:
• ERP instance user label has to be unique in the system
• R-APS VLAN Id must be inside the bundle of VLAN assigned to ERP for the domain
ERP instance is defined
• R-APS VLAN id must not be used for in-fiber/in-band management channel: this
check could be implicitly passed if management VLAN is not part of bundle of
VLAN reserved for ERP.
• R-APS VLAN Id cannot have already been assigned to other ERP instances on the
same ERP physical ring or by ERP instance on sub-rings that uses the current ring to
close the virtual channel for R-APS
• Just one per-port ERP can be defined on a given physical ring
• If ring Id is different from default it must be unique inside the ERP instances of a
given physical ring.
Deletion of ERP instance is possible only after de-implementation.

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.

Task
From the MS-GUI Main view:
...................................................................................................................................................................................................

1 Select Action > Packet > ERP > Create ERP instances.
Result: The creation window is shown.
...................................................................................................................................................................................................

2 In the General panel:


• Enter the User Label. Unique identifier of ERP instance inside PKT.
• Enter a Comment. (optional)
• Select the Activation Status. Enable/disable implementation of ERP instance.
• Enter theR-APS VLAN Id. VLAN used to tag R-APS PDU for this ERP instance.
• Enter the R-APS PCP. Priority of R-APS PDU for this ERP instance.
....................................................................................................................................................................................................................................
1350 OMS 20-123
8DG42227DAAA 9.6
Issue 3 December 2012
Provider Backbone Bridge Network Management Create/delete ERP instance
ERP Instance Management
....................................................................................................................................................................................................................................
• Enter the Maintenance Entity Level. Maintenance Entity Level of the ERP instance.
• Select the Scope. (Per Port, Per VLAN)
• Select the PBB Domain from list. Domain where ERP instance is defined.
• Select the ERP Ring from list. Ring to be controlled by ERP instance.
• Select the RPL Owner from list. NE having the RPL-owner role.
• Select the RPL from list. Link/Port blocked by the ERP instance in nominal condition.
In the Timers panel:
• Select the Switch Behaviour. (Revertive, Non Revertive). Behavior of switch
following clear of failure.
• Enter theWait Time To Restore (min). Wait time to restore (minutes) in case of
switch mode is revertive. If Switch behavior is “revertive” default is 5; If Switch
behavior is “not revertive” default is “not meaningful” and not modifiable.
• Enter the Hold Off Time (msec). Time to wait, after failure detection, before starting
ERP protection.
• Enter the Guard Time (msec). Range from 10 to 2000 ms, with step of 10 ms. During
guard time RPL owner discards the received R-APS OAM frames.
In the Failures panel select or deselect:
• Auto-Negotiation Mismatch. Include/exclude auto-negotiation mismatch alarm in the
list of ERP Switch Criteria. (Enabled by default).
• Partial loss of capacity. Include/exclude Partial loss of capacity (LAG) alarm in the
list of ERP Switch Criteria.
• Signal Degrade. Include/exclude Signal Degrade alarm in the list of ERP Switch
Criteria.
• ETH OAM CFM Alarms. Include/exclude ETH OAM CFM alarms (AIS, Loss Of
Continuity (LOC), MisMerge (MMG) , UNexpected Mep (UNM), UNexpected Level
(UNL) in the list of ERP Switch Criteria.
• Link OAM Critical link Events. Include/exclude link OAM critical link events alarm
in the list of ERP Switch Criteria
...................................................................................................................................................................................................

3 Click OK
Result: The ring is created
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
20-124 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Provider Backbone Bridge Network Management Implement/deimplement the ERP instance
ERP Instance Management
....................................................................................................................................................................................................................................

Implement/deimplement the ERP instance


When to use
The function implements ERP instance.

Related Information
For information about ERP , see: “Ethernet Ring Protocol (ERP)” (p. 20-10)

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.

Task
From the MS-GUI Main view:
...................................................................................................................................................................................................

1 Select Search > Packet > ERP > ERP Instances.


Result: The list is shown.
...................................................................................................................................................................................................

2 Select the ring and select Implement.


E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS 20-125
8DG42227DAAA 9.6
Issue 3 December 2012
Provider Backbone Bridge Network Management Associate OAM to the ERP instance
ERP Instance Management
....................................................................................................................................................................................................................................

Associate OAM to the ERP instance


When to use
The function associates OAM to ERP instance.

Related Information
For information about ERP , see: “Ethernet Ring Protocol (ERP)” (p. 20-10).

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.

Task
From the MS-GUI Main view:
...................................................................................................................................................................................................

1 Select Search > Packet > ERP > ERP Instances.


Result: The list is shown.
...................................................................................................................................................................................................

2 Select the ERP Instance and select Associate OAM to ERP Instance.
...................................................................................................................................................................................................

3 For each item in the ERP Link List, select the following attributes:
• Select ERP Link from list.
• Select OAM MA from list.
• Click Associate.
...................................................................................................................................................................................................

4 Click OK
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
20-126 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Provider Backbone Bridge Network Management Get a graphical view of the ERP instance
ERP Instance Management
....................................................................................................................................................................................................................................

Get a graphical view of the ERP instance


When to use
The function show a graphical view of the ERP instance.

Related Information
For information about ERP , see: “Ethernet Ring Protocol (ERP)” (p. 20-10).

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.

Task
From the MS-GUI Main view:
...................................................................................................................................................................................................

1 Select Search > Packet > ERP > ERP Instances.


Result: The list is shown.
...................................................................................................................................................................................................

2 Select the ERP Instance and select ERP Graphical View.

....................................................................................................................................................................................................................................
1350 OMS 20-127
8DG42227DAAA 9.6
Issue 3 December 2012
Provider Backbone Bridge Network Management Get a graphical view of the ERP instance
ERP Instance Management
....................................................................................................................................................................................................................................
Result:

Figure 20-58 ERP Graphical View example

E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
20-128 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Provider Backbone Bridge Network Management Modify Defined ERP instance
ERP Instance Management
....................................................................................................................................................................................................................................

Modify Defined ERP instance


When to use
The function permit to modify attributes of a defined ERP instance.

Related Information
In case the Ring or the scope has to be changed it is necessary to delete the ERP instance
and create a new one.
As a particular case the modification of RPL Owner requires to reset the RPL, so operator
has to select RPL again.

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.

Task
From the MS-GUI Main view:
...................................................................................................................................................................................................

1 Select Search > Packet > ERP > ERP instance.


Result: The list is shown.
...................................................................................................................................................................................................

2 Select the object and select Modify.


...................................................................................................................................................................................................

3 In the General panel:


• Enter the User Label. Unique identifier of ERP instance inside PKT.
• Enter a Comment. (optional)
• Select the Activation Status. Enable/disable implementation of ERP instance.
• Enter theR-APS VLAN Id. VLAN used to tag R-APS PDU for this ERP instance.
• Enter the R-APS PCP. Priority of R-APS PDU for this ERP instance.
• Enter the Maintenance Entity Level. Maintenance Entity Level of the ERP instance.
• Select the RPL Owner from list. NE having the RPL-owner role.
• Select the RPL from list. Link/Port blocked by the ERP instance in nominal condition.

....................................................................................................................................................................................................................................
1350 OMS 20-129
8DG42227DAAA 9.6
Issue 3 December 2012
Provider Backbone Bridge Network Management Modify Defined ERP instance
ERP Instance Management
....................................................................................................................................................................................................................................
In the Timers panel:
• Select the Switch Behaviour. (Revertive, Non Revertive). Behavior of switch
following clear of failure.
• Enter theWait Time To Restore (min). Wait time to restore (minutes) in case of
switch mode is revertive. If Switch behavior is “revertive” default is 5; If Switch
behavior is “not revertive” default is “not meaningful” and not modifiable.
• Enter the Hold Off Time (msec). Time to wait, after failure detection, before starting
ERP protection.
• Enter the Guard Time (msec). Range from 10 to 2000 ms, with step of 10 ms. During
guard time RPL owner discards the received R-APS OAM frames.
In the Failures panel select or deselect:
• Auto-Negotiation Mismatch. Include/exclude auto-negotiation mismatch alarm in the
list of ERP Switch Criteria.
• Partial loss of capacity. Include/exclude Partial loss of capacity (LAG) alarm in the
list of ERP Switch Criteria.
• Signal Degrade. Include/exclude Signal Degrade alarm in the list of ERP Switch
Criteria.
• ETH OAM CFM Alarms. Include/exclude ETH OAM CFM alarms (AIS, Loss Of
Continuity (LOC), MisMerge (MMG) , UNexpected Mep (UNM), UNexpected Level
(UNL) in the list of ERP Switch Criteria.
• Link OAM Critical link Events. Include/exclude link OAM critical link events alarm
in the list of ERP Switch Criteria
...................................................................................................................................................................................................

4 Click OK
Result: The ring is created
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
20-130 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Provider Backbone Bridge Network Management Modify implemented ERP instance
ERP Instance Management
....................................................................................................................................................................................................................................

Modify implemented ERP instance


When to use
The function permit to modify attributes of an implemented ERP instance.

Related Information
Attributes that can be modified for an implemented ERP instance are attributes that can be
changed on the NE with no need to deactivate the ERP instance.

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.

Task
From the MS-GUI Main view:
...................................................................................................................................................................................................

1 Select Search > Packet > ERP > ERP instance.


Result: The list is shown.
...................................................................................................................................................................................................

2 Select the object and select Modify.


...................................................................................................................................................................................................

3 In the General panel:


• Enter the User Label. Unique identifier of ERP instance inside PKT.
• Enter a Comment. (optional)
• Select the Activation Status. Enable/disable implementation of ERP instance.
• Enter the R-APS PCP. Priority of R-APS PDU for this ERP instance.
• Select the RPL Owner from list. NE having the RPL-owner role.
• Select the RPL from list. Link/Port blocked by the ERP instance in nominal condition.
In the Timers panel:
• Select the Switch Behaviour. (Revertive, Non Revertive). Behavior of switch
following clear of failure.
• Enter theWait Time To Restore (min). Wait time to restore (minutes) in case of
switch mode is revertive. If Switch behavior is “revertive” default is 5; If Switch
behavior is “not revertive” default is “not meaningful” and not modifiable.

....................................................................................................................................................................................................................................
1350 OMS 20-131
8DG42227DAAA 9.6
Issue 3 December 2012
Provider Backbone Bridge Network Management Modify implemented ERP instance
ERP Instance Management
....................................................................................................................................................................................................................................
• Enter the Hold Off Time (msec). Time to wait, after failure detection, before starting
ERP protection.
• Enter the Guard Time (msec). Range from 10 to 2000 ms, with step of 10 ms. During
guard time RPL owner discards the received R-APS OAM frames.
In the Failures panel select or deselect:
• Auto-Negotiation Mismatch. Include/exclude auto-negotiation mismatch alarm in the
list of ERP Switch Criteria.
• Partial loss of capacity. Include/exclude Partial loss of capacity (LAG) alarm in the
list of ERP Switch Criteria.
• Signal Degrade. Include/exclude Signal Degrade alarm in the list of ERP Switch
Criteria.
• ETH OAM CFM Alarms. Include/exclude ETH OAM CFM alarms (AIS, Loss Of
Continuity (LOC), MisMerge (MMG) , UNexpected Mep (UNM), UNexpected Level
(UNL) in the list of ERP Switch Criteria.
• Link OAM Critical link Events. Include/exclude link OAM critical link events alarm
in the list of ERP Switch Criteria
...................................................................................................................................................................................................

4 Click OK
Result: The ring is created
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
20-132 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Provider Backbone Bridge Network Management Overview
PBB Fault Management
....................................................................................................................................................................................................................................

PBB Fault Management

Overview
Purpose
The Fault Localization allows the user to determine the list of elementary alarms affecting
a managed resource.

Contents

PBB Fault Localization and navigation to AS 20-134

....................................................................................................................................................................................................................................
1350 OMS 20-133
8DG42227DAAA 9.6
Issue 3 December 2012
Provider Backbone Bridge Network Management PBB Fault Localization and navigation to AS
PBB Fault Management
....................................................................................................................................................................................................................................

PBB Fault Localization and navigation to AS


When to use
This function displays information about the fault present on the selected object.

Related Information
The function is available for alarmed objects.
For more information about Fault Localization, see: “Fault Localization” (p. 11-69).

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.

Task
From the MS-GUI Main menu:
...................................................................................................................................................................................................

1 Show the list of the objects. Select one of the following paths:
• Search > Packet > Services > Connection Less (Bridge) > Bridge EVCs. Select
backbone EVCs.
• Search > Packet > Services > Connection Less (Bridge) > B-VIDs
• Search > Packet > ERP > ERP Instances
• Search > Packet > ERP > ERP Rings
...................................................................................................................................................................................................

2 Select an item in the list and select Search > Fault Localization.
Result: The Fault Localization list window is displayed.
See the following topic in this document: “Fault Localization” (p. 11-69).
The list is not refreshed automatically, click Actualize button to refresh it.
...................................................................................................................................................................................................

3 Select an item in the list and click Search > External Navigation to > AS .
Result: The Fault Management window is displayed with the alarm list.
See the following topic in this document: “Description of the list of Alarms”
(p. 19-69)
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
20-134 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Provider Backbone Bridge Network Management Overview about Workflow

....................................................................................................................................................................................................................................

Workflow for PBB Management

Overview about Workflow


Workflow description
The workflow to manage PBB is part of the more general workflow for the Ethernet
Service management.

Transport Link Overwiew


1350OMS does support the provisioning of the infrastructure in term of TDM Links,
WDM and Ethernet cables and (T-)MPLS links.
The infrastructure is used for different supported layer (T-)MPLS or Ethernet.
The infrastructure is named Transport Link.
The Transport Link can be supported by:
• A TDM path. The link is called Link Over TDM. It carries directly Ethernet
Segments, Tunnels or PWs.
• A Tunnel/PW. The link is called Link Over (T-)MPLS. A Link Over TDM or a Link
Over Cable (Martini) carries it.
• An Ethernet cable or a Martini cable. The link is called Link Over Cable.
• A WDM link. The link is called Link Over WDM.

Domain overview
In Connection Less Networks, the Domain represents an homogeneous set of Network
Elements dedicated to MAC, Virtual, Provider or Provider Backbone Bridging.
A Domain infrastructure is made of NE, ENE, Transport Links and Edge Ports managed
together to supply a Connection Less infrastructure.
The user is requested to assign the NE to a specific domain. The NE related resources are
automatically uploaded and associated to it.
The user is requested to assign the Transport Link to a specific domain. The NE related
resources are automatically uploaded and associated to it.
Domain main properties are:
• the Domain Type:
– ETS
– Bridge
– T-MPLS
• the Bridge Type:
– MAC
– Virtual
....................................................................................................................................................................................................................................
1350 OMS 20-135
8DG42227DAAA 9.6
Issue 3 December 2012
Provider Backbone Bridge Network Management Overview about Workflow
Workflow for PBB Management
....................................................................................................................................................................................................................................
– Provider
– Provider backbone Bridge
• the Control Plane type:
– ERP
– STP
– RSTP
– PVSTP
– MSTP
– none
Domain attribute dependencies:
• The list of possible Bridge types depends on the selected Domain type
• The list of possible Control protocols depends on the selected Bridge type
• In case of PBB the only possible choice for Control Protocol is ERP

....................................................................................................................................................................................................................................
20-136 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Provider Backbone Bridge Network Management Create a PBB Domain
Workflow for PBB Management
....................................................................................................................................................................................................................................

Create a PBB Domain


When to use
This function allows the user to define a domain in the managed network.

Related Information
For information, see: “Overview about Workflow ” (p. 20-135).

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.

Task
From the MS-GUI Main view:
...................................................................................................................................................................................................

1 Follow the path Action > Packet > Construction > Create Domain.
...................................................................................................................................................................................................

2 On the Create Window.


To create a customer:
• Enter a User Label.
• Enter a Domain Type: Bridge.
• Enter an Bridge Type: PBB.
• Enter a Control Protocol Type: ERP.
...................................................................................................................................................................................................

3 Click Ok.
Result: The domain is created.
The Domain list is updated.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS 20-137
8DG42227DAAA 9.6
Issue 3 December 2012
Provider Backbone Bridge Network Management Add NE to a Domain
Workflow for PBB Management
....................................................................................................................................................................................................................................

Add NE to a Domain
When to use
The user assign a NE to a domain.

Related Information
It is possible to assign a group of NE in a single operation. See Action > Packet >
Construction > Assign Resources to Domain
For information, see: “Overview about Workflow ” (p. 20-135).

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.

Task
From the MS-GUI Main view:
...................................................................................................................................................................................................

1 Follow the path Search > Packet > Construction > Network Elements > Defined NEs.
...................................................................................................................................................................................................

2 Select the NE in the list.


...................................................................................................................................................................................................

3 Follow the path Action > Network Element > Assign Network Element to Domain.
Result: The assign window is displayed.
...................................................................................................................................................................................................

4 Click the Bridge Domain field.


Result: The list of available bridge domain is displayed.
...................................................................................................................................................................................................

5 Select the PBB domain and Click the check sign to confirm it.
...................................................................................................................................................................................................

6 Click Ok.
Result: The NE is assigned to the Domain previously created.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
20-138 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Provider Backbone Bridge Network Management Add Transport Link to a Domain
Workflow for PBB Management
....................................................................................................................................................................................................................................

Add Transport Link to a Domain


When to use
The user assign a Transport Link to a domain.

Related Information
It is possible to assign a group of Transport Link in a single operation. See also Action >
Packet > Construction > Assign Resources to Domain
When the user assigns Transport Links, the related NE are automatically uploaded and
associated to the domain.
For information, see: “Overview about Workflow ” (p. 20-135).

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.

Task
From the MS-GUI Main view:
...................................................................................................................................................................................................

1 Follow the path Search > Packet > Construction > Transport Link.
...................................................................................................................................................................................................

2 Select the object in the list.


...................................................................................................................................................................................................

3 Follow the path Action >Transport Link> Assign Transport Link to Domain.
Result: The assign window is displayed.
...................................................................................................................................................................................................

4 Click the Bridge Domain field.


Result: The list of available bridge domain is displayed.
...................................................................................................................................................................................................

5 Select the PBB domain and Click the check sign to confirm it.
...................................................................................................................................................................................................

6 Click Ok.

....................................................................................................................................................................................................................................
1350 OMS 20-139
8DG42227DAAA 9.6
Issue 3 December 2012
Provider Backbone Bridge Network Management Add Transport Link to a Domain
Workflow for PBB Management
....................................................................................................................................................................................................................................
Result: The NE is assigned to the Domain previously created.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
20-140 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Provider Backbone Bridge Network Management ERP provisioning
Workflow for PBB Management
....................................................................................................................................................................................................................................

ERP provisioning
When to use
The function defines an ERP instance.

Related Information
For information, see: “Ethernet Ring Protocol (ERP)” (p. 20-10).

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.

Task
From the MS-GUI Main view:
...................................................................................................................................................................................................

1 Follow the path Action > ... > Create ERP.


...................................................................................................................................................................................................

2 Provisioning of ERP INSTANCE properties in the General tab:


• ERP instance User label.
• comment.
• Activation status [active/not active] (used to enable/disable the ERP protocol).
• RING VLAN Tag (used to tag R-APS OAM protocol frames):
– R-APS VLAN ID [1..4093] (unique per ring or group of interconnected rings).
– R-APS PCP [0..7] (priority bits value for R-APS).
• Maintenance Entity Level [0..7] (OAM level assigned to R-APS).
• Scope of ERP instance [port/VLAN].
• RPL Owner (NE that has the master role on ERP instance).
• RPL (East/west link that is Blocked by RPL owner in nominal conditions).
...................................................................................................................................................................................................

3 Provide the Protocol Tuning in the Detail tab:


• Switch behavior [Revertive/Not Revertive].
• Wait Time to Restore [0..12 Minutes,steps of 1].
• Hold-Off time [0..1000 millisec, steps of 10].
• Guard Time [10..2000 millisec, steps of 10].

....................................................................................................................................................................................................................................
1350 OMS 20-141
8DG42227DAAA 9.6
Issue 3 December 2012
Provider Backbone Bridge Network Management ERP provisioning
Workflow for PBB Management
....................................................................................................................................................................................................................................
• Optional Alarms that can be included/excluded in the list of Switch Criteria:
– Signal Degrade.
– Partial Loss of Capacity (if ring ports are LAG).
– Loss Of Continuity (CCM) defect.
– Link OAM Critical Events.
• Ring Port.
• MEP.
Note: If Loss of Continuity defect or Link OAM Critical Events are used as Switch
Criteria it is necessary to assign Down MEPs to Ring Ports (on all the NEs inside the
ring).
...................................................................................................................................................................................................

4 Click Ok.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
20-142 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Provider Backbone Bridge Network Management Configure B-VID
Workflow for PBB Management
....................................................................................................................................................................................................................................

Configure B-VID
When to use
The function allows to define a B-VID in a PBB domain and to associate it to the ERP
instance.

Related Information
For information, see: “Ethernet Ring Protocol (ERP)” (p. 20-10).

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.

Task
From the MS-GUI Main view:
...................................................................................................................................................................................................

1 Follow the path Action > Packet > ... > Configure B_VID.
Result: The configuration window is displayed.
...................................................................................................................................................................................................

2 Insert the following information:


• B-VID [1..4094]: service group identifier, unique network wide.
• B-VID distribution:
– Network-wide: B-VID is distributed on all the NEs in the PBB domain.
– Crossed rings: B-VID is distributed on all the NEs of rings selected by user.
• ERP instance, used to protect B-VID, is assigned for each crossed ring.
...................................................................................................................................................................................................

3 Click OK.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS 20-143
8DG42227DAAA 9.6
Issue 3 December 2012
Provider Backbone Bridge Network Management Create a PBB EVC
Workflow for PBB Management
....................................................................................................................................................................................................................................

Create a PBB EVC


When to use
This function consists in creating a PBB Ethernet Virtual Connection.

Related Information
For information about PBB EVC, see: “PBB Ethernet Virtual Connection” (p. 20-7).

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.

Task
From the Multi Service GUI Main view:
...................................................................................................................................................................................................

1 Follow the path Action > Packet > Services > Connection Less (Bridge) > Create
Bridge EVC.
Result: The creation window is displayed.
...................................................................................................................................................................................................

2 Fill the following data in the Specific panel:


• User label.
• Service Type [EVPL, EPTL, EPL, EPLAN, EVPLAN, HSI, BTV, Broadcast].
• Ethernet Service (optional): it is used to group together EVCs according to a
user-selected criteria.
• Domain (PBB).
• Network Access Domain (optional): Network Access Domain (NAD) can be used to
partition the network into different administrative domains. A possible use is to limit
the user to use only a set the of the network’s resources (NEs, ports, links).
...................................................................................................................................................................................................

3 Fill the following data in the Detail panel:


• I-SID [integer] (identifier of service, unique network wide).
• B-VID [1-4094] (service group identifier, unique network wide).
• Broadcast Domain Containment (Enabled, Disabled)
• Set Standard VLAN type (0x8100) [True, False] (identifier for VLAN tagged frames
at UNI).

....................................................................................................................................................................................................................................
20-144 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Provider Backbone Bridge Network Management Create a PBB EVC
Workflow for PBB Management
....................................................................................................................................................................................................................................
• IGMP Snooping State [Not Meaningful, Enabled, Disabled] (to mark if IGMP
snooping is enabled/disabled on the EVC).
• Configure the Storm Control:
Service frame delivery assumes one of the following values: Deliver
unconditionally, Deliver conditionally, Discard. Fill the following fields:
– Unicast Service Frame Delivery.
– Multicast Service Frame Delivery.
– Broadcast Service Frame Delivery.
If selected values is “Deliver Conditionally” it is possible to specify the Limitation of
rate (per service).
...................................................................................................................................................................................................

4 Select info panel.


• The user can use the fields in the info panel to enter comments or other information.
...................................................................................................................................................................................................

5 Select PM panel.
• Set or unset PM enabled
• Select Granularity (24 h, 15 min)
• Select Involved TPs (All Points)
• Select CSV Reporting (No Report, 24 h, 2 h)
• Select purge Policy (Keep, On stop, On delete)
...................................................................................................................................................................................................

6 Select OAM panel.


• Set OAM Enabled. (Enable, Disable).
The enabling of Eth OAM:
– creates a MA with identifier equal to the EVC user label with “MA_” prefix.
– enables CC with default period of 1 second, no intermediate points (MIP).
• Select Priority.
• Select Maintenance Domain.
...................................................................................................................................................................................................

7 Select Miscellaneous panel.


• Select C-VLAN Preservation.
• Select C-VLAN COS Preservation.
When checked, it ensures that each packet exiting the EVC (at some egress UNI) has the
same VLAN Id & Priority Bits information that it had when it entered the EVC (at some
ingress UNI).
This Attribute must be defined at EVC definition and is modifiable before EVC
allocation.

....................................................................................................................................................................................................................................
1350 OMS 20-145
8DG42227DAAA 9.6
Issue 3 December 2012
Provider Backbone Bridge Network Management Create a PBB EVC
Workflow for PBB Management
....................................................................................................................................................................................................................................
These two attributes are not meaningful for the relevant NEs. C-VLAN push/pop is
configured on flow level.
...................................................................................................................................................................................................

8 Click Next
Result:

Figure 20-59 Create PBB EVC: Termination Selection

...................................................................................................................................................................................................

9 Select node and port for both originating and terminating sides.
Click Next

....................................................................................................................................................................................................................................
20-146 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Provider Backbone Bridge Network Management Create a PBB EVC
Workflow for PBB Management
....................................................................................................................................................................................................................................
Result:

Figure 20-60 Create PBB EVC: Termination Settings

...................................................................................................................................................................................................

10 The folderTermination Setting defines the traffic flows.


Select the first termination from the upper selection box.
• Click traffic descriptor button. Select the traffic descriptor from the selection box
and confirm.
• Select the policy mode. If you select color aware, you will select color profile.
• Select the classification priority-code 0-7 / DSCP code 0-63.
• Select VLAN POP disabled.
• Folder traffic classifier deals on VLAN id.

....................................................................................................................................................................................................................................
1350 OMS 20-147
8DG42227DAAA 9.6
Issue 3 December 2012
Provider Backbone Bridge Network Management Create a PBB EVC
Workflow for PBB Management
....................................................................................................................................................................................................................................
• Folder Leaf Term deals on HSI.
• Folder Reuse Flows allows to copy and reuse flow characteristics.
...................................................................................................................................................................................................

11 Optionally you can setup Layer 2 Control Protocol.

Figure 20-61 Ingress flow create

....................................................................................................................................................................................................................................
20-148 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Provider Backbone Bridge Network Management Create a PBB EVC
Workflow for PBB Management
....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

12 You can monitor that the Ingress flow has been created: the relevant traffic descriptor is
displayed in the bottom of the window

Figure 20-62 Ingress Flow: create monitoring

...................................................................................................................................................................................................

13 Select button Egress Flow, folder Push


Select following data:
• Class of service (guaranteed/best effort/regulated,...)
• If you select clear all fields, subsequent fields can be ignored.
• VLAN ID. It is an additional ID added to the stack.

....................................................................................................................................................................................................................................
1350 OMS 20-149
8DG42227DAAA 9.6
Issue 3 December 2012
Provider Backbone Bridge Network Management Create a PBB EVC
Workflow for PBB Management
....................................................................................................................................................................................................................................
• Priority mode. If set to color aware fields green and yellow are active.
• Click Create Egress
You can monitor that the Egress flow has been created: the relevant traffic descriptor is
displayed in the bottom of the window

Figure 20-63 Egress Flow: Push

...................................................................................................................................................................................................

14 Create Ingress and Egress flows for the second termination.


Click Next.
...................................................................................................................................................................................................

15 Select EVC state (implemented in this example).

....................................................................................................................................................................................................................................
20-150 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Provider Backbone Bridge Network Management Create a PBB EVC
Workflow for PBB Management
....................................................................................................................................................................................................................................
Click OK to confirm EVC creation.

Figure 20-64 EVC Allocate and Implement

....................................................................................................................................................................................................................................
1350 OMS 20-151
8DG42227DAAA 9.6
Issue 3 December 2012
Provider Backbone Bridge Network Management Create a PBB EVC
Workflow for PBB Management
....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

16 To verify the successful creation, follow the path Search > Packet > Connection
Less(Bridge) > Bridge EVC

Figure 20-65 Search>Packet>Connection Less(Bridge)>Bridge EVC

Result: The Bridge EVC list is shown.

Figure 20-66 Bridge EVC list

E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
20-152 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Provider Backbone Bridge Network Management PBB EVC traffic classification
Workflow for PBB Management
....................................................................................................................................................................................................................................

PBB EVC traffic classification


When to use
For each EVC termination, user defines the traffic classification rules by associating a
Traffic Classifier and QoS attributes.

Related Information
For information, see: “PBB Ethernet Virtual Connection” (p. 20-7).

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.

Task
From the MS-GUI Main view:
...................................................................................................................................................................................................

1 Follow the menu path Action > Packet > Services > Create Traffic Classifier.
...................................................................................................................................................................................................

2 Specify classification rules based on:


• VLAN (single or range)
• Priority bit (single or range)
• IP DSCP (single or range)
• Payload type
...................................................................................................................................................................................................

3 Specify QoS attributes:


• Policing mode [color blind, color aware, none]
• Color profile (applicable if policing mode is color blind or color aware)
• CoS and bandwidth profile are specified associating a Traffic Descriptor. See “Traffic
Descriptor Definition” (p. 20-154)
...................................................................................................................................................................................................

4 Click Ok.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS 20-153
8DG42227DAAA 9.6
Issue 3 December 2012
Provider Backbone Bridge Network Management Traffic Descriptor Definition
Workflow for PBB Management
....................................................................................................................................................................................................................................

Traffic Descriptor Definition


When to use
The Traffic Descriptors describes the characteristics of an Ethernet segment in term of
Class of Service (CoS) and bandwidth.

Related Information
For information, see: “Overview about Workflow ” (p. 20-135).

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.

Task
From the MS-GUI Main view:
...................................................................................................................................................................................................

1 Follow the path Action > Packet > Services > Create Traffic Descriptor.
Result: The creation window is displayed.
...................................................................................................................................................................................................

2 On the Create Traffic Descriptor Window.


To create a Traffic Descriptor:
• Enter a User Label.
• Select the Class of Service (Best Effort, Guaranteed, Regulated, Regulated1,
Regulated3, Regulated4, Guaranteed2, Background).
• Enter a CIR value (set automatically to '0' if the selected Class of Service is 'Best
Effort').
• Enter a PIR value.
• Enter a CBS value (set automatically to '0' if the selected Class of Service is 'Best
Effort').
• Enter a PBS value (if the selected Class of Service is 'Guaranteed', PBS value is
automatically set to CBS value - but could be modified).
...................................................................................................................................................................................................

3 Click Ok.
Result: The Traffic Descriptor is created.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
20-154 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Provider Backbone Bridge Network Management EVC Allocation and Implementation
Workflow for PBB Management
....................................................................................................................................................................................................................................

EVC Allocation and Implementation


When to use
To complete the Provider Bridge Workflow: create a Connection Less EVC, allocate, and
implement it.

Related Information
For information, see: “PBB Ethernet Virtual Connection” (p. 20-7).

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.

Task
From the MS-GUI Main view:
...................................................................................................................................................................................................

1 Follow the menu path Search > Packet > Services > Connection Less (Bridge) > Bridge
EVCs.
Result: The Bridge EVC list window is displayed.
...................................................................................................................................................................................................

2 Select the EVC in the list and follow the path Action > Bridge EVC > Allocate.
Result: The allocation window is displayed.
...................................................................................................................................................................................................

3 Click Ok.
Result: The EVC is allocated.
The Provisioning State is changed to Allocated.
...................................................................................................................................................................................................

4 Select again the EVC in the list and follow the path Action > Bridge EVC > Implement.
Result: The implementation window is displayed.
...................................................................................................................................................................................................

5 Click Ok.
Result: The EVC is implemented.
The Provisioning State is changed to Implemented.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS 20-155
8DG42227DAAA 9.6
Issue 3 December 2012
Provider Backbone Bridge Network Management Overview

....................................................................................................................................................................................................................................

In Band Management

Overview
Purpose
This section describes the procedure for the configuration of the In Band Management for
the TSS160C and TSS10 Network Element in the PBB (Provider Backbone Bridge)
Network when protected using the ERP protection schema.

Contents

Address Configuration of the Network Elements 20-157


Lag Port Creation (Via Zic) 20-165
NMS Start Supervision (NE Not Defined On NMS) 20-183

....................................................................................................................................................................................................................................
20-156 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Provider Backbone Bridge Network Management Address Configuration of the Network Elements
In Band Management
....................................................................................................................................................................................................................................

Address Configuration of the Network Elements


When to use
This function configures IP Address in the NE.

Related Information

Before you begin


The Network Element is correctly provisioned with the full set of boards required for the
configuration of the PBB Core Network.

Task
Using the ZIC configure the System ID, the LAN interface (if the NE is a Gateway NE)
and (for TSS160C) enable the OSPF for the node.
...................................................................................................................................................................................................

Figure 20-67 TSS160C System ID Configuration

....................................................................................................................................................................................................................................
1350 OMS 20-157
8DG42227DAAA 9.6
Issue 3 December 2012
Provider Backbone Bridge Network Management Address Configuration of the Network Elements
In Band Management
....................................................................................................................................................................................................................................
From Communication > DCN Phys. If > IP Address menu open the view for the
configuration of the System ID.
...................................................................................................................................................................................................

Figure 20-68 TSS160C System ID Configuration form

In the form fill the IP address field and the Subnet mask field.

....................................................................................................................................................................................................................................
20-158 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Provider Backbone Bridge Network Management Address Configuration of the Network Elements
In Band Management
....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

Figure 20-69 TSS160C Q LAN Configuration (Gateway NE)

If the TSS160C is a Gateway NE, configure and enable also the Q LAN Interface.
From Communication > DCN Phys. If > LAN menu open the view and configure the Q
LAN.
Note the configuration:
• OSI Protocol (Disabled) (N)
• Internet Protocol (Enabled) (Y)
• Integrated ISIS (Disabled) (N)
• • Proxy Address Resolution Protocol (Enabled) (Y)
• • Channel (MNGPLANE)
• • OSPF (Disabled) (N) (This parameter refers to the enabling of the OSPF protocol on
the LAN interface and as far as we know no OSPF should be configured on that
network)

....................................................................................................................................................................................................................................
1350 OMS 20-159
8DG42227DAAA 9.6
Issue 3 December 2012
Provider Backbone Bridge Network Management Address Configuration of the Network Elements
In Band Management
....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

Figure 20-70 TSS160C Export of the Route

Some network topologies could require the export of routes (or static route) between
routing protocols. For example, may need to export the static route to OSPF.
To enable the reporting of the routes between different protocol open the ULC view from
Communication > OSI ULC Report menu.

....................................................................................................................................................................................................................................
20-160 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Provider Backbone Bridge Network Management Address Configuration of the Network Elements
In Band Management
....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

Figure 20-71 Tss160C OSI Routing Configuration

Once the view is opened enable the reporting you need.


If no reporting is required set the parameters in the view as here depicted.

....................................................................................................................................................................................................................................
1350 OMS 20-161
8DG42227DAAA 9.6
Issue 3 December 2012
Provider Backbone Bridge Network Management Address Configuration of the Network Elements
In Band Management
....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

Figure 20-72 TSS10 System ID Configuration

....................................................................................................................................................................................................................................
20-162 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Provider Backbone Bridge Network Management Address Configuration of the Network Elements
In Band Management
....................................................................................................................................................................................................................................
From Communication > System IP Address menu, configure the System IP Address

Figure 20-73 TSS10 System IP Address

....................................................................................................................................................................................................................................
1350 OMS 20-163
8DG42227DAAA 9.6
Issue 3 December 2012
Provider Backbone Bridge Network Management Address Configuration of the Network Elements
In Band Management
....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

Figure 20-74 Tss10 LAN Interface Details

If the TSS10 is a Gateway NE, configure and enable also the Q LAN (LAN1) Interface.
From Communication > DCN LAN Interface menu open the view and configure the
LAN1.
Note the configuration:
• Proxy Address Resolution Protocol (ARP) (Enabled) (Flagged on)

E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
20-164 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Provider Backbone Bridge Network Management Lag Port Creation (Via Zic)
In Band Management
....................................................................................................................................................................................................................................

Lag Port Creation (Via Zic)


When to use
This function creates a LAG port.

Related Information
For the NNI ports that are designed to carry on also the management frame, the LAG port
(normally used NNI side to close the Ethernet Ring), must be configured by ZIC
(enabling the In Band Management) and uploaded by the NMS once the NE is reachable
(the upload is automatically performed during the NE Define action performed by PKT).
Refer to the following procedures:
• “Task for TSS160C” (p. 20-166)
• “Task for TSS160C V1.12.04” (p. 20-174)

Before you begin


The Network Element is correctly provisioned with the full set of boards required for the
configuration of the PBB Core Network.

....................................................................................................................................................................................................................................
1350 OMS 20-165
8DG42227DAAA 9.6
Issue 3 December 2012
Provider Backbone Bridge Network Management Lag Port Creation (Via Zic)
In Band Management
....................................................................................................................................................................................................................................
Task for TSS160C
TSS160C LAG Port Creation and Configuration:
...................................................................................................................................................................................................

Figure 20-75 TSS160C Link Aggregation Group Management

From the Link Aggregation Group Management tab, go to the bottom of the page and fill
the fields related to:
• Size (e.g. 2)
• Name (just the LAG ID, i.e. the numerical identifier) (e.g. 1)
• Actor Admin Key (e.g. 1)

....................................................................................................................................................................................................................................
20-166 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Provider Backbone Bridge Network Management Lag Port Creation (Via Zic)
In Band Management
....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

2 Once the LAG has been created, select the LAG port and set the Client Type as NNI:

Figure 20-76 Tss160C LAG Configuration (Client Type)

....................................................................................................................................................................................................................................
1350 OMS 20-167
8DG42227DAAA 9.6
Issue 3 December 2012
Provider Backbone Bridge Network Management Lag Port Creation (Via Zic)
In Band Management
....................................................................................................................................................................................................................................
Set the Admin State of the port to enable.

Figure 20-77 Tss160C LAG Configuration (Administration State)

....................................................................................................................................................................................................................................
20-168 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Provider Backbone Bridge Network Management Lag Port Creation (Via Zic)
In Band Management
....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

3 Once the port has been enabled configure the In Band Management selecting the In Fiber
In Band tab:

Figure 20-78 Tss160C In Fiber In Band

....................................................................................................................................................................................................................................
1350 OMS 20-169
8DG42227DAAA 9.6
Issue 3 December 2012
Provider Backbone Bridge Network Management Lag Port Creation (Via Zic)
In Band Management
....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

4 Select Routing Protocol as ospf.

Figure 20-79 Tss160C In Fiber In Band (OSPF)

....................................................................................................................................................................................................................................
20-170 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Provider Backbone Bridge Network Management Lag Port Creation (Via Zic)
In Band Management
....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

5 Complete the configuration activating the interface

Figure 20-80 Tss160C In Fiber In Band Activate

...................................................................................................................................................................................................

6 Bind the ports in the LAG repeating the following steps for each port that is designed to
be member of the LAG:

....................................................................................................................................................................................................................................
1350 OMS 20-171
8DG42227DAAA 9.6
Issue 3 December 2012
Provider Backbone Bridge Network Management Lag Port Creation (Via Zic)
In Band Management
....................................................................................................................................................................................................................................
Select the local port and set the Client Type as linkagg.

Figure 20-81 Tss160C port member of LAG

....................................................................................................................................................................................................................................
20-172 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Provider Backbone Bridge Network Management Lag Port Creation (Via Zic)
In Band Management
....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

7 Click on Configure LAG link in order to open the view for the aggregation of the port to
the LAG created before:

Figure 20-82 Tss160C port member of LAG configuration

....................................................................................................................................................................................................................................
1350 OMS 20-173
8DG42227DAAA 9.6
Issue 3 December 2012
Provider Backbone Bridge Network Management Lag Port Creation (Via Zic)
In Band Management
....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

8 Once the view is opened select the Actor Admin Key of the LAG you want to associate:

Figure 20-83 Tss160C port member of LAG Actor

Note: For the TSS160C V1.12.04, note the following: In that release the bind of the
port (the action before) fails. In order to bind the ports with the LAG follows the
special procedure provided by NE team. See “Task for TSS160C V1.12.04”
(p. 20-174)
E...................................................................................................................................................................................................
N D O F S T E P S

Task for TSS160C V1.12.04


For the TSS160C V1.12.04 note the following: In that release the bind of the port (the
action described in “Task for TSS160C” (p. 20-166)) fails. In order to bind the ports with
the LAG follows the special procedure provided by NE team.
...................................................................................................................................................................................................

1 Connect to the CLI of the NE using the following command (by an PC or UNIX station
that is able to reach the NE):
....................................................................................................................................................................................................................................
20-174 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Provider Backbone Bridge Network Management Lag Port Creation (Via Zic)
In Band Management
....................................................................................................................................................................................................................................
telnet ip address of ne 1123
...................................................................................................................................................................................................

2 Get the physical interface:


Cli:admin > int sh
Result:
Port InterfaceType ClientType ServiceStatus
AdminStatus Traffic
===========================================================================
r1sr1sl13d0p1 eth (6) linkagg (3) 0 down
(2) down (2)
r1sr1sl13d0p2 eth (6) ets (1) 0 down
(2) down (2)
r1sr1sl13d0p3 eth (6) linkagg (3) 0 up
(1) up (1)
r1sr1sl13d0p4 eth (6) linkagg (3) 0 up
(1) up (1)
r1sr1sl13d0p6 eth (6) pnp (5) 0 up
(1) up (1)
r1sr1sl13d0p7 eth (6) linkagg (3) 0 up
(1) up (1)
r1sr1sl13d0p8 eth (6) ets (1) 0 down
(2) down (2)
r1sr1sl13d0p9 eth (6) ets (1) 0 down
(2) down (2)
r1sr1sl13d0p10 eth (6) ets (1) 0 down
(2) down (2)
...................................................................................................................................................................................................

3 Get the lag ports:


Cli:admin > linkagg sh
Result:
lag AdminKey LAG User Label LAG
Size Admin State
------- ----------- ---------------------------------------- -------- ----
1 1 ''
2 enable (1)
2 2 ''
2 enable (1)
3 3 ''
1 enable (1)
...................................................................................................................................................................................................

4 Bind the port (e.g. ‘r1sr1sl13d0p1’ with ‘lag1’):


Cli:admin > linkagg port r1sr1sl13d0p1 bind lag1
Result: .. message: waiting - other CLI command in progress
.. message: successful completed command
...................................................................................................................................................................................................

5 Logout from CLI:


....................................................................................................................................................................................................................................
1350 OMS 20-175
8DG42227DAAA 9.6
Issue 3 December 2012
Provider Backbone Bridge Network Management Lag Port Creation (Via Zic)
In Band Management
....................................................................................................................................................................................................................................
Cli:admin > logout
E...................................................................................................................................................................................................
N D O F S T E P S

Task for TSS10


TSS10 LAG Port Creation and Configuration:
...................................................................................................................................................................................................

Figure 20-84 TSS10 Link Aggregation Group Management

From the Link Aggregation Group Management tab, go to the bottom of the page and fill
the fields related to:
• Size (e.g. 2)
• Name (just the LAG ID, i.e. the numerical identifier) (e.g. 1)
• Actor Admin Key (e.g. 1)
• Admin State to enable
• EthClient Type to NNI
....................................................................................................................................................................................................................................
20-176 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Provider Backbone Bridge Network Management Lag Port Creation (Via Zic)
In Band Management
....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

2 Once the port has been created enable the In Band Management:

Figure 20-85 Tss10 Enable the In Band Management

....................................................................................................................................................................................................................................
1350 OMS 20-177
8DG42227DAAA 9.6
Issue 3 December 2012
Provider Backbone Bridge Network Management Lag Port Creation (Via Zic)
In Band Management
....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

3 Select the In-band Management tab and check the configuration (click on save if you
need to modify the Management Plan Label)

Figure 20-86 TSS60 In Fiber In Band Configuration

...................................................................................................................................................................................................

4 Bind the ports in the LAG repeating the following steps for each port that is designed to
be member of the LAG:

....................................................................................................................................................................................................................................
20-178 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Provider Backbone Bridge Network Management Lag Port Creation (Via Zic)
In Band Management
....................................................................................................................................................................................................................................
Select the local port and set the Client Type as LAG:

Figure 20-87 Tss10 portInLAG

....................................................................................................................................................................................................................................
1350 OMS 20-179
8DG42227DAAA 9.6
Issue 3 December 2012
Provider Backbone Bridge Network Management Lag Port Creation (Via Zic)
In Band Management
....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

5 Click on Configure LAG link in order to open the view for the aggregation of the port to
the LAG created before:

Figure 20-88 Tss10 port member of LAG configuration

....................................................................................................................................................................................................................................
20-180 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Provider Backbone Bridge Network Management Lag Port Creation (Via Zic)
In Band Management
....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

6 Once the view is opened select the Actor Admin Key of the LAG you want to associate:

Figure 20-89 Tss10_portInLAGconfigActor

....................................................................................................................................................................................................................................
1350 OMS 20-181
8DG42227DAAA 9.6
Issue 3 December 2012
Provider Backbone Bridge Network Management Lag Port Creation (Via Zic)
In Band Management
....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

7 Complete the configuration enablig the Admin State of the member port.

Figure 20-90 Tss10_portInLAGadminState

Result: The configuration of the Network Element is now complete.


In order to reach the nodes from the NMS it is now required to configure the ip
network in the ‘middle’ (between node and NMS) according to the DCN topology and
the addresses plan.
For a simple test, if the NMS is in the same sub network of the Q LAN interface of a
gateway NE (e.g. a TSS160C), is possible to configure a static route on the NE (as
explained before) and a static route on the NMS and verify if the node inside the ring
are reachable from the NMS (ping).
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
20-182 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Provider Backbone Bridge Network Management NMS Start Supervision (NE Not Defined On NMS)
In Band Management
....................................................................................................................................................................................................................................

NMS Start Supervision (NE Not Defined On NMS)


When to use
Use this function to start the Supervision on a Network Element.

Related Information
This task does not have any related information.

Before you begin


Create the Network Elements NE Manager side, set the right addresses and verify that
NMS is able to reach the nodes in the ring.

Task
Once the Network Elements are reachable via NMS, it is possible to start the Supervision.
...................................................................................................................................................................................................

Figure 20-91 NMS Start Supervision

....................................................................................................................................................................................................................................
1350 OMS 20-183
8DG42227DAAA 9.6
Issue 3 December 2012
Provider Backbone Bridge Network Management NMS Start Supervision (NE Not Defined On NMS)
In Band Management
....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

2 Once the supervision starts, select the Nodes Physical Manager side and ask for
Synchronize NE.

Figure 20-92 NMS Synchronize NE

....................................................................................................................................................................................................................................
20-184 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Provider Backbone Bridge Network Management NMS Start Supervision (NE Not Defined On NMS)
In Band Management
....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

3 From the Physical Manager, if you need, you can add the node in the MAPs.

Figure 20-93 NMS add Node In Map

....................................................................................................................................................................................................................................
1350 OMS 20-185
8DG42227DAAA 9.6
Issue 3 December 2012
Provider Backbone Bridge Network Management NMS Start Supervision (NE Not Defined On NMS)
In Band Management
....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

4 From the Physical Manager, create the Physical Connections, one for each Link Member
of the LAG.

Figure 20-94 NMS Create Physical Connection

....................................................................................................................................................................................................................................
20-186 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Provider Backbone Bridge Network Management NMS Start Supervision (NE Not Defined On NMS)
In Band Management
....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

5 Here the Physical Connection Creation wizard of the Physical Manager:

Figure 20-95 NMS Create Physical Connection wizard

Once the full set of Physical Connections related to the Links composing the LAG has
been created, the next step is the definition of the nodes PKT side.

....................................................................................................................................................................................................................................
1350 OMS 20-187
8DG42227DAAA 9.6
Issue 3 December 2012
Provider Backbone Bridge Network Management NMS Start Supervision (NE Not Defined On NMS)
In Band Management
....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

6 Select the node you need to define from the Available NE list of the PKT and ask for
Define NE.

Figure 20-96 NMS Define NE

....................................................................................................................................................................................................................................
20-188 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Provider Backbone Bridge Network Management NMS Start Supervision (NE Not Defined On NMS)
In Band Management
....................................................................................................................................................................................................................................
Result: During the Define NE operation the Ethernet Local Ports, the LAG Ports, and
the Physical Links (defined from the Physical Manager on the ports member of the
LAGs) will be automatically uploaded.
...................................................................................................................................................................................................

7 For each node, ask for Ethernet Local Ports and verify the presence of the LAG port
defined before via ZIC:

Figure 20-97 NMS Ethernet Physical Port list

....................................................................................................................................................................................................................................
1350 OMS 20-189
8DG42227DAAA 9.6
Issue 3 December 2012
Provider Backbone Bridge Network Management NMS Start Supervision (NE Not Defined On NMS)
In Band Management
....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

8 In order to build the Link Over LAG, select Action > Packet > Construction > Transport
Link > Create LAG Link Over Cable From Ports as depicted in the snapshot:

Figure 20-98 Create LAG Link over Cable

....................................................................................................................................................................................................................................
20-190 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Provider Backbone Bridge Network Management NMS Start Supervision (NE Not Defined On NMS)
In Band Management
....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

9 Select the nodes in the wizard, and the LAG ports extremities of the Link Over LAG and
commit the creation:

Figure 20-99 Create Link Over Cable

...................................................................................................................................................................................................

10 The Link Over LAG will be created using the LAG ports created before via ZIC and
uploaded NMS side.

....................................................................................................................................................................................................................................
1350 OMS 20-191
8DG42227DAAA 9.6
Issue 3 December 2012
Provider Backbone Bridge Network Management NMS Start Supervision (NE Not Defined On NMS)
In Band Management
....................................................................................................................................................................................................................................
Moreover it will refer to the Links built before using the Physical Manager (the links
using as extremities the ports member of the LAG).

Figure 20-100 NMS Link Over LAG list

E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
20-192 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
21 21
Broadcast TV Service
Management

Overview
Purpose
This chapter describes the BTV service emulation in the scope of Ethernet Connection
Oriented and Connection Less management.

Contents

Section I: Introduction 21-3


Overview about Broadcast TV 21-4
Managing Broadcast TV Elements 21-5
View the list of Broadcast TV Elements 21-6
Create a BTV Element 21-8
Modify a BTV Element 21-11
Delete a BTV Element 21-14
View the details of the BTV Elements 21-16
Details of a BTV Elements 21-17
View the list of ETPs belonging to a BTV Element 21-18
Description of the list of BTV ENE inventory 21-19
Create an ETP in a BTV Element 21-20
Delete an ETP in a BTV Element 21-22
Section II: Workflow for BTV construction 21-24
Create path on 1350 OMS SDH application 21-25
Create Broadcast TV Element 21-26
Create Link Broadcast TV 21-29
Section III: Workflow for BTV Service Management 21-33
Create a Customer 21-34
Create Ethernet Service 21-35
Create a Connection Oriented EVC 21-37
...................................................................................................................................................................................................................................
1350 OMS 21-1
8DG42227DAAA 9.6
Issue 3 December 2012
Broadcast TV Service Management Overview

....................................................................................................................................................................................................................................

Section IV: Bridge Based BTV Service 21-40


Overview about the Services 21-41
IGMP Snooping Management 21-42
IGMP Snooping State Management 21-44

....................................................................................................................................................................................................................................
21-2 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Broadcast TV Service Management Overview
Section I: Introduction
....................................................................................................................................................................................................................................

Section I: Introduction

Overview
Purpose
This section describes the BTV service emulation in the scope of Ethernet Connection
Oriented management.

Contents

Overview about Broadcast TV 21-4


Managing Broadcast TV Elements 21-5
View the list of Broadcast TV Elements 21-6
Create a BTV Element 21-8
Modify a BTV Element 21-11
Delete a BTV Element 21-14
View the details of the BTV Elements 21-16
Details of a BTV Elements 21-17
View the list of ETPs belonging to a BTV Element 21-18
Description of the list of BTV ENE inventory 21-19
Create an ETP in a BTV Element 21-20
Delete an ETP in a BTV Element 21-22

....................................................................................................................................................................................................................................
1350 OMS 21-3
8DG42227DAAA 9.6
Issue 3 December 2012
Broadcast TV Service Management Overview about Broadcast TV
Section I: Introduction
....................................................................................................................................................................................................................................

Overview about Broadcast TV


Broadcast TV description
The user defines an EPLAN or an EVPLAN service. The choice depends on whether the
SDH partially terminated path is shared or not with other services. The user is suggested
to use the comment field to state that the service is a BTV service.
The 1350 OMS PKT user defines an EVC belonging to an EPLAN or an EVPLAN
service with the following characteristics:
• Multipoint to multipoint.
• Unicast.
• The EVC termination is chosen among the Ethernet Physical ports available on real
NEs ending the SDH broadcast path.
The 1350 OMS PKT user defines a set of Ethernet Segments having common TD, TC,
and Color Profile (if needed).
The user is requested to define one Ethernet Segment for each Link Over TDM taking
care about the assigned directionality:
• For SDH broadcast path sources: each Ethernet Segment must start from a real NE
and must end on the ENE playing the BTV role.
• For SDH broadcast path sinks: each Ethernet Segment must start from the ENE
playing the BTV role and must end on a real NE.
Then, all built Ethernet Segments can be Allocated and Implemented, allowing the
Broadcast traffic flowing.
Note: Operations are in users hands. No specific congruence checks are performed by
1350 OMS PKT for EPLINE or EVPLINE services emulating BTV services.

....................................................................................................................................................................................................................................
21-4 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Broadcast TV Service Management Managing Broadcast TV Elements
Section I: Introduction
....................................................................................................................................................................................................................................

Managing Broadcast TV Elements


Overview
The BTV Element management, part of the network construction, consists in:
• performing actions such as:
– creating, modifying, deleting BTV Elements.
– creating, deleting ETPs.
• displaying BTV Element information such as:
– BTV Element list.
– ETP list.
– properties.
The BTV Element management chain gives the order in which the available actions can
be performed.

Figure 21-1 BTV Element management chain

....................................................................................................................................................................................................................................
1350 OMS 21-5
8DG42227DAAA 9.6
Issue 3 December 2012
Broadcast TV Service Management View the list of Broadcast TV Elements
Section I: Introduction
....................................................................................................................................................................................................................................

View the list of Broadcast TV Elements


When to use
The Broadcast TV Element list presents all the ENEs managed (that is, already defined)
by the 1350 OMS PKT, and their attributes.

Related information
For a description about BTV Elements, refer to the topic “Managing Broadcast TV
Elements” (p. 21-5).

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.

Task
From MS-GUI main window:
...................................................................................................................................................................................................

1 Select Search > Packet > Construction > Network Elements > Defined External NEs.
Result: The list window is shown.
...................................................................................................................................................................................................

2 Set the filter condition to Role=BTV and click Filter.

....................................................................................................................................................................................................................................
21-6 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Broadcast TV Service Management View the list of Broadcast TV Elements
Section I: Introduction
....................................................................................................................................................................................................................................
Result: The list window is shows all the available ENEs and their attributes according
to the filter condition.

Figure 21-2 Broadcast TV Element List window

The attributes displayed for each ENE are:


• User Label.
• Parent Subnetwork.
• ENE Role: BTV.

E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS 21-7
8DG42227DAAA 9.6
Issue 3 December 2012
Broadcast TV Service Management Create a BTV Element
Section I: Introduction
....................................................................................................................................................................................................................................

Create a BTV Element


When to use
This function consists in making visible for the 1350 OMS PKT a NE or a set of NEs not
managed by the 1350 OMS PKT.

Related information
For a description about BTV Elements, refer to the topic “Managing Broadcast TV
Elements” (p. 21-5).
The user is authorized to create a BTV Element in the main parent subnetwork (called
MEN by default).
Not managed NE are NE contained in an adjacent subnetwork not accessible for the 1350
OMS PKT.

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Conditions
Note: It is authorized to create BTV Element, as an ENE, in the main parent
subnetwork (called MEN by default).
To get a positive result:
• The parent subnetwork must exist.
• The Table B-1, “Limits for Subnetworks” (p. B-1) in the selected subnetwork must
not be reached.
• The Table B-5, “Limits for ENEs” (p. B-2) must not be reached.
• The User Label must be different as one which is already used by another ENE.

Task
From MS-GUI main window:
...................................................................................................................................................................................................

1 Select Action > Packet > Construction > Create External Network Element.

....................................................................................................................................................................................................................................
21-8 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Broadcast TV Service Management Create a BTV Element
Section I: Introduction
....................................................................................................................................................................................................................................
Result:

Figure 21-3 Broadcast TV Element Creation window

...................................................................................................................................................................................................

2 To create an ENE:
• Enter a BTV Element User Label.
• Choose the Parent Subnetwork by using the sensitive help.
• Enter a Domain: choose a Provider Domain for BTV Service on Provider Bridge in
Connection Less networks.
• Choose the ENE Role: BTV.
• Enter a Comment (optional).
...................................................................................................................................................................................................

3 Click Ok.

....................................................................................................................................................................................................................................
1350 OMS 21-9
8DG42227DAAA 9.6
Issue 3 December 2012
Broadcast TV Service Management Create a BTV Element
Section I: Introduction
....................................................................................................................................................................................................................................
Result: The BTV Element is created with an amount of ETPs, which are
automatically created. See Table B-6, “Limits for ETPs in an ENE” (p. B-2)
The tree area, the BTV Element list and the opened graphical views are updated.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
21-10 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Broadcast TV Service Management Modify a BTV Element
Section I: Introduction
....................................................................................................................................................................................................................................

Modify a BTV Element


When to use
The function modifies BTV Element characteristics.

Related information
For a description about BTV Elements, refer to the topic “Managing Broadcast TV
Elements” (p. 21-5).
The BTV Element modification gives the possibility to modify:
• BTV Element User Label.
• Comment.

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Conditions
To get a positive result:
• If the User Label is modified, the new User Label must be different as one which is
already used by another ENE.

Task
From MS-GUI main window:
...................................................................................................................................................................................................

1 Select Search > Packet > Construction > Network Elements > Defined External NEs.
Result: The list window is shown.
...................................................................................................................................................................................................

2 Set the filter condition to Role=BTV and click Filter.


Result: The list window is shows all the available ENEs and their attributes according
to the filter condition.
...................................................................................................................................................................................................

3 Select an item in the list.

....................................................................................................................................................................................................................................
1350 OMS 21-11
8DG42227DAAA 9.6
Issue 3 December 2012
Broadcast TV Service Management Modify a BTV Element
Section I: Introduction
....................................................................................................................................................................................................................................
Result:

Figure 21-4 External Network Element Modification window

...................................................................................................................................................................................................

4 To modify BTV Element:


• Enter a New User Label (optional).
• Modify the Comment (optional).

....................................................................................................................................................................................................................................
21-12 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Broadcast TV Service Management Modify a BTV Element
Section I: Introduction
....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

5 Click Ok.
Result: Then, the Broadcast TV Element list, the tree area, and the opened graphical
views are updated.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS 21-13
8DG42227DAAA 9.6
Issue 3 December 2012
Broadcast TV Service Management Delete a BTV Element
Section I: Introduction
....................................................................................................................................................................................................................................

Delete a BTV Element


When to use
This function consists in deleting a BTV Element and its ETPs from the 1350 OMS PKT
supervision.

Related information
For a description about BTV Elements, refer to the topic “Managing Broadcast TV
Elements” (p. 21-5).

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Conditions
To get a positive result:
• The usage state of the ETPs belonging to the BTV Element must be idle.

Task
From MS-GUI main window:
...................................................................................................................................................................................................

1 Select Search > Packet > Construction > Network Elements > Defined External NEs.
Result: The list window is shown.
...................................................................................................................................................................................................

2 Set the filter condition to Role=BTV and click Filter.


Result: The list window is shows all the available ENEs and their attributes according
to the filter condition.
...................................................................................................................................................................................................

3 Select one or more items in the list.


...................................................................................................................................................................................................

4 Select Action > from External Network Element > Delete or right-click the mouse and
Select Delete.
...................................................................................................................................................................................................

5 Select one of the options in the confirmation box. Refer to the procedure “Confirm the
action” (p. 11-40).

....................................................................................................................................................................................................................................
21-14 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Broadcast TV Service Management Delete a BTV Element
Section I: Introduction
....................................................................................................................................................................................................................................
Result: After confirmation, the BTV Elements and their ETPs are removed.
The Broadcast TV Element list, the tree area, and the opened graphical views are
updated.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS 21-15
8DG42227DAAA 9.6
Issue 3 December 2012
Broadcast TV Service Management View the details of the BTV Elements
Section I: Introduction
....................................................................................................................................................................................................................................

View the details of the BTV Elements


When to use
This function gets information about a BTV Element.

Related information
For a description about BTV Elements, refer to the topic “Managing Broadcast TV
Elements” (p. 21-5).

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.

Task
From MS-GUI main window:
...................................................................................................................................................................................................

1 Select Search > Packet > Construction > Network Elements > Defined External NEs.
Result: The list window is shown.
...................................................................................................................................................................................................

2 Set the filter condition to Role=BTV and click Filter.


Result: The list window is shows all the available ENEs and their attributes according
to the filter condition.
...................................................................................................................................................................................................

3 Select the ENE in the list.


...................................................................................................................................................................................................

4 Select Search > Properties.


Result: The ENE properties window is displayed.
See the following topic in this document: “Details of a BTV Elements ” (p. 21-17)
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
21-16 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Broadcast TV Service Management Details of a BTV Elements
Section I: Introduction
....................................................................................................................................................................................................................................

Details of a BTV Elements


Attributes of a BTV Element
The attributes displayed for each ENE are:
• User Label.
• Parent Subnetwork.
• Domain.
• ENE Role: BTV.
• Comment.

....................................................................................................................................................................................................................................
1350 OMS 21-17
8DG42227DAAA 9.6
Issue 3 December 2012
Broadcast TV Service Management View the list of ETPs belonging to a BTV Element
Section I: Introduction
....................................................................................................................................................................................................................................

View the list of ETPs belonging to a BTV Element


When to use
This function consists in displaying the External Termination Ports of a previously
selected BTV Element and their attributes.

Related information
For a description about BTV Elements, refer to the topic “Managing Broadcast TV
Elements” (p. 21-5).

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.

Task
From MS-GUI main window:
...................................................................................................................................................................................................

1 Select Search > Packet > Construction > Network Elements > Defined External NEs.
Result: The list window is shown.
...................................................................................................................................................................................................

2 Set the filter condition to Role=BTV and click Filter.


Result: The list window is shows all the available ENEs and their attributes according
to the filter condition.
...................................................................................................................................................................................................

3 Select an item in the list.


...................................................................................................................................................................................................

4 Select Search > Inventory from External Network Element > ETP List.
Result: The broadcast TV NE ETP list is displayed.
See the following topic in this document: “Description of the list of BTV ENE
inventory” (p. 21-19)
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
21-18 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Broadcast TV Service Management Description of the list of BTV ENE inventory
Section I: Introduction
....................................................................................................................................................................................................................................

Description of the list of BTV ENE inventory


Attributes of an ETP
The attributes displayed for each ETP are:
• Identifier.
• Transport Link.
• Supported Layer (None, Ethernet, MPLS).
• Interface Rate.
• Usage State (Not meaningful, Idle, Busy).
• Manager Control.
• Client Type (ETS, ETB, ETS-P).
• NAD.

....................................................................................................................................................................................................................................
1350 OMS 21-19
8DG42227DAAA 9.6
Issue 3 December 2012
Broadcast TV Service Management Create an ETP in a BTV Element
Section I: Introduction
....................................................................................................................................................................................................................................

Create an ETP in a BTV Element


When to use
This function consists in creating ETPs that represent Ethernet ports located in the
selected BTV Element.

Related information
For a description about BTV Elements, refer to the topic “Managing Broadcast TV
Elements” (p. 21-5).

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Conditions
To get a positive result:
• In the ENE, the amount of ETPs must not exceed the maximum. See Table B-6,
“Limits for ETPs in an ENE” (p. B-2)
Note: When the BTV Element is created, the ETP is created by default.

Task
From MS-GUI main window:
...................................................................................................................................................................................................

1 Select Search > Packet > Construction > Network Elements > Defined External NEs.
Result: The list window is shown.
...................................................................................................................................................................................................

2 Set the filter condition to Role=BTV and click Filter.


Result: The list window is shows all the available ENEs and their attributes according
to the filter condition.
...................................................................................................................................................................................................

3 Select an item in the list.


...................................................................................................................................................................................................

4 Select Action > External TP > Create ETP.

....................................................................................................................................................................................................................................
21-20 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Broadcast TV Service Management Create an ETP in a BTV Element
Section I: Introduction
....................................................................................................................................................................................................................................
Result: The ETP creation window is displayed.

Figure 21-5 ETP Creation window

To create ETPs:
• Enter the first ETP to create (That is a numerical value corresponding to the first
ETP number to be used).
• Enter the Number of ETP to create. Valid numerical value is between 1 and the
Table B-6, “Limits for ETPs in an ENE” (p. B-2) which can be created on a ENE.
See Table B-6, “Limits for ETPs in an ENE” (p. B-2)
...................................................................................................................................................................................................

5 Click Ok button.
Result: The ETPs (added after the first ones automatically created at the ENE
creation) are always created with Manager Control set to Disabled.
The ETPs are automatically generated by the 1350 OMS PKT and the ETP List is
updated.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS 21-21
8DG42227DAAA 9.6
Issue 3 December 2012
Broadcast TV Service Management Delete an ETP in a BTV Element
Section I: Introduction
....................................................................................................................................................................................................................................

Delete an ETP in a BTV Element


When to use
This function consists in deleting ETPs from a previously selected BTV Element.

Related information
For a description about BTV Elements, refer to the topic “Managing Broadcast TV
Elements” (p. 21-5).

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Conditions
To get a positive result:
• The usage state of the ETPs belonging to the ENE must be idle.

Task
From MS-GUI main window:
...................................................................................................................................................................................................

1 Select Search > Packet > Construction > Network Elements > Defined External NEs.
Result: The list window is shown.
...................................................................................................................................................................................................

2 Set the filter condition to Role=BTV and click Filter.


Result: The list window is shows all the available ENEs and their attributes according
to the filter condition.
...................................................................................................................................................................................................

3 Select an item in the list.


...................................................................................................................................................................................................

4 Select Search > Inventory from External Network Element > ETP List.
Result: The ETP list window is shown.
...................................................................................................................................................................................................

5 Select one or more items in the list.


...................................................................................................................................................................................................

6 Select Action > External TP > Delete or right-click the mouse and Select Delete.
....................................................................................................................................................................................................................................
21-22 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Broadcast TV Service Management Delete an ETP in a BTV Element
Section I: Introduction
....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

7 Select one of the options in the confirmation box. Refer to the procedure “Confirm the
action” (p. 11-40).
Result: After confirmation, the ETPs are removed from BTV Element.
The ETP Inventory list is updated.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS 21-23
8DG42227DAAA 9.6
Issue 3 December 2012
Broadcast TV Service Management Overview
Section II: Workflow for BTV construction
....................................................................................................................................................................................................................................

Section II: Workflow for BTV construction

Overview
Purpose
This section provides information about the workflow that is required for the BTV
construction.

Contents

Create path on 1350 OMS SDH application 21-25


Create Broadcast TV Element 21-26
Create Link Broadcast TV 21-29

....................................................................................................................................................................................................................................
21-24 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Broadcast TV Service Management Create path on 1350 OMS SDH application
Section II: Workflow for BTV construction
....................................................................................................................................................................................................................................

Create path on 1350 OMS SDH application


Overview
The first operation for BTV Service Management is the path creation on 1350 OMS SDH
application.
• The Service Type is Ethernet.
• The Service Rate is 1-Gb Rate Adaptive.
• The Transport Rate is AU4-nV.

Figure 21-6 Path on 1350 OMS SDH

....................................................................................................................................................................................................................................
1350 OMS 21-25
8DG42227DAAA 9.6
Issue 3 December 2012
Broadcast TV Service Management Create Broadcast TV Element
Section II: Workflow for BTV construction
....................................................................................................................................................................................................................................

Create Broadcast TV Element


When to use
This function consists in making visible for the 1350 OMS PKT a NE or a set of NEs not
managed by the 1350 OMS PKT.

Related information
For a description about BTV Elements, refer to the topic “Managing Broadcast TV
Elements” (p. 21-5).
Not managed NE are NE contained in an adjacent subnetwork not accessible for the 1350
OMS PKT.

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Conditions
Note: It is authorized to create an ENE in the main parent subnetwork (called by
default).
To get a positive result:
• The parent subnetwork must exist.
• The Table B-1, “Limits for Subnetworks” (p. B-1)in the selected subnetwork must not
be reached.
• The Table B-5, “Limits for ENEs” (p. B-2) must not be reached.
• The User Label must be different as one which is already used by another ENE.

Task
From MS-GUI main window:
...................................................................................................................................................................................................

1 Select Action > Packet > Construction > Create External Network Element.

....................................................................................................................................................................................................................................
21-26 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Broadcast TV Service Management Create Broadcast TV Element
Section II: Workflow for BTV construction
....................................................................................................................................................................................................................................
Result:

Figure 21-7 Broadcast TV Element Creation window

...................................................................................................................................................................................................

2 To create an ENE:
• Enter a BTV Element User Label.
• Enter a Domain: choose a Provider Domain for BTV Service on Provider Bridge in
Connection Less networks.
• Choose the ENE Role: Broadcast TV.
• Enter a Comment (optional).
...................................................................................................................................................................................................

3 Click Ok.

....................................................................................................................................................................................................................................
1350 OMS 21-27
8DG42227DAAA 9.6
Issue 3 December 2012
Broadcast TV Service Management Create Broadcast TV Element
Section II: Workflow for BTV construction
....................................................................................................................................................................................................................................
Result: The BTV Element is created with an amount of ETPs, which are
automatically created. See Table B-6, “Limits for ETPs in an ENE” (p. B-2)
The tree area, the BTV Element list and the opened graphical views are updated.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
21-28 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Broadcast TV Service Management Create Link Broadcast TV
Section II: Workflow for BTV construction
....................................................................................................................................................................................................................................

Create Link Broadcast TV


When to use
This function consists in defining a Link Over TDM for BTV.

Related information
For a description about BTV Elements, refer to the topic “Managing Broadcast TV
Elements” (p. 21-5).

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.

Task
From MS-GUI main window:
...................................................................................................................................................................................................

1 Select Action > Packet > Construction > Create Link Broadcast TV.

....................................................................................................................................................................................................................................
1350 OMS 21-29
8DG42227DAAA 9.6
Issue 3 December 2012
Broadcast TV Service Management Create Link Broadcast TV
Section II: Workflow for BTV construction
....................................................................................................................................................................................................................................
Result: The Link Over Broadcast TV creation window is displayed.

Figure 21-8 Link Over TDM Broadcast TV Creation window

....................................................................................................................................................................................................................................
21-30 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Broadcast TV Service Management Create Link Broadcast TV
Section II: Workflow for BTV construction
....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

2 To create a Link Over TDM Broadcast TV:


• Enter a Link User Label.
• Enter a Comment (optional).
• Select the Extremity A by using the sensitive help.
• Select the Extremity A Termination by using the sensitive help (only the terminations
with usage state equal to Idle are proposed).
• Select the Extremity Z by using the sensitive help.
• Select the Extremity Z Termination by using the sensitive help (only the terminations
with usage state equal to Idle are proposed).
• Choose the Supported Layer: Ethernet.
• Choose the Transport Concatenation Rate: VC_4.
• Enter the Concatenation level (priority which allows to increase the flexibility of
SDH bandwidth management from 0 to 63).
• Insert the 1350 OMS SDH Path Id.
• Choose the Client Type: ETS.
The 1350 OMS SDH Path Id is read from 1350 OMS SDH path window selecting the
path > Show set attributes > Miscellaneous.

Figure 21-9 1350 OMS SDH Path Id

....................................................................................................................................................................................................................................
1350 OMS 21-31
8DG42227DAAA 9.6
Issue 3 December 2012
Broadcast TV Service Management Create Link Broadcast TV
Section II: Workflow for BTV construction
....................................................................................................................................................................................................................................
The 1350 OMS SDH Path Id is assigned to every Link Over TDM created for the
BTV Service.
...................................................................................................................................................................................................

3 Click Ok.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
21-32 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Broadcast TV Service Management Overview
Section III: Workflow for BTV Service Management
....................................................................................................................................................................................................................................

Section III: Workflow for BTV Service Management

Overview
Purpose
This section provides information about the workflow for BTV service management.

Contents

Create a Customer 21-34


Create Ethernet Service 21-35
Create a Connection Oriented EVC 21-37

....................................................................................................................................................................................................................................
1350 OMS 21-33
8DG42227DAAA 9.6
Issue 3 December 2012
Broadcast TV Service Management Create a Customer
Section III: Workflow for BTV Service Management
....................................................................................................................................................................................................................................

Create a Customer
When to use
This function allows the user to define the characteristics of the owner of one or more
BTV Elements.

Related information
After definition, the owner is permitted to use the services that are defined across the
boundaries of the managed network.
For a description about BTV Elements, refer to the topic “Managing Broadcast TV
Elements” (p. 21-5).
For a description about customers, refer to the topic “Customer description” (p. 18-8).

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Conditions
To get a positive result:
• The User Label must be different from the existing ones.

Task
From MS-GUI main window:
...................................................................................................................................................................................................

1 Select Action > Packet > Services > Create Customer.


Result: The Customer creation window is displayed.
To create a customer:
• Enter a User Label.
• Enter a Company (optional).
• Enter an Address (optional).
• Enter a Comment (optional).
...................................................................................................................................................................................................

2 Click Ok button.
Result: The customer is created.
The tree area and the Customer list are updated.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
21-34 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Broadcast TV Service Management Create Ethernet Service
Section III: Workflow for BTV Service Management
....................................................................................................................................................................................................................................

Create Ethernet Service


When to use
This function consists in creating an Ethernet Service related to a selected customer.

Related information
For a description about BTV Elements, refer to the topic “Managing Broadcast TV
Elements” (p. 21-5).
For a description about customers, refer to the topic “Ethernet Service description”
(p. 18-17).
If the creation action is required from the Customer List, the Customer field of this
creation window is automatically filled with the selected Customer.
The Ethernet Service can also be created using the wizard. The wizard automatically
create the Connection Oriented EVC associated to the service.

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Conditions
To get a positive result:
• A customer must exist.
• The User Label must be different from the existing.

Task
From MS-GUI main window:
...................................................................................................................................................................................................

1 Select Action > Packet > Services > Ethernet Service Creation.

....................................................................................................................................................................................................................................
1350 OMS 21-35
8DG42227DAAA 9.6
Issue 3 December 2012
Broadcast TV Service Management Create Ethernet Service
Section III: Workflow for BTV Service Management
....................................................................................................................................................................................................................................
Result: The Ethernet Service creation window is displayed.

Figure 21-10 Create Ethernet Service

Execute the following steps:


• Enter a Service User label.
• Select the Customer.
• Select the Service Type: EVPLINE.
• In the Comment field, the user indicates that the service is a BTV Service.
...................................................................................................................................................................................................

2 Click Ok button.
Result: The Ethernet Service is created.
The tree area and the Ethernet Service list are updated.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
21-36 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Broadcast TV Service Management Create a Connection Oriented EVC
Section III: Workflow for BTV Service Management
....................................................................................................................................................................................................................................

Create a Connection Oriented EVC


When to use
This function consists in creating an Ethernet Virtual Connection.

Related information
For a description about BTV Elements, refer to the topic: “Managing Broadcast TV
Elements” (p. 21-5).
For a description about the Connection Oriented EVC, refer to the topic: “Overview about
ETS Ethernet Virtual Connections” (p. 18-37).
If this action is required from the Service List, the Ethernet Service field of the EVC
Creation window, is filled with the service selected Service.
To select the right Ethernet Service and EVC Type fields, report you to the Error!
Reference source not found.
If Termination part is not or partially filled, the user has the possibility to add EVC
terminations from the Add EVC Termination menu.

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Conditions
To get a positive result:
• At least, one Ethernet Service must exist.
• The User Label must be not in use.
• Only one Root termination is authorized.
• The EVC Type must be compatible with the service type of the associated Ethernet
Service.
• The EVC Type must be compatible with the selected Traffic Type.
• The role of each EVC termination must be compatible with the EVC Type.

Task
From MS-GUI main window:
...................................................................................................................................................................................................

1 Select Action > Packet > Services > Connection Oriented (ETS) > Create EVC.

....................................................................................................................................................................................................................................
1350 OMS 21-37
8DG42227DAAA 9.6
Issue 3 December 2012
Broadcast TV Service Management Create a Connection Oriented EVC
Section III: Workflow for BTV Service Management
....................................................................................................................................................................................................................................
Result: The Connection Oriented EVC creation window is displayed.

Figure 21-11 EVC Any to any Creation window

....................................................................................................................................................................................................................................
21-38 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Broadcast TV Service Management Create a Connection Oriented EVC
Section III: Workflow for BTV Service Management
....................................................................................................................................................................................................................................
Execute the following steps:
• Enter an EVC User Label.
• Enter Ethernet Service.
• Select a Type: Any to any.
• Select a Traffic Type: Unicast.
• Select a Service Level (Premium, Gold, Silver, Bronze).
• Enter a Comment (optional).
• Enter an External Mark (optional). It can be used to identify external systems
having relations with the EVC (for example an ownership).
• In Termination part, enter a list of EVC terminations by using Add EVC
Termination button.
Execute the following steps:
– Select the NE or ENE user label by using the sensitive help.
– Select an Edge Port user label by using also the sensitive help.
– Select the Role of the termination (Root, Leaf, or Both).
...................................................................................................................................................................................................

2 Click Ok button.
Result: The EVC is created.
...................................................................................................................................................................................................

3 If EVC Type is Point to multipoint or Any to any, Ethernet Segments could be


automatically created:
In Ethernet part, if Create Ethernet box is selected, select a VLAN Model (Mapping or
Tunneling).
...................................................................................................................................................................................................

4 Choose a Traffic Descriptor (by using the sensitive help).


...................................................................................................................................................................................................

5 If the chosen Traffic Descriptor is Regulated, choose a Color Profile (by using the
sensitive help) which is associated to each Ethernet Segment.
...................................................................................................................................................................................................

6 Taking into account the EVC Type, the Traffic Type, the directionality, and the number of
terminations provided, all the needed Ethernet Segments are automatically created.
Result: The Connection Oriented EVC is created and the EVC list consequently
updated.
The Ethernet Segment created directly from EVC must be allocated and implemented.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS 21-39
8DG42227DAAA 9.6
Issue 3 December 2012
Broadcast TV Service Management Overview

....................................................................................................................................................................................................................................

Section IV: Bridge Based BTV Service

Overview
Purpose
This section provides information about the Bridge based BTV Service.

Contents

Overview about the Services 21-41


IGMP Snooping Management 21-42
IGMP Snooping State Management 21-44

....................................................................................................................................................................................................................................
21-40 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Broadcast TV Service Management Overview about the Services
Section IV: Bridge Based BTV Service
....................................................................................................................................................................................................................................

Overview about the Services


Workflow description
The management of Broadcast TV services, when the network is Connection Less based,
is achieved by means of following steps: the building of Ethernet connectivity on the top
of Provider Bridge and the optional configuration of IGMP Snooping on the desired
Network Elements.
The Workflow is the same as that explained in previous paragraphs “Section II: Workflow
for BTV construction” (p. 21-24) and “Section III: Workflow for BTV Service
Management” (p. 21-33) with following differences:
• the BTV Element is assigned to the domain created as provider.
• the EVC created is of type Connection Less.
• optionally the IGMP protocol can be configured as explained in following paragraph.

....................................................................................................................................................................................................................................
1350 OMS 21-41
8DG42227DAAA 9.6
Issue 3 December 2012
Broadcast TV Service Management IGMP Snooping Management
Section IV: Bridge Based BTV Service
....................................................................................................................................................................................................................................

IGMP Snooping Management


When to use
This procedure explains how to manage IGMP Snooping.

Related information
The Internet Group Management Protocol (IGMP) is a protocol designed to connect users
to a multicast tree for multimedia applications. IGMP is carried over IP. The IGMP
Snooping is only supported on Domain where the Bridge Type of contained NEs is
Provider, Virtual, or MAC Bridge.
The IGMP Snooping is managed through navigation toward 1350 OMS EML. Each
broadcast-channel supplier has one C-VLAN and one S-VLAN.

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.

Task
The user workflow to manage IGMP snooping is:
...................................................................................................................................................................................................

1 Define the bridge domain and assign the 1850 TSS 320 equipment to the domain.
...................................................................................................................................................................................................

2 Choose one S-VLAN for each video-service supplier (the C-VLAN is chosen by the
router).
...................................................................................................................................................................................................

3 Create the EVC for the video-service supplier. The EVC characteristics are:
• Virtual resource sharing.
• Full-meshed VLAN distribution.
• The S-VLAN identifying the video supplier.
• C-VLAN preservation is not mandatory (because of POP operation).
• The C-VLAN identifying the video supplier.

....................................................................................................................................................................................................................................
21-42 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Broadcast TV Service Management IGMP Snooping Management
Section IV: Bridge Based BTV Service
....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

4 Add one EVC termination for each host or DSLAM served by the video supplier
• Associate to the termination a Traffic Descriptor that selects the C-VLAN
corresponding to the video supplier which the host is subscribed to.
• For each defined DSLAM, EVC termination can optionally provide the PUSH
operation.
...................................................................................................................................................................................................

5 Add one EVC termination for the BSR


• Associate to the termination a Traffic Descriptor that selects the C-VLAN of the video
supplier3.
• For the defined BSR, EVC termination Must provide the POP operation.
...................................................................................................................................................................................................

6 Allocate and implement the EVC.


...................................................................................................................................................................................................

7 For each 1850 TSS 320 , start the navigation toward 1350 OMS EML:
• Enable the IGMP snooping for the video supplier S-VLAN.

E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS 21-43
8DG42227DAAA 9.6
Issue 3 December 2012
Broadcast TV Service Management IGMP Snooping State Management
Section IV: Bridge Based BTV Service
....................................................................................................................................................................................................................................

IGMP Snooping State Management


IGMP Snooping reminder
This function is evolved to provide a reminder helping the management of services to
enable the IGMP Snooping Protocol.
This reminder is important to reach two main goals:
• To remind the user to perform Navigation toward NEs only after having implemented
the EVC supporting the IGMP Snooping.
• To remind the user to perform Navigation toward NEs before De-Implementing an
EVC supporting the IGMP Snooping. This action also prevents errors during the
de-implementation phase.

EVC Definition
At EVC definition level, the user can optionally define the value of igmpSnooping
attribute. This operation is available only for EVPLAN, Extended EVPLAN, and BTV
EVC types.
In these cases, the possible values are:
• Enabled. Just to remind that the user has the intention to use the IGMP snooping
protocol on top of such EVC.
Possible scenarios:
– To enable the IGMP snooping immediately after having implemented the EVC.
– To disable the IGMP snooping immediately before de-implemented the EVC.
• Disabled. Just to remind that the user does not want to use the IGMP on that EVC.

EVC Implementation
When the user starts the EVC Implementation operation, and the attribute igmpEnabled is
set to Enabled, a pop-up window is raised to remind the user to perform a navigation
toward affected NE.
This operation is available only for Extended EVPLAN and BTV EVCs.
The pop-up window must be acknowledged by the user without further affect the
implementation procedure.

EVC De-Implementation
When the user starts the EVC De-Implementation operation and the attribute
igmpEnabled is set to Enabled, a pop-up window is raised to remind the user to perform a
navigation toward affected NE.
This operation is available only for Extended EVPLAN and BTV EVC types.

....................................................................................................................................................................................................................................
21-44 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Broadcast TV Service Management IGMP Snooping State Management
Section IV: Bridge Based BTV Service
....................................................................................................................................................................................................................................
The pop-up window can be:
• Acknowledged by the user with the option STOP the de-implementation procedure,
letting the user complete all the needed navigation.
• Acknowledged by the user with the option CONTINUE the de-implementation
procedure, when the user is aware that all Navigation Issues are already
accomplished.

EVC Modification
The Attribute igmpEnabled can be modified in the following cases:
• The EVC ServiceType is EVPLAN, extended EVPLAN or BTV.
• The EVC provisioningState can have any value.
The following situations must be managed:
– If the EVC is Implemented, the transition from Disable to Enable triggers the
pop-up window.
– If the EVC is Implemented, the transition from Enable to Disable triggers the
second pop-up window.
In all other cases, the modification of the igmpEnabled attribute is not allowed
and an explicit exception is returned.

....................................................................................................................................................................................................................................
1350 OMS 21-45
8DG42227DAAA 9.6
Issue 3 December 2012
Broadcast TV Service Management IGMP Snooping State Management

....................................................................................................................................................................................................................................

....................................................................................................................................................................................................................................
21-46 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
22 Network Supervision
22

Overview
Purpose
This chapter describes how to manage alarms and performance monitoring.

Contents

Managing alarms 22-2


Overview about alarms 22-2
Alarms from ISA E/FE/GE board 22-3
Alarms from ISA ES1/4 board 22-4
Alarms from ISA ES16 board 22-6
Alarms or Events on SDH paths from 1350 OMS SDH 22-8
Alarm status management 22-9
Alarm correlation and generation toward AS 22-11
Managing Fault Localization 22-12
Display the Fault Localization list 22-12
Description of Fault Localization 22-14
Manual Synchronization of Alarms on NE 22-15
Specific Behavior 22-16
Client Signal Fail Alarm Management 22-16

...................................................................................................................................................................................................................................
1350 OMS 22-1
8DG42227DAAA 9.6
Issue 3 December 2012
Network Supervision Overview about alarms
Managing alarms
....................................................................................................................................................................................................................................

Managing alarms

Overview about alarms


Manage elementary alarms
1350 OMS PKT provides the following services to manage elementary alarms (see
“Management Layers” (p. 11-5) and “Network architecture overview” (p. 11-7)):
• Current alarm management (with the history).
• Fault Localization.
For every alarm raised, a specific clear is sent.
In case of packet concatenation, only Packet GFP interface can generate alarms on TDM
termination.

Alarm probable cause


In the following, is given information about the probable cause of the alarm to understand
their meaning and origin:
• LOS (Loss of Signal) alarm covers the defects that occur in the following cases:
– Loss of electrical or optical power,.
– Failed Auto-negotiation process (LOS defect),.
– No synchronization (LOS defect),.
– No comma detection (LOF defect),.
– Card failure or card missing (ISA ES16),.
– URU alarm in case of incorrect manual provisioning of Ethernet accesses (ISA
ES16).
• ISA NE raises a TSF (Trail Signal Failed) or DEG (trail signal Degraded) alarm after
detecting a defect due to failed SDH VCs (TSF or TSD).
• ISA NE raises a PLM (Pay Load Mismatch) alarm after detecting an SDH VC
problem (related to packet or virtual concatenation).
• ISA NE raises a GTM (GFP Type Mismatch) alarm after detecting a GFP format
mismatch.
• ISA NE raises a LOF (Loss of Frame) alarm after detecting an Ethernet defect.
• ISA NE raises a CSF (Client Signal Failure) alarm when a failure is detected on one
Customer Edge.

....................................................................................................................................................................................................................................
22-2 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Network Supervision Alarms from ISA E/FE/GE board
Managing alarms
....................................................................................................................................................................................................................................

Alarms from ISA E/FE/GE board


Overview
In the following table is given the list of elementary alarms generated by ISA E/FE/GE
boards and the mapping with elementary objects inside 1350 OMS SDH and 1350 OMS
PKT.
Such alarms must be managed through 1350 OMS SDH.

Table 22-1 ISA E/FE/GE alarms

Alarm [Default Probable Cause. NE object [1350 OMS 1350 OMS SDH
severity = Path PKT object]. Object.
alarm ASAP].
Loss of GFP[MAJ]. Loss of frame. GDataTransportCTPbid. NAP.
[TDM termination].
AIS Alarm Indication AIS. GDataTransportCTPbid. NAP.
Signal[NAL]. [TDM termination].
SignalLabelMis- SignalLabelMis- GDataTransportCTPbid. NAP.
match[MAJ]. match. [TDM termination].
Loss of Signal[MAJ]. Loss of Signal. GMauTTP[Ethernet Port]. PORT.
URU on Physical Underlying Resource GMauTTP[Ethernet Port]. PORT.
Interface[MAJ]. Unavailable.

....................................................................................................................................................................................................................................
1350 OMS 22-3
8DG42227DAAA 9.6
Issue 3 December 2012
Network Supervision Alarms from ISA ES1/4 board
Managing alarms
....................................................................................................................................................................................................................................

Alarms from ISA ES1/4 board


Overview
In the following table, the list of elementary alarms is given. These alarms are generated
by ISA ES1/4 boards. The mapping with elementary objects inside 1350 OMS PKTis also
given in the table.
Such alarms must be managed directly from NE through SNMP.

Table 22-2 ISA ES1/4 alarms or events

Alarm/Notif. Board Probable NE object. Notes.


[Default Re- Cause. [1350 OMS
severity = lease. PKT object].
Path alarm
ASAP].
Loss of 1.0. Loss of frame. GFP interface.
GFP[MAJ]. [TDM
termination].
TSF[MAJ]. 1.0. Trail Signal Fail. GFP interface. When the GFP interface is
[TDM connected to an SDH Path,
termination]. a correspondent alarm
exists on SDH Path (NB:
no SDH path alarm in case
of SDH independence).
TSF[MAJ]. 1.0. Trail Signal Fail. LAPS interface. When the LAPS interface
[TDM is connected to an SDH
termination]. Path, a correspondent
alarm exists on SDH Path
(NB: no SDH path alarm
in case of SDH
independence).
Loss of Signal. 1.0. Loss of Signal. ETHERNET It summarizes also URU
[MAJ]. Local. (until URU is explicitly
[Ethernet port]. managed).

GTM[MIN]. 1.0. GFP Type GFP interface.


Mismatch. [TDM
termination].
PLM[MAJ]. 1.0. Payload GFP interface.
Mismatch. [TDM
termination].
PLM[MAJ]. 1.0. Payload LAPS interface.
Mismatch. [TDM
termination].

....................................................................................................................................................................................................................................
22-4 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Network Supervision Alarms from ISA ES1/4 board
Managing alarms
....................................................................................................................................................................................................................................
Table 22-2 ISA ES1/4 alarms or events (continued)

Alarm/Notif. Board Probable NE object. Notes.


[Default Re- Cause. [1350 OMS
severity = lease. PKT object].
Path alarm
ASAP].
DEG[NAL]. 1.0. Degrade. GFP interface. When the GFP interface is
[TDM connected to an SDH Path,
termination]. a correspondent
Bandwidth Reduced alarm
exists on SDH Path (NB:
no SDH path alarm in case
of SDH independence).
DEG[NAL]. 1.0. Degrade. LAPS interface. When the LAPS interface
[TDM is connected to an SDH
termination]. Path, a correspondent
Bandwidth Reduced alarm
exists on SDH Path (NB:
no SDH path alarm in case
of SDH independence).
CSF. 1.2. Client Signal GFP interface. The CSF have to be
Fail. [TDM always managed as it
termination]. highlight problems in case
of NE isolation and in case
of SDH independence.

....................................................................................................................................................................................................................................
1350 OMS 22-5
8DG42227DAAA 9.6
Issue 3 December 2012
Network Supervision Alarms from ISA ES16 board
Managing alarms
....................................................................................................................................................................................................................................

Alarms from ISA ES16 board


Overview
In the following table is given the list of elementary alarms generated by ISA ES16 board
and the mapping with elementary objects inside 1350 OMS PKT.
Such alarms must be managed directly from NE (through SNMP).

Table 22-3 ISA ES16 alarms or events

Alarm/Notif. Board Probable NE object. Notes.


[Default Re- Cause. [1350 OMS
severity = lease. PKT object].
Path alarm
ASAP].
Loss of 2.0. Loss of frame. GFP interface.
GFP[MAJ]. [TDM
termination].
TSF[MAJ]. 2.0. Trail Signal Fail. GFP interface. When the GFP interface is
[TDM connected to an SDH Path,
termination]. a correspondent alarm
exists on SDH Path (NB:
no SDH path alarm in case
of SDH independence).
TSF[MAJ]. 2.0. Trail Signal Fail. HDLC interface. When the HDLC interface
[TDM is connected to an SDH
termination]. Path, a correspondent
alarm exists on SDH Path
(NB: no SDH path alarm
in case of SDH
independence).
TSF[MAJ]. 2.0. Trail Signal Fail. LAPS interface. When the LAPS interface
[TDM is connected to an SDH
termination]. Path, a correspondent
alarm exists on SDH Path
(NB: no SDH path alarm
in case of SDH
independence).
Loss of Signal. 2.0. Loss of Signal. ETHERNET It summarizes also URU
[MAJ]. Local. (until URU is explicitly
[Ethernet port]. managed).

GTM[MIN]. 2.0. GFP Type GFP interface.


Mismatch. [TDM
termination].

....................................................................................................................................................................................................................................
22-6 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Network Supervision Alarms from ISA ES16 board
Managing alarms
....................................................................................................................................................................................................................................
Table 22-3 ISA ES16 alarms or events (continued)

Alarm/Notif. Board Probable NE object. Notes.


[Default Re- Cause. [1350 OMS
severity = lease. PKT object].
Path alarm
ASAP].
PLM[MAJ]. 2.0. Payload GFP interface.
Mismatch. [TDM
termination].
PLM[MAJ]. 2.0. Payload HDLC interface.
Mismatch. [TDM
termination].
PLM[MAJ]. 2.0. Payload LAPS interface.
Mismatch. [TDM
termination].
DEG[NAL]. 2.0. Degrade. GFP interface. When the GFP interface is
[TDM connected to an SDH Path,
termination]. a correspondent
Bandwidth Reduced alarm
exists on SDH Path (NB:
no SDH path alarm in case
of SDH independence).
DEG[NAL]. 2.0. Degrade. HDLC interface. When the HDLC interface
[TDM is connected to an SDH
termination]. Path, a correspondent
Bandwidth Reduced alarm
exists on SDH Path (NB:
no SDH path alarm in case
of SDH independence.
DEG[NAL]. 2.0. Degrade. LAPS interface. When the LAPS interface
[TDM is connected to an SDH
termination]. Path, a correspondent
Bandwidth Reduced alarm
exists on SDH Path (NB:
no SDH path alarm in case
of SDH independence).
CSF. 2.1. Client Signal GFP interface. The CSF have to be
Fail. [TDM always managed as it
termination]. highlight problems in case
of NE isolation and in case
of SDH independence.

....................................................................................................................................................................................................................................
1350 OMS 22-7
8DG42227DAAA 9.6
Issue 3 December 2012
Network Supervision Alarms or Events on SDH paths from 1350 OMS SDH
Managing alarms
....................................................................................................................................................................................................................................

Alarms or Events on SDH paths from 1350 OMS SDH


Overview
All SDH paths alarms are available on 1350 OMS SDH.
Objects directly affected on 1350 OMS PKT are:
• SDH Path,.
• Link Over TDM.
Table 22-4 SDH Path Alarm management

Alarm. 1350 Probable Cause. Derived from Notes.


OMS alarms on
SDH 1350 OMS SDH
Ob- element
ject. object.
Major. Path. TransportFailure. NAP,. These three alarms
Boundary CTP,. contribute to the
management of 1350
DATA PORT.
OMS SDH operational
Major. Path. TransportIncomingFailure. Boundary CTP. State.
Major. Path. ExBer. NAP.
Major. Path. TransportOutgoingFailure. Boundary CTP,.
DATA NAP.
Minor. Path. BandwidthReduced. DATA NAP. Useful to catch bandwidth
reduction for path with
packet concatenation.
Major. PAth. LCASProtocolError. DATA NAP.

....................................................................................................................................................................................................................................
22-8 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Network Supervision Alarm status management
Managing alarms
....................................................................................................................................................................................................................................

Alarm status management


Overview
The following figure shows the 1350 OMS PKT entities affected by NE or 1350 OMS
SDH alarms.

....................................................................................................................................................................................................................................
1350 OMS 22-9
8DG42227DAAA 9.6
Issue 3 December 2012
Network Supervision Alarm status management
Managing alarms
....................................................................................................................................................................................................................................

Figure 22-1 Alarm status management

....................................................................................................................................................................................................................................
22-10 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Network Supervision Alarm correlation and generation toward AS
Managing alarms
....................................................................................................................................................................................................................................

Alarm correlation and generation toward AS


Overview
The following figure is entirely related to 1350 OMS PKT and shows:
• how alarms or events are internally propagated,.
• which are the affected entities,.
• which objects generate alarms toward AS component.

Figure 22-2 Alarm correlation

....................................................................................................................................................................................................................................
1350 OMS 22-11
8DG42227DAAA 9.6
Issue 3 December 2012
Network Supervision Display the Fault Localization list

....................................................................................................................................................................................................................................

Managing Fault Localization

Display the Fault Localization list


When to use
This function consists in displaying alarms for a Link Over TDM, a Link Over Cable, an
Ethernet Segment or an LSP Tunnel.

Related information
See the following topic in this document:“Fault Localization” (p. 11-69).
If the Entity Type is equal to TDM termination (Ethernet Port,Edge Port), Show Alarms
command is not available.
The 1350 OMS PKT displays up to 100 alarms. When the number of alarms is superior to
100, a confirmation box is displayed. After confirmation, the truncated list is displayed.

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
Conditions
To get a positive result:
• The Availability status of the entity must be either Degraded or In Failure.

Task
From MS-GUI main window:
...................................................................................................................................................................................................

1 Select one of the following menus:


• Search > Packet > Construction > Transport Links > Links Over TDM (Sdh/Sonet).
• Search > Packet > Construction > Transport Links > Links Over Cable.
• Search > Packet > Services > Connection Oriented (ETS) > Ethernet Segments.
• Search > Packet > MPLS > LSP Tunnels.
Result: The list window is shown.
...................................................................................................................................................................................................

2 Select an item in the list.

....................................................................................................................................................................................................................................
22-12 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Network Supervision Display the Fault Localization list
Managing Fault Localization
....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

3 Select Search > Fault Localization.


Result: The list window is displayed.
See the following topic in this document: “Description of Fault Localization”
(p. 22-14)
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS 22-13
8DG42227DAAA 9.6
Issue 3 December 2012
Network Supervision Description of Fault Localization
Managing Fault Localization
....................................................................................................................................................................................................................................

Description of Fault Localization


Attributes of Fault Localization
The attributes displayed for each entity are:
• User Label.
• Entity type.
• Alarm / Availability State.
• Specific Fault Date.
• Probable Cause.
• Operator Label
• NE User Label
• Global Alarm Date

....................................................................................................................................................................................................................................
22-14 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Network Supervision Manual Synchronization of Alarms on NE
Managing Fault Localization
....................................................................................................................................................................................................................................

Manual Synchronization of Alarms on NE


When to use
This function allows the user to re-synchronize, on NE basis, all alarms currently existing
on a given NE. The operation can be started by the user.

Related information
See the following topic in this document:“Fault Localization” (p. 11-69).

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.

Task
From MS-GUI main window:
...................................................................................................................................................................................................

1 Select Search > Packet > Construction > Network Elements > Defined NEs.
Result: The list window is shown.
...................................................................................................................................................................................................

2 Select the NE and issue Action > Network Elements > Alarm Synchronization.
...................................................................................................................................................................................................

3 Select one of the options in the confirmation box. Refer to the procedure “Confirm the
action” (p. 11-40).
Result: If the operation is confirmed, all existing alarms for the selected NE are
resynchronized toward Fault Management application and inside 1350 OMS PKT
application.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS 22-15
8DG42227DAAA 9.6
Issue 3 December 2012
Network Supervision Overview
Specific Behavior
....................................................................................................................................................................................................................................

Specific Behavior

Client Signal Fail Alarm Management


When to use
This procedure explains how to manage Client Signal Fail.

Related Information
Following conditions must be verified when the CSF alarm feature is activated:
• Service is EPLINE, built upon a single SDH path with transparent GFP or EPLAN
emulating BTV services.
• ISA NE at extremities supports CSF alarms and consequent actions (ES1/4 1.2, ES16
2.1).
• Autonegotiation must be enabled on local ports (Reminder: Autonegotiation is not
supported on GE interfaces. In consequence, CSF cannot be enabled if GE is
involved).
Note: No check is done by the 1350 OMS PKT from this point of view because
everything is managed by the user during Navigation.

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.

Task
The global scenario is in the following provided:
...................................................................................................................................................................................................

1 Select an Ethernet Service.


...................................................................................................................................................................................................

2 Retrieve Edge Ports terminating the Ethernet Service.


Result: For each retrieved Edge Port, a Navigation toward 1350 OMS EML is started
to configure the CSF consequent Action (laser shut down enabled).
...................................................................................................................................................................................................

3 Retrieve the Transport Link used by the service.

....................................................................................................................................................................................................................................
22-16 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Network Supervision Client Signal Fail Alarm Management
Specific Behavior
....................................................................................................................................................................................................................................
Result: TDM terminations are retrieved.
For each retrieved TDM termination, a Navigation toward 1350 OMS EML is started
to configure the CSF Capability Support (CSF bidirectional propagation).
In case of BTV service emulation, the TDM termination interested to VC-AIS
propagation are connected to Broadcast SDH path acting as Sources.
After this scenario, GFP-CSF frame insertion (or VC-AIS propagation) and
consequent actions are automatically configured on the PEs accordingly.
...................................................................................................................................................................................................

4 If the service is implemented or commissioned, the CSF feature and consequently action
can be enabled or disabled.
Service implementation.
Result: CSF consequent action disabling (Mandatory for resetting the possible CSF
configuration, already present on the NE).
CSF consequent action enabling.
...................................................................................................................................................................................................

5 If the service is de-implemented, the CSF feature and consequently action can be
disabled.
Result: CSF consequent action disabling.
Service de-implementation.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS 22-17
8DG42227DAAA 9.6
Issue 3 December 2012
Network Supervision Client Signal Fail Alarm Management

....................................................................................................................................................................................................................................

....................................................................................................................................................................................................................................
22-18 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
23 Network Utilities
23

Overview
Purpose
This chapter describes how to use NE audit, alignment, force alignment, reservation, and
recovery.

Contents

Audit, Alignment, Reservation, Recovery 23-2


The AAR procedure 23-3
NE Audit tool 23-6
Results of Audit 23-8
Reservation tool 23-13
Align Up of Ethernet Domain Data 23-15
Start the audit, alignment, reserve procedure 23-16
Stop the audit, alignment, reserve procedure 23-17
View the list of auditable NEs 23-18
Description of the list of auditable NEs 23-19
Perform an audit on a NE 23-20
View the list of Audited NEs 23-22
Description of the list of Audited NEs 23-23
View the results of an audit 23-24
Perform an alignment on a NE 23-26
NE Alignment tool 23-27
Workflow to align up Ethernet Data 23-28
ISA Board Replacement Procedure 23-30
Perform a reservation on a NE 23-32
Restore procedure for ISA board 23-33

...................................................................................................................................................................................................................................
1350 OMS 23-1
8DG42227DAAA 9.6
Issue 3 December 2012
Network Utilities Overview
Audit, Alignment, Reservation, Recovery
....................................................................................................................................................................................................................................

Audit, Alignment, Reservation, Recovery

Overview
Purpose
This section provides information about the Audit, Alignment, Reservation, and
Recovery.

Contents

The AAR procedure 23-3


NE Audit tool 23-6
Results of Audit 23-8
Reservation tool 23-13
Align Up of Ethernet Domain Data 23-15
Start the audit, alignment, reserve procedure 23-16
Stop the audit, alignment, reserve procedure 23-17
View the list of auditable NEs 23-18
Description of the list of auditable NEs 23-19
Perform an audit on a NE 23-20
View the list of Audited NEs 23-22
Description of the list of Audited NEs 23-23
View the results of an audit 23-24
Perform an alignment on a NE 23-26

....................................................................................................................................................................................................................................
23-2 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Network Utilities The AAR procedure
Audit, Alignment, Reservation, Recovery
....................................................................................................................................................................................................................................

The AAR procedure


Maintain the consistency of the image of the network
The aim of these tools is to check and maintain the consistency between the network and
the 1350 OMS PKT database.
The utilities supplied are Audit, Alignment, and Force Alignment, and Reserve and
Recovery.
• “Audit” (p. 23-3) is in charge of detecting the differences between the network and
the databases.
• “Alignment” (p. 23-4) and “Force Alignment” (p. 23-4) are in charge to fix
discrepancies between the network and the databases.
• “Reservation” (p. 23-4) and “Recovery” (p. 23-5) are in charge to re build in the
database, objects created without 1350 OMS PKT or before 1350 OMS PKT
installation.
The utilities apply on all the network, one or a set of subnetworks, one or a set of NE.
The tools works into a session. The session begins with the Start command and ends with
the Stop command.
Start procedure: The user has the possibility to start an audit, an alignment, or a
reservation on one or more NEs.
At the beginning of an audit, the selected NEs are locked. Locked entities are not
modifiable. All the read-only operations are available.
Stop procedure: At any time of the audit, alignment, reserve session, the user can close
the session. An “unlock” of the locked NEs is done.

Audit
The Audit identify the differences between the NE MIB in the network and the database
of the PKT. The Audit reports differences in a text file.
The Audit performs comparison on a per-functional domain basis. For each domain
comparison is done on a per-elementary object basis.
The Audit applies on a NE or list of NEs. Only SNMP board can be Audited.
The Audit builds a file that contains all managed entities presenting differences between
the network and the database. Differences are detected by NE. The audit file contains:
• The objects that exist in the database but not in the NE.
• The objects that exist in NE but not in database.
• The objects present both in the database and in the NE but having different setting.
The result of the audit procedure is stored in a text file available to the user. The user is in
charge to display the results and proceed with the operations of align, force align, reserve,
or recovery.
For details on Audit tool, refer to “NE Audit tool” (p. 23-6).

....................................................................................................................................................................................................................................
1350 OMS 23-3
8DG42227DAAA 9.6
Issue 3 December 2012
Network Utilities The AAR procedure
Audit, Alignment, Reservation, Recovery
....................................................................................................................................................................................................................................
Alignment
The user can activate the Alignment on the audited NEs.
The Alignment procedure does not affect the traffic existing on the network.
The alignment procedure downloads to the network the entities contained in 1350 OMS
PKT database and not contained in the NE.

Force Alignment
The user can activate the Force Alignment on the audited NEs.
The Force Alignment procedure affect the traffic existing on the network.
The Force Alignment:
• Adds to NE the entities contained in 1350 OMS PKT database and not contained in
the NE.
• Deletes the objects in the NE not contained in 1350 OMS PKT.
• Updates in the NE the objects presenting discrepancies in respect to the 1350 OMS
PKT setting.
The Force Alignment aligns the characteristics of Transport Link, Traffic Descriptors,
Traffic Classifiers, cross connections, LERconnections, and LSR connections. The
specific data, like indexes, related to the NE and stored only in the 1350 OMS PKT
database are update in the database.

Reservation
The user can activate the Reservation on the audited NEs.
Objects created without 1350 OMS PKT are not in the database, however they exist in the
network and have resources associated.
Reservation prevents the user from using network resources that are in-use but not
already known by the 1350 OMS PKT.
The network resources (terminations, MPLS labels, Transport Link bandwidth) are
reserved. This reservation is visible by the operator by the fact that one or more
terminations are no more available for creating new paths (Ethernet Segments, LSPs), and
by a portion of reserved bandwidth consumed on the Transport Links. The associated
objects are created inside the database (Traffic descriptors (MPLS and Ethernet), Traffic
Classifier, Colour Profiles, Ethernet cross connections, LSR connections, and LER
connections). A part from the connections, those objects are visible and usable by the
operator after the reservation phase.
The Reserve provides the discovery of an existing Ethernet network:
• NE and Ethernet physical ports.
• Link Over TDM (supporting directly Ethernet or MPLS) and TDM termination
points.
The NEs are retrieved defining the EML to which 1350 OMS PKT is connected and by
1350 OMS SDH (for E/FE/GE Q3 boards).
....................................................................................................................................................................................................................................
23-4 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Network Utilities The AAR procedure
Audit, Alignment, Reservation, Recovery
....................................................................................................................................................................................................................................
This information is stored in 1350 OMS PKT database. This information is available for
MPLS infrastructure or directly for Ethernet Service usage (Link Over TDM for Ethernet
Segments and Ethernet physical ports). MPLS infrastructure is Link Over TDM devoted
to MPLS. Ethernet Service usage involves Link Over TDM, Ethernet Segments, and
Ethernet physical ports.
Note: The Ethernet physical port can be used also to build the cable (or Martini cable
or Ethernet cable).
For details on Reservation tool, refer to “Reservation tool” (p. 23-13).

Recovery
The user ask the Recovery on the reserved NE.
The connectivity entities (like Ethernet Segments or MPLS LSP Tunnel) are built and
then the discovered connectivity entities are stored in 1350 OMS PKT database.
The LSP tunnel and VC-LSP are defined and allocated. The Ethernet Segments and EVCs
are defined and allocated.
The abstract objects are recovered inside the database. The paths are automatically
created. Final provisioning state of LSPs and Ethernet Segment is commissioned. A
minimum EVC, Ethernet services and Customers are created for holding the recovered
Ethernet Segments.
The user can be asked to help the system to recover managed connectivity when complex
objects are not automatically recoverable by the system.

....................................................................................................................................................................................................................................
1350 OMS 23-5
8DG42227DAAA 9.6
Issue 3 December 2012
Network Utilities NE Audit tool
Audit, Alignment, Reservation, Recovery
....................................................................................................................................................................................................................................

NE Audit tool
Overview
The NE MIB Audit function available from 1350 OMS PKT can basically detect and then
report two categories of misalignments:
• “Delta+” misalignments.
“Delta+” misalignments refer to resources existing in 1350 OMS PKT DB but not in
the NE MIB.
The case occurs when 1350 OMS PKT implements Ethernet Services on a given ISA
Board and then the Board itself must be replaced. The case occurs also when a MIB
restore is launched to recover a previously stored MIB Backup. Alternatively, the case
occurs when 1320CT and 1350 OMS EML users remove services or resources
previously provisioned by 1350 OMS PKT.
• “Delta-” misalignments.
“Delta-” misalignments refer to resources existing in the NE MIB but not in 1350
OMS PKT DB.
The case occurs when 1350 OMS PKT de-implements Ethernet Services on a given
ISA Board and then the Board itself is replaced. The case occurs also when a MIB
restore is launched to recover a previously stored MIB Backup. Alternatively, the case
occurs the case when 1320CT and 1350 OMS EML users create new services or
resources (bypassing security controls).
• “Delta” misalignments.
“Delta” misalignments refer to resources existing in both NE MIB and 1350 OMS
PKT DB, but with different attribute values.
The case occurs when 1320CT and 1350 OMS EML modify directly services or
resources in the NE MIB bypassing security mechanism.

Recovery of the misalignments


If a misalignment exists between the 1350 OMS PKT and NEs, the audit feature provides
the user with a means to detect. This situation happens in different cases:
• At installation time of the 1350 OMS PKT upon an existing network.
• After a long period during which the 1350 OMS PKT has been disconnected from the
network.
• After the local access control (LAC) has been granted on a NE.
• If the network has been configured without using the 1350 OMS PKT, operating the
1350 OMS EML or the Craft Terminal directly.
The Audit operation consists in comparing the content of the NE MIB with the content of
the 1350 OMS PKT database.
The user selects one or more NEs and requests the audit.

....................................................................................................................................................................................................................................
23-6 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Network Utilities NE Audit tool
Audit, Alignment, Reservation, Recovery
....................................................................................................................................................................................................................................
On the basis of the NE data uploaded from the NE MIB and the NE data stored in the
database, the 1350 OMS PKT performs a comparison. The differences are classified as
follow:
1. Data existing in the NE and missing in 1350 OMS PKT.
2. Data missing in the NE and existing in 1350 OMS PKT.
3. Different data using the same resources in NE and 1350 OMS PKT.
The result of the audit procedure is stored in a text file that is made available to the user.
On the basis of the information provided in the text file, the user can proceed with one of
the following operations:
• Display the audit result.
• Reservation-Recovery to resume the situation described in 1.
• Alignment to resume the situation described in 2.
• Forced alignment to resume the situation described 3. Alternatively the situation can
be resumed as follow: the user can directly manage the conflict operating the 1350
OMS EML or the Craft Terminal.
When an audit is started on a NE, this NE is locked to avoid any modification of its MIB
during the procedure life time. On a locked NE:
• It is impossible for any user to delete this NE.
• Another audit session cannot work with this NE. One NE can be locked only by one
audit.
• From outside the audit, alignment, reserve procedure is impossible to download or
upload information into or from the NE MIB.
• from any session is possible to do any other operation (for example: display
properties, allocate Ethernet Segment, create traffic profile …).
The “locked NE” information is stored in database. At the end of the procedure, the NEs
locked in this procedure are unlocked.
The audit result is stored in a text file in XML format.

....................................................................................................................................................................................................................................
1350 OMS 23-7
8DG42227DAAA 9.6
Issue 3 December 2012
Network Utilities Results of Audit
Audit, Alignment, Reservation, Recovery
....................................................................................................................................................................................................................................

Results of Audit
Per domain comparison
Here are the domains compared during an audit (and for each domain, a list of concerned
entities and their compared attributes):
• “Construction domain” (p. 23-8).
• “Ethernet domain” (p. 23-8).
• “MPLS domain” (p. 23-10).
• “T-MPLS domain” (p. 23-11).

Construction domain
Attributes for Construction domain:
• Attributes of TDM terminations entities:
– TDM termination User Label.
– Protocol type.
– Supported layer.
• Attributes of Ethernet Physical Ports entities:
– Port User Label.
– Interface type.
– Interface rate.
– Duplex mode.
– Auto Negotiation State.
– Supported layer.
– Aggregation Id.
– Aggregation Ports.
– Client type .
• Attributes of Network Element entity
– Bridge type.

Ethernet domain
Attributes for Ethernet domain:
• Attributes of interfaces entities for Edge ports and Ethernet end points:
– Interface MIB index.
– Effective bandwidth.
– Activation status (interface status).
– VLAN Tag Protocol Type .
• Attributes of Traffic Descriptors:
– Identifier.
– COS.
....................................................................................................................................................................................................................................
23-8 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Network Utilities Results of Audit
Audit, Alignment, Reservation, Recovery
....................................................................................................................................................................................................................................
– CIR.
– PIR.
– CBS.
– PBS.
• Attributes of Traffic Classifiers entities:
– Inflow Identifier.
– Classifier Identifier.
– VLAN Identifier.
– VLAN Max.
– Priority.
– Priority MAX.
• Color Profiles entities
– Color Profile MIB index.
– Color for priority 0 to 7.
• Attributes of Connections, for Inflow:
– Inflow Identifier.
– Inflow Service type.
– Inflow Interface index (only if In Service type equal to Ethernet),.
– Inflow MPLS Tunnel index (only if In Service Type equal to MPLS),.
– Inflow MPLS Tunnel instance (only if In Service Type equal to MPLS).
Attributes of Traffic entities for Inflow:
– Traffic Descriptor Identifier.
– Connection cast type.
– Policy Mode.
– Color Profile Identifier.
– VLAN Pop,.
– VLAN push (VLAN Id, Priority mode, Green priority, Yellow priority),.
– the “In” and “Out” connection extremities information couple attributes.
Attributes of Connections, for Outflow:
– Outflow Identifier.
– Outflow Service type.
– Outflow Interface index (only if Out Service type equal to Ethernet).
– Outflow MPLS Tunnel index (only if Out Service Type equal to MPLS).
– in MPLS Tunnel instance (only if Out Service Type equal to MPLS).
Attributes of Connections entities for Traffic Descriptor
– Traffic Descriptor MIB index.
– Traffic type (cast type).
– Policy mode.
– Color Profile.
....................................................................................................................................................................................................................................
1350 OMS 23-9
8DG42227DAAA 9.6
Issue 3 December 2012
Network Utilities Results of Audit
Audit, Alignment, Reservation, Recovery
....................................................................................................................................................................................................................................
– VLAN Pop.
– VLAN push (VLAN Id, Priority mode, Green priority, Yellow priority).
– the “In” and “Out” connection extremities information couple attributes.

MPLS domain
Attributes of MPLS domain:
• Attributes of MPLS Interfaces entities
– Interface identifier.
– Label.
– Service Type.
– Effective bandwidth.
– Static MPLS label range (min and max integers).
– Activation status (up or down).
• Attributes of Traffic Descriptors entities
– Traffic Descriptor MIB index.
– Traffic type or Qos (BE, EF, AF, traffic parameters (PIR, CIR, PBS, CBS).
– Activation status (up or down).
• Attributes of LSP tunnel cross connections entities
– LSP tunnel identifier.
– MIB indexes (tunnel index and tunnel instance).
– Type (LSR,LER Ingress, LER Egress).
– Connection role.
– Traffic Descriptor MIB index.
– Cast type.
– Policy mode (enabled, disabled).
– Ingress termination identifier.
– Ingress lower MPLS label.
– Egress termination identifier.
– Egress lower MPLS label.
– Activation status (up or down).
• For VC-LSP LER connections, the entities are:
– VC-LSP identifier.
– MIB indexes (tunnel index and tunnel instance).
– Type (LER Ingress or LER Egress).
– Traffic Descriptor MIB index.
– Cast type.
– Policy mode (enabled, disabled).

....................................................................................................................................................................................................................................
23-10 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Network Utilities Results of Audit
Audit, Alignment, Reservation, Recovery
....................................................................................................................................................................................................................................
– LER connection (termination identifier, Lower PLS label, Upper MPLS label).
– Activation status (up or down) attributes.

T-MPLS domain
Attributes of T-MPLS domain:
• Attributes of Nodes:
– Egressing PHB profile.
– Five Classes.
• Attributes of Ports:
– Access ID.
– Administrative State.
• Attributes of T-MPLS Segments:
– Access ID.
– Administrative State.
– Segment Dir.
– Trail Layer.
– Traffic Descriptor MIB index.
– In Label.
– Out Label.
– Mep Enabling.
• Attributes of Cross Connections:
– Access ID.
– Administrative state.
– Segment Dir.
– Trail Layer.
• Attributes of Node TD:
– Access Id.
– COS.
– CIR.
– PIR.
– CBS.
– PBS.
• Attributes of Mep:
– Access ID.
– Cv TX.
– Cv RX.

....................................................................................................................................................................................................................................
1350 OMS 23-11
8DG42227DAAA 9.6
Issue 3 December 2012
Network Utilities Results of Audit
Audit, Alignment, Reservation, Recovery
....................................................................................................................................................................................................................................
• Attributes of Protection Groups:
– Access ID.
– HoldOffTime.
– RevertTime.

....................................................................................................................................................................................................................................
23-12 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Network Utilities Reservation tool
Audit, Alignment, Reservation, Recovery
....................................................................................................................................................................................................................................

Reservation tool
Overview
The reservation operation prevent the use of resources and allow the Recovery tool to
insert in the 1350 OMS PKT database the resources discovered in the NE MIB and not
present in the 1350 OMS PKT database:
• Traffic Descriptors.
• Traffic Classifiers.
• Color Profiles.
• Ethernet connections.
• MPLS connections.

Reservation for Ethernet domain


Reservation operation is in charge of reserving Traffic Descriptors, Color Profiles, Traffic
Classifiers, and Ethernet cross connections. Entities present in the NE MIB but not known
by 1350 OMS PKT, are imported into the 1350 OMS PKT with the special status of
“reserved”.
The status of “reserved” is used in the Recovery phase to rebuild Ethernet flows and
services.
All the entities marked as “reserved” are not visible to the user, except for Traffic
Descriptors, Color Profiles, and Traffic Classifiers. They are immediately available to the
user that can use them.
The recovered entities, even if they are associated to flow on the NE (that is not
provisioned by the 1350 OMS PKT), are not considered “in use”.
For example, they can be deleted from the 1350 OMS PKT without affecting the NE.
For Traffic Descriptors, Color Profiles, and Traffic Classifiers no duplicates are created. If
a Traffic Descriptor recovered has the same of a Traffic Descriptor that exists into the
1350 OMS PKT, the latter entity is reused. The former one is associated to it. Traffic
Descriptor attributes are CoS, CIR, PIR, CBS, PBS.

Reservation for MPLS domain


Reservation operation is in charge of reserving MPLS Traffic Descriptors, LSP Tunnels
connections, and VC-LSP connections.
The NE MIB resources which have not been uploaded, are stored in the 1350 OMS PKT
database. The 1350 OMS PKT resources are affected with the consumption of these
resources.
The user can recover and use the Traffic Descriptor used or not used by connections. The
deletion of the Traffic Descriptor removes it from the 1350 OMS PKT database but leave
it in the NE. A default user label is generated by the MPLS recovery component.

....................................................................................................................................................................................................................................
1350 OMS 23-13
8DG42227DAAA 9.6
Issue 3 December 2012
Network Utilities Reservation tool
Audit, Alignment, Reservation, Recovery
....................................................................................................................................................................................................................................
In the LSP Tunnel connections, the used MPLS labels are marked reserved for the
Transport Link in the 1350 OMS PKT database.
If two connections at the extremities of the path share the same MPLS label, the MPLS
label consumed only once.
The consuming bandwidth is affected on the corresponding Transport Links. For an LSR,
the Transport Links affected are two. For a LER, the Transport Link affected is one.
If two connections at the extremities of the path concern the same Transport Link
bandwidth is consumed only once.
In the VC-LSP connections, the used MPLS labels are marked “reserved” for the
Transport Link in the 1350 OMS PKT database.
If two connections at the extremities of the same LSP tunnel share the same MPLS label,
the MPLS label is consumed only once.
The consuming bandwidth is affected on the corresponding LSP tunnel or Transport Link.
If two connections at the extremities of the same LSP tunnel share the same Transport
Link, the bandwidth is consumed only once.

....................................................................................................................................................................................................................................
23-14 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Network Utilities Align Up of Ethernet Domain Data
Audit, Alignment, Reservation, Recovery
....................................................................................................................................................................................................................................

Align Up of Ethernet Domain Data


Overview
The Align Up function allows a selective (user driven) realignment between 1350 OMS
PKT and NE content.
The scope of this function is generic and can be applied in the contexts:
• after a Network Manager migration to import from NE (overwriting data in the 1350
OMS PKT) the running value of the introduced Attribute.
• on user demand.
In both cases, the Audit function invocation is a necessary precondition.
The function must carefully handle mismatch case. The updating inside 1350 OMS PKT
forces the recomputation of EVC, Ethernet Segment, STI provisioning state, and the
Transport Link Configuration State.
The Align Up operation does not create nor delete new entities inside the 1350 OMS PKT
Ethernet database but is only aimed to align attributes.
As example see the following case. Suppose that the Activation state of an Edge Port is
UP inside 1350 OMS PKT and the same port is DOWN inside the NE. After the Align
Up, the Edge Port results with Activation State equal to DOWN also inside 1350 OMS
PKT. This status change must be propagated also toward Ethernet connections which are
using such Edge Ports (that is Ethernet Segments and/or EVCs).
The Align Up function is only applicable on a NE after having performed an Audit on that
NE. In particular, the Align Up function can be invoked only inside an AAR context (that
is with the corresponding NE locked).
After the Audit execution, the Audit result reports to the user all the differences existing
between the NE image and the 1350 OMS PKT image. The user can then start the Align
Up operation and can decide which objects must be aligned inside 1350 OMS PKT.

....................................................................................................................................................................................................................................
1350 OMS 23-15
8DG42227DAAA 9.6
Issue 3 December 2012
Network Utilities Start the audit, alignment, reserve procedure
Audit, Alignment, Reservation, Recovery
....................................................................................................................................................................................................................................

Start the audit, alignment, reserve procedure


When to use
This function consists in preparing the 1350 OMS PKT to perform audit, alignment,
reserve actions.

Related information
For a description about Audit, Alignment, and Reservation, refer to the topic “The AAR
procedure ” (p. 23-3).

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.

Task
From MS-GUI main window:
...................................................................................................................................................................................................

1 Select Action > Packet > Audit Align Reserve > Start AAR Procedure.
...................................................................................................................................................................................................

2 Select one of the options in the confirmation box. Refer to the procedure “Confirm the
action” (p. 11-40).
Result: If the operation is confirmed, a lock of NEs is done just before starting the
audit procedure until the end of audit, alignment, reserve procedure.
Once the audit, alignment, reserve procedure is started, in Action > Packet > Audit Align
Reserve menu, the following commands are available:
• Network Elements for Audit.
• Audited Network Elements.
• Stop Procedure.
All the other 1350 OMS PKT functions are available.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
23-16 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Network Utilities Stop the audit, alignment, reserve procedure
Audit, Alignment, Reservation, Recovery
....................................................................................................................................................................................................................................

Stop the audit, alignment, reserve procedure


When to use
This function consists in ending the audit, alignment, reserve procedure.

Related information
For a description about Audit, Alignment and, Reservation, refer to the topic “The AAR
procedure ” (p. 23-3).

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
The AAR procedure must be started “Start the audit, alignment, reserve procedure”
(p. 23-16).

Task
From MS-GUI main window:
...................................................................................................................................................................................................

1 Select Action > Packet > Audit Align Reserve > Stop AAR Procedure.
...................................................................................................................................................................................................

2 Select one of the options in the confirmation box. Refer to the procedure “Confirm the
action” (p. 11-40).
Result: If the operation is confirmed, the audited NEs are unlocked.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS 23-17
8DG42227DAAA 9.6
Issue 3 December 2012
Network Utilities View the list of auditable NEs
Audit, Alignment, Reservation, Recovery
....................................................................................................................................................................................................................................

View the list of auditable NEs


When to use
The function presents all the NEs that are available for audit.

Related information
For a description about Audit, Alignment and, Reservation, refer to the topic “The AAR
procedure ” (p. 23-3).

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.

Task
From MS-GUI main window:
...................................................................................................................................................................................................

1 Select Search > Packet > Audit Align Reserve.


Result: The Audit Align Reserve menu is displayed.
...................................................................................................................................................................................................

2 Select NE for Audit.


Result: The Auditable Network Element list window is displayed.
See the following topic in this document: “Description of the list of auditable NEs”
(p. 23-19)
Note: If a NE is already locked by another user, it does not appears in this list.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
23-18 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Network Utilities Description of the list of auditable NEs
Audit, Alignment, Reservation, Recovery
....................................................................................................................................................................................................................................

Description of the list of auditable NEs


Attributes of a auditable NE
The attributes displayed for each NE are:
• User Label.
• Node User Label.
• LAC State.
• Lcation Name.
• Type.
• Operational State.
• Working State.
• Consistency State.
• Bridge Type.
• Comment.
• Version.
• IP Address.
• ACCESS Module Label.

....................................................................................................................................................................................................................................
1350 OMS 23-19
8DG42227DAAA 9.6
Issue 3 December 2012
Network Utilities Perform an audit on a NE
Audit, Alignment, Reservation, Recovery
....................................................................................................................................................................................................................................

Perform an audit on a NE
When to use
This function consists in starting the audit on the previously selected NEs.

Related information
For a description about Audit, Alignment and, Reservation, refer to the topic “The AAR
procedure ” (p. 23-3).
For more details about audit on a NE, see: “NE Audit tool” (p. 23-6).
For information about attributes compared in an Audit, see “Results of Audit” (p. 23-8).
After confirmation, NE per NE, the 1350 OMS PKT uploads the NE MIB content and
compares it with the 1350 OMS PKT database.
In each domain, if an error occurs, the audit is stopped in this domain nevertheless the
audit in the other domains goes on.
If an audit is Partially done, the actions alignment and reservation are not available. Only
a new audit is possible.
During the same session, the user can audit again the same NE; In this case, only the
latest audit result is at the user disposal. This new audit allows the user to target a new
alignment (the alignment is allowed only once after an audit).
The audit results are temporally stored into audit files. They are automatically deleted
when the user stops the audit, alignment, reserve procedure.
One file per audited NE is stored. The file contains the compared domains.
When the audit is completed on all selected NEs, a message is displayed in the status bar.
The main steps of the audit are listed into the 1350 OMS PKT Log file. If errors or
warning occur, they are listed in this file too and in an error message window.

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
The AAR procedure must be started “Start the audit, alignment, reserve procedure”
(p. 23-16).
Conditions
To get a positive result:
• The NE must not be an E/FE board or a GE board.
• The NE LAC state must not be granted.

....................................................................................................................................................................................................................................
23-20 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Network Utilities Perform an audit on a NE
Audit, Alignment, Reservation, Recovery
....................................................................................................................................................................................................................................
• The NE operational state must be enable.
• Lock state of selected NEs must be:
– Unlocked.
– Locked (due to an audit, alignment, reserve procedure launched on the NEs by the
user himself).

Task
From MS-GUI main window:
...................................................................................................................................................................................................

1 Select Action > Packet > Network Element > Network Element > NE for Audit.
Result: The list window is shown.
...................................................................................................................................................................................................

2 Select one or more items in the list.


...................................................................................................................................................................................................

3 Select Action > Network Element > Start NE Audit.


...................................................................................................................................................................................................

4 Select one of the options in the confirmation box. Refer to the procedure “Confirm the
action” (p. 11-40).
Result: When the audit is in progress on a selected NE, the NE is locked. Operations
that affect the NE are not authorized (For example: delete the NE, delete the
transmission paths that has at least one NE concerned by audit, alignment session,
…).
When the audit is completed on all selected NEs, a message is displayed in the status
bar.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS 23-21
8DG42227DAAA 9.6
Issue 3 December 2012
Network Utilities View the list of Audited NEs
Audit, Alignment, Reservation, Recovery
....................................................................................................................................................................................................................................

View the list of Audited NEs


When to use
After having performed an audit, this function displays the result of this audit.

Related information
For a description about Audit, Alignment and, Reservation, refer to the topic “The AAR
procedure ” (p. 23-3).
When the AAR procedure is stopped, the information about audited NEs is lost.

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
The AAR procedure must be started “Start the audit, alignment, reserve procedure”
(p. 23-16).
The AAR session must be open.

Task
From MS-GUI main window:
...................................................................................................................................................................................................

1 Select Search > Packet > Audit Align Reserve.


Result: The Audit Align Reserve menu is displayed.
...................................................................................................................................................................................................

2 Select Audited NEs.


Result: The Audited Network Element list window is displayed.
See the following topic in this document: “Description of the list of Audited NEs”
(p. 23-23)
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
23-22 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Network Utilities Description of the list of Audited NEs
Audit, Alignment, Reservation, Recovery
....................................................................................................................................................................................................................................

Description of the list of Audited NEs


Attributes of Audited NE
The attributes displayed for each audited network element are:
• User Label.
• Creation Date.
• Audit (Done, Partially Done, Not Done).
• Alignment (Done, Partially Done, Not Done).
• Reservation (Done, Partially Done, Not Done).
• Forced Alignment (Done, Partially Done, Not Done).
• Preparation (Done, Partially Done, Not Done).

....................................................................................................................................................................................................................................
1350 OMS 23-23
8DG42227DAAA 9.6
Issue 3 December 2012
Network Utilities View the results of an audit
Audit, Alignment, Reservation, Recovery
....................................................................................................................................................................................................................................

View the results of an audit


When to use
This function consists in starting the audit on the previously selected NEs.

Related information
For a description about Audit, Alignment and, Reservation, refer to the topic “The AAR
procedure ” (p. 23-3).
For information about attributes compared in an Audit, see “Results of Audit” (p. 23-8).
When the AAR procedure is stopped, the information about audit results is lost.

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
The AAR procedure must be started “Start the audit, alignment, reserve procedure”
(p. 23-16).
The AAR session must be open.
Conditions
To get a positive result:
• The NE must not be an E/FE board or a GE board.
• The NE LAC state must not be granted.
• The NE operational state must be enable.
• Lock state of selected NEs must be:
– Unlocked.
– Locked (due to an audit, alignment, reserve procedure launched on the NEs by the
user himself).

Task
From MS-GUI main window:
...................................................................................................................................................................................................

1 Select Search > Packet > Network Elements > Network Element.
Result: The list window is shown.
...................................................................................................................................................................................................

2 Select one or more items in the list.

....................................................................................................................................................................................................................................
23-24 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Network Utilities View the results of an audit
Audit, Alignment, Reservation, Recovery
....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

3 Select Action > Audited NE > Display Audit File.


Result: The Audit NE file is displayed.
The files are automatically deleted when the user stops the audit, alignment, reserve
procedure.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS 23-25
8DG42227DAAA 9.6
Issue 3 December 2012
Network Utilities Perform an alignment on a NE
Audit, Alignment, Reservation, Recovery
....................................................................................................................................................................................................................................

Perform an alignment on a NE
When to use
This function consists in starting the alignment on the previously audited NEs.

Related information
For a description about Audit, Alignment and, Reservation, refer to the topic “The AAR
procedure ” (p. 23-3).

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
The AAR procedure must be started “Start the audit, alignment, reserve procedure”
(p. 23-16).
The AAR session must be open.

Task
From MS-GUI main window:
...................................................................................................................................................................................................

1 Select Search > Packet > Construction > Network Elements > Audited NEs.
Result: The list window is shown.
...................................................................................................................................................................................................

2 Select one or more items in the list.


...................................................................................................................................................................................................

3 Select Action > Audited NE > Align Down.


...................................................................................................................................................................................................

4 Select one of the options in the confirmation box. Refer to the procedure “Confirm the
action” (p. 11-40).
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
23-26 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Network Utilities Overview
NE Alignment tool
....................................................................................................................................................................................................................................

NE Alignment tool

Overview
Purpose
This section provides information about the NE alignment tool.

Contents

Workflow to align up Ethernet Data 23-28


ISA Board Replacement Procedure 23-30
Perform a reservation on a NE 23-32
Restore procedure for ISA board 23-33

....................................................................................................................................................................................................................................
1350 OMS 23-27
8DG42227DAAA 9.6
Issue 3 December 2012
Network Utilities Workflow to align up Ethernet Data
NE Alignment tool
....................................................................................................................................................................................................................................

Workflow to align up Ethernet Data


When to use
This function consists in starting the alignment on the previously audited NEs.

Related information
For a description about Audit, Alignment and, Reservation, refer to the topic “The AAR
procedure ” (p. 23-3).

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.

Task
From MS-GUI main window:
...................................................................................................................................................................................................

1 Start the Audit, Align, Reserve session from the Construction GUI.
Select Action > Packet > Audit Align Reserve > Start Procedure.
...................................................................................................................................................................................................

2 Choose the NE (or the NEs) to be Audited from the Auditable Network Element List in
the Construction GUI and select Start NE Audit from the popup menu.
...................................................................................................................................................................................................

3 Read the differences displaying the Audit file content.


Select Search > Packet > Audit Align Reserve > Display Audit File.
Result: The audit results are shown.
...................................................................................................................................................................................................

4 If the need is to perform an Align Up operation on Ethernet objects, start the Align Up
operation from the Ethernet GUI.
Select Action > Packet > Audit Align Reserve > Align Up.
Result: The Align Up windows are shown.
...................................................................................................................................................................................................

5 On the Align Up windows, select one or more objects that must be realigned and confirm
the choice with OK button.

....................................................................................................................................................................................................................................
23-28 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Network Utilities Workflow to align up Ethernet Data
NE Alignment tool
....................................................................................................................................................................................................................................
Result: At that moment the Align Up function realign the 1350 OMS PKT database to
the NE image.
...................................................................................................................................................................................................

6 After having realigned all needed objects, close the Align Up Window from Ethernet
GUI.
...................................................................................................................................................................................................

7 End the Audit, Alignment, Reserve session from the Construction GUI.
Select Action > Packet > Audit Align Reserve > Stop Procedure.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS 23-29
8DG42227DAAA 9.6
Issue 3 December 2012
Network Utilities ISA Board Replacement Procedure
NE Alignment tool
....................................................................................................................................................................................................................................

ISA Board Replacement Procedure


When to use
The procedure describes the main steps needed to replace an ISA board that supports
customer service or traffic under the supervision of 1350 OMS EML and 1350 OMS PKT
systems.

Related information
For a description about Audit, Alignment and, Reservation, refer to the topic “The AAR
procedure ” (p. 23-3).
For more details, refer to the topic “Align Up of Ethernet Domain Data” (p. 23-15).

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.

Task
...................................................................................................................................................................................................

1 The faulty ISA Board has been replaced with a new one, the MIB is void in the new
Board.
...................................................................................................................................................................................................

2 ISA MIB is restored on the new Board through NE. The MIB stored at 1350 OMS EML
is not fully aligned with the current status of 1350 OMS PKT DB.
...................................................................................................................................................................................................

3 1350 OMS PKT launches the Audit operation against the involved ISA. The Audit report
identifies a set of mismatches.
...................................................................................................................................................................................................

4 Per each D- difference detected in the Audit report the user can:
1. Reserve the resource in the 1350 OMS PKT DB, acknowledging the NE configuration
is OK.
2. Remove the resource from NE MIB through NE, acknowledging the NE configuration
is not OK.

....................................................................................................................................................................................................................................
23-30 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Network Utilities ISA Board Replacement Procedure
NE Alignment tool
....................................................................................................................................................................................................................................
...................................................................................................................................................................................................

5 Per each D difference detected in the Audit report the user can:
1. Perform 1350 OMS PKT operations to realign 1350 OMS PKT to NE, acknowledging
the NE configuration is OK.
2. Perform 1350 OMS EML operations to realign NE to 1350 OMS PKT,
acknowledging the NE configuration is not OK.
...................................................................................................................................................................................................

6 Per all D+ difference detected in the Audit report the user can:
1. Align Down the 1350 OMS PKT configurations to the NE, acknowledging the 1350
OMS PKT configuration is OK.
2. Remove the resources from 1350 OMS PKT DB (through GUI or DB access),
acknowledging the 1350 OMS PKT configuration is not OK.
...................................................................................................................................................................................................

7 Perform a final audit for a further alignment check. If any difference (D+ or D-) is found
again, repeat the steps from Step 4 to Step 6 until a full alignment is obtained.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS 23-31
8DG42227DAAA 9.6
Issue 3 December 2012
Network Utilities Perform a reservation on a NE
NE Alignment tool
....................................................................................................................................................................................................................................

Perform a reservation on a NE
When to use
This function consists in starting the reservation on the previously selected NEs.

Related information
For a description about Audit, Alignment and, Reservation, refer to the topic “The AAR
procedure ” (p. 23-3).
For more details about the reservation, refer to chapter “Reservation tool” (p. 23-13).

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.
The AAR procedure must be started “Start the audit, alignment, reserve procedure”
(p. 23-16).
The AAR session must be open.

Task
From MS-GUI main window:
...................................................................................................................................................................................................

1 Select Search > Packet > Construction > Network Elements > Audited Network
Elements.
Result: The list window is shown.
...................................................................................................................................................................................................

2 Select one or more items in the list.


...................................................................................................................................................................................................

3 Select Action > Audit NE > NE Resource Reservation.


...................................................................................................................................................................................................

4 Select one of the options in the confirmation box. Refer to the procedure “Confirm the
action” (p. 11-40).
Result: The Resources are reserved.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
23-32 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Network Utilities Restore procedure for ISA board
NE Alignment tool
....................................................................................................................................................................................................................................

Restore procedure for ISA board


Overview
The procedure describes the main steps to Restore the MIB for an ISA board that supports
customer services or traffic. The board is supposed to be under the supervision of 1350
OMS EML and 1350 OMS PKT systems. The MIB is supposed to be saved in 1350 OMS
EML repository.
All the actions described in the previous “ISA Board Replacement Procedure”
(p. 23-30) are still applicable, except the point Step 1 associated to the physical
replacement of the ISA Board.

....................................................................................................................................................................................................................................
1350 OMS 23-33
8DG42227DAAA 9.6
Issue 3 December 2012
Network Utilities Restore procedure for ISA board

....................................................................................................................................................................................................................................

....................................................................................................................................................................................................................................
23-34 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
24 24
Operation,
Administration, and
Maintenance (OAM)
Management
Overview
Purpose
This chapter describes how to manage Ethernet Operations, Administration, and
Maintenance (OAM).

Contents

Ethernet OAM 24-3


OAM main functions 24-3
Create OAM Domain 24-7
List OAM Domains 24-8
Description of the list of OAM MD 24-9
OAM Domain Properties 24-10
Details of OAM MD 24-11
Modify OAM Domain 24-12
Configure OAM Domain 24-13
Deimplement OAM Domain 24-14
Inventory of OAM items from MD 24-15
Inventory of OAM monitored objects from MD 24-16
Maintenance Association (MA) 24-17
Maintenance Associations 24-17
List Maintenance Association (MA) 24-18
Description of the list of OAM MA 24-19
Properties of Maintenance Association (MA) 24-20
Details of the OAM MA 24-21
Modify Maintenance Association (MA) 24-22
Configure Maintenance Association (MA) 24-23
Enable/Disable Continuity Check (CC) 24-24
...................................................................................................................................................................................................................................
1350 OMS 24-1
8DG42227DAAA 9.6
Issue 3 December 2012
Operation, Administration, and Maintenance (OAM) Overview
Management
....................................................................................................................................................................................................................................

Deimplement OAM MA 24-25


Inventory of OAM items from MA 24-26
Inventory of OAM monitored objects from MA 24-27
Maintenance Activation 24-28
Maintenance Activation on EVC 24-28
Loopback 24-29
Loopback activation 24-29
Linktrace 24-31
Linktrace activation 24-31
Delay measurement and Loss measurement 24-33
Packet Delay measurement 24-34
Packet Loss measurement 24-35
Configure Maintenance End Points 24-36
List the OAM ETH DM Tool 24-38
List the OAM ETH SLM Tool 24-40
Create ETH DM Tool 24-42
Create ETH SLM Tool 24-44
Activate/Deactivate OAM ETH DM Tool 24-46
Activate/Deactivate OAM ETH SLM Tool 24-47
Inventory from OAM ETH DM Tool 24-48
Inventory from OAM ETH SLM Tool 24-49
Configure OAM ETH DM Tool 24-50
Configure OAM ETH SLM Tool 24-52

....................................................................................................................................................................................................................................
24-2 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Operation, Administration, and Maintenance (OAM) OAM main functions
Management
Ethernet OAM
....................................................................................................................................................................................................................................

Ethernet OAM

OAM main functions


OAM Introduction
The ETH OAM allows the user to manage:
• Maintenance Domains: Creation/modification/deletion.
• Maintenance Associations: Modification Creation/deletion are done automatically
when ETH OAM is enabled on EVC, links, ports.
• Loopback.
• Linktrace.
• List/inventories of related objects.

OAM Continuity Check


The Ethernet OAM Continuity Check (OAM CC) allows determining the reachability
between groups of associated Ethernet Resources.
The Ethernet OAM CC is a tool for pro-active maintenance; in fact as soon as the OAM
CC tool is set up over Ethernet resources, such Ethernet Resources start exchanging
autonomously OAM Continuity Check Messages (OAM CC PDU) and specific Alarms
are sent by NEs whenever the reach ability between that Ethernet Resources is
interrupted.
Ethernet OAM Continuity Check is the base for other OAM activities:
• Link Trace Management
• Loop Back Management
• Ethernet MEF Performance management (Jitter and Delay evaluation).
The Set up of Ethernet OAM Continuity Check tool can be done on top of the following
Technologies:
• Provider Bridge Domains
• ETS domain for EPTL services.
• T-MPLS Domains.
• a combination of the above (E2E)

OAM Continuity Check terminology


The Ethernet OAM CC is realized according to ITU Y.1731 and IEEE 802.1ag Standards.

....................................................................................................................................................................................................................................
1350 OMS 24-3
8DG42227DAAA 9.6
Issue 3 December 2012
Operation, Administration, and Maintenance (OAM) OAM main functions
Management
Ethernet OAM
....................................................................................................................................................................................................................................
The terminologies adopted by the two Standards are slightly different, and the following
table reports a comparison between the two.

Table 24-1 Terminology Mapping

ITU Y.1731 Terminology IEEE 802.1ag Terminology


MD Maintenance MD Maintenance Domain
Domain
MEG Maintenance Entity MA Maintenance
Group Association
MEG Level Maintenance Entity MA Level Maintenance
Group Level Association Level
MEP MEG End Point MEP MA End Point

OAM Continuity Check model

Ethernet OAM CC objects:


• “Maintenance Domain (MD)” (p. 24-4).
• “Maintenance Association (MA) or Maintenance Entity Group (MEG)” (p. 24-5).
• “Maintenance Edge Point (MEP)” (p. 24-5).
• “Intermediate Maintenance Entity Point (MIP)” (p. 24-6).
Maintenance Domain (MD)
MD is the Network or a Network Portion where Fault on Connectivity is managed.
....................................................................................................................................................................................................................................
24-4 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Operation, Administration, and Maintenance (OAM) OAM main functions
Management
Ethernet OAM
....................................................................................................................................................................................................................................
MD can be mapped as STP domain, or ETS domain (PortToPort and EPTL), or T-MPLS
domain.
For a given Domain it is possible to display all MDs existing in that domain.
From a given MD it is possible to retrieve all the contained MA (Connectivity) and
related configured MEPs (Connectivity extremities).
Maintenance Association (MA) or Maintenance Entity Group (MEG)
MA realizes the association between Maintenance Entities (Maintenance Points) and
Maintenance Domain.
MA determines also the relationship existing among Maintenance Points
The life cycle of MA (Creation/Deletion) is always linked to corresponding Connectivity
object (EVC, Transport Link or Edge Port).
MA Parameters are visible always contextually to the corresponding Connectivity object.
MA Modification/Configuration is always possible from the corresponding Connectivity
object.
MA is defined by the following main attributes:
• MA name: made by a Format and a Name.
• Monitored object.
Monitored object can be one of the following:
– (only for Virtual Bridge, Provider Bridge and ETS) VLAN: it can be the CVLAN
in case of Virtual Bridge or the SVLAN in case of Provider Bridge
– (only for T-MPLS) Pseudo-Wire or VSI
• MHF policy: which automatic policy is defined inside the MA for MIP Creation
(default=inherited from MD)
• CCM Interval: delay between sending of CC PDU
• MEP List Table : list of Maintenance Points making part to the association and their
Activation status
• Row Status: Activation status for the MA entry
Maintenance Edge Point (MEP)
MEP is a Maintenance Point located at the Edge of the Monitored Network.
MEP can initiate and terminate OAMPDU frames.
OAM activities can be started from MEP
MEPs are explicitly created on Operator DemandEach MEP is always linked with PORT
or, depending on involved technology, VLANID, PWID.
The life cycle of MEP (Creation/Deletion) is always linked to corresponding Connectivity
object extremity (or to the Connectivity object itself in the special case of the Edge Port).
MEP Parameters are visible always contextually to corresponding Connectivity object
extremity.

....................................................................................................................................................................................................................................
1350 OMS 24-5
8DG42227DAAA 9.6
Issue 3 December 2012
Operation, Administration, and Maintenance (OAM) OAM main functions
Management
Ethernet OAM
....................................................................................................................................................................................................................................
MEP Modification/Configuration is always possible from corresponding Connectivity
object extremity.
Each MEP is defined by the following main attributes:
• Identifier: unique in the MA, in the range 1-8191.
• Interface Reference: Port identifier (the MAC address of the Port is inherited).
• Direction : (UP, Down).
• Priority: priority (0-7) to be used in CCM PDU messages.
• Enable/Disable Flag : aimed to dynamically start/stop OAM CC.
• Row Status: Activation status for the MEP entry.
• Other attributes not connected to CC management are not included here and always
set to their default value.
Intermediate Maintenance Entity Point (MIP)
MIP is an Intermediate Maintenance Entity Point.
MIP can only react to OAMPDU frames (answering and/or forwarding).
OAM activities cannot be started from MIP.
Each MIP has a Direction concept (UP, Down).
MIPs are automatically created depending on criteria defined on MD/MA objects.

Monitored Objects
Objects monitored in a Maintenance Domain:
• Ethernet Domain
• NE
• E2E EVC
• EVC
• EVC termination
• Transport Link
• Transport Link Termination
• Edge Port

....................................................................................................................................................................................................................................
24-6 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Operation, Administration, and Maintenance (OAM) Create OAM Domain
Management
Ethernet OAM
....................................................................................................................................................................................................................................

Create OAM Domain


When to use
The scope of this procedure is to define an OAM Domain.

Related Information
For more information, refer to: “OAM main functions” (p. 24-3)
Maintenance domain can be defined by user:
• To define a domain different from the default one used by all Maintenance
associations related to EVCs, links, ports
• To define maintenance levels different from the one assigned by default (0 on links
and edge ports, 2 on EVC)
Maintenance domains provisioning state follows the evolutions of related MAs:
• implemented in the NEs as soon as the first monitored object requires it.
• Deimplemented when no more monitored object requires it.

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.

Task
...................................................................................................................................................................................................

1 From the main menu bar select Actions > Packet > OAM CC> Create OAM MD.
Result: The creation window is displayed.
...................................................................................................................................................................................................

2 Define the following attributes:


• Name.(User Label of Maintenance Domain, free text).
• Level. (8 OAM Levels are standardized).
• MHF policy.(MIP Half-function creation policy: None: no MIP is created; Explicit:
MIPs are created where a lower-level MEP exists; default: MIPs are created on all
intermediate points).
Click OK button to confirm the operation.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS 24-7
8DG42227DAAA 9.6
Issue 3 December 2012
Operation, Administration, and Maintenance (OAM) List OAM Domains
Management
Ethernet OAM
....................................................................................................................................................................................................................................

List OAM Domains


When to use
The scope of this procedure is to list all the Maintenance Domains.

Related Information
For more information, refer to: “OAM main functions” (p. 24-3)

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.

Task
...................................................................................................................................................................................................

1 From the main menu bar select Search > Packet > OAM CC> OAM MDs.
Result: The list window is displayed.
See the following topic in this document: “Description of the list of OAM MD”
(p. 24-9)
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
24-8 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Operation, Administration, and Maintenance (OAM) Description of the list of OAM MD
Management
Ethernet OAM
....................................................................................................................................................................................................................................

Description of the list of OAM MD


Attributes of an OAM MD
The attributes displayed for each MD are:
• Name.(User Label of Maintenance Domain, free text).
• Format
• Level. (8 OAM Levels are standardized).
• MHF policy.(MIP Half-function creation policy: None: no MIP is created; Explicit:
MIPs are created where a lower-level MEP exists; default: MIPs are created on all
intermediate points).
• Provisioning State (Defined, Implemented)

....................................................................................................................................................................................................................................
1350 OMS 24-9
8DG42227DAAA 9.6
Issue 3 December 2012
Operation, Administration, and Maintenance (OAM) OAM Domain Properties
Management
Ethernet OAM
....................................................................................................................................................................................................................................

OAM Domain Properties


When to use
The scope of this procedure is to list all the Maintenance Domains.

Related Information
For more information, refer to: “OAM main functions” (p. 24-3)

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.

Task
...................................................................................................................................................................................................

1 From the main menu bar select Search > Packet > OAM CC> OAM MDs.
Result: The list window is displayed.
...................................................................................................................................................................................................

2 Select one item in the list and select Actions > Properties.
Result: The Property window is displayed.
See the following topic in this document: “Details of OAM MD” (p. 24-11)
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
24-10 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Operation, Administration, and Maintenance (OAM) Details of OAM MD
Management
Ethernet OAM
....................................................................................................................................................................................................................................

Details of OAM MD
Attributes of an OAM MD
The attributes displayed for each MD are:
• Name.(User Label of Maintenance Domain, free text).
• Format
• Level. (8 OAM Levels are standardized).
• MHF policy.(MIP Half-function creation policy: None: no MIP is created; Explicit:
MIPs are created where a lower-level MEP exists; default: MIPs are created on all
intermediate points).
• Provisioning State (Defined, Implemented)
• Id

....................................................................................................................................................................................................................................
1350 OMS 24-11
8DG42227DAAA 9.6
Issue 3 December 2012
Operation, Administration, and Maintenance (OAM) Modify OAM Domain
Management
Ethernet OAM
....................................................................................................................................................................................................................................

Modify OAM Domain


When to use
The scope of this procedure is to change attributes when MD is not implemented.

Related Information
The user can change attributes when MD is not implemented.
For more information, refer to: “OAM main functions” (p. 24-3)
See also: “Configure OAM Domain” (p. 24-13)

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.

Task
...................................................................................................................................................................................................

1 From the main menu bar select Search > Packet > OAM CC> OAM MDs.
Result: The list window is displayed.
...................................................................................................................................................................................................

2 Select one item in the list and select Actions > Modify.
Result: The modify window is displayed.
...................................................................................................................................................................................................

3 Modify one or more of the following attributes:


• Name.(User Label of Maintenance Domain, free text).
• Level. (8 OAM Levels are standardized).
• MHF policy.(MIP Half-function creation policy: None: no MIP is created; Explicit:
MIPs are created where a lower-level MEP exists; default: MIPs are created on all
intermediate points).
Click OK button to confirm the operation.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
24-12 1350 OMS
8DG42227DAAA 9.6
Issue 3 December 2012
Operation, Administration, and Maintenance (OAM) Configure OAM Domain
Management
Ethernet OAM
....................................................................................................................................................................................................................................

Configure OAM Domain


When to use
The scope of this procedure is to change attributes when MD is implemented.

Related Information
The user can change attributes when MD is implemented.
For more information, refer to: “OAM main functions” (p. 24-3)
See also: “Modify OAM Domain” (p. 24-12)

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.

Task
...................................................................................................................................................................................................

1 From the main menu bar select Search > Packet > OAM CC> OAM MDs.
Result: The list window is displayed.
...................................................................................................................................................................................................

2 Select one item in the list and select Actions > OAM MD > Configure.
Result: The configure window is displayed.
...................................................................................................................................................................................................

3 Modify one or more of the following attributes:


• Maintenance Domain .
• Level. (8 OAM Levels are standardized).
• MHF policy.(MIP Half-function creation policy: None: no MIP is created; Explicit:
MIPs are created where a lower-level MEP exists; default: MIPs are created on all
intermediate points).
Click OK button to confirm the operation.
E...................................................................................................................................................................................................
N D O F S T E P S

....................................................................................................................................................................................................................................
1350 OMS 24-13
8DG42227DAAA 9.6
Issue 3 December 2012
Operation, Administration, and Maintenance (OAM) Deimplement OAM Domain
Management
Ethernet OAM
....................................................................................................................................................................................................................................

Deimplement OAM Domain


When to use
The scope of this procedure is to deimplement MD.

Related Information
The user can change attributes when MD is implemented.
For more information, refer to: “OAM main functions” (p. 24-3)

Before you begin


The system is running.
The system is properly configured.
The system is connected by MS-GUI.
The MS-GUI is set to map mode.

Task
...................................................................................................................................................................................................

1 From the main menu bar select Search > Packet > OAM CC> OAM MDs.
Result: The list window is displayed.
...................................................................................................................................................................................................

2 Select one item in the list and select Actions > OAM MD > Deimplement.
Select one of the opti

You might also like