You are on page 1of 386

iManager U2000 Unified Network Management System V100R002C01

Operation Guide for RTN End-to-End Management


Issue Date 02 2010-09-24

HUAWEI TECHNOLOGIES CO., LTD.

Copyright Huawei Technologies Co., Ltd. 2010. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means without prior written consent of Huawei Technologies Co., Ltd.

Trademarks and Permissions


and other Huawei trademarks are trademarks of Huawei Technologies Co., Ltd. All other trademarks and trade names mentioned in this document are the property of their respective holders.

Notice
The purchased products, services and features are stipulated by the contract made between Huawei and the customer. All or part of the products, services and features described in this document may not be within the purchase scope or the usage scope. Unless otherwise specified in the contract, all statements, information, and recommendations in this document are provided "AS IS" without warranties, guarantees or representations of any kind, either express or implied. The information in this document is subject to change without notice. Every effort has been made in the preparation of this document to ensure accuracy of the contents, but all statements, information, and recommendations in this document do not constitute the warranty of any kind, express or implied.

Huawei Technologies Co., Ltd.


Address: Huawei Industrial Base Bantian, Longgang Shenzhen 518129 People's Republic of China http://www.huawei.com support@huawei.com

Website: Email:

Issue 02 (2010-09-24)

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

About This Document

About This Document


Related Version
The following table lists the product version related to this document. Product Name iManager U2000 Version V100R002C01

Intended Audience
This document describes how to configure an RTN network by using the end-to-end function. This document guides you to manage an RTN network by using the trail management function. This document is intended for: l l l l Network Monitoring Engineer Data Configuration Engineer NM Administrator System Maintenance Engineer

Symbol Conventions
The symbols that may be found in this document are defined as follows. Symbol Description

DANGER

Indicates a hazard with a high level of risk, which if not avoided, will result in death or serious injury. Indicates a hazard with a medium or low level of risk, which if not avoided, could result in minor or moderate injury.

WARNING

Issue 02 (2010-09-24)

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

iii

About This Document

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

Symbol

Description

CAUTION
TIP

Indicates a potentially hazardous situation, which if not avoided, could result in equipment damage, data loss, performance degradation, or unexpected results. Indicates a tip that may help you solve a problem or save time. Provides additional information to emphasize or supplement important points of the main text.

NOTE

Command Conventions
The command conventions that may be found in this document are defined as follows. Convention Boldface Italic [] { x | y | ... } [ x | y | ... ] { x | y | ... }* Description The keywords of a command line are in boldface. Command arguments are in italics. Items (keywords or arguments) in brackets [ ] are optional. Optional items are grouped in braces and separated by vertical bars. One item is selected. Optional items are grouped in brackets and separated by vertical bars. One item is selected or no item is selected. Optional items are grouped in braces and separated by vertical bars. A minimum of one item or a maximum of all items can be selected. Optional items are grouped in brackets and separated by vertical bars. Several items or no item can be selected.

[ x | y | ... ]*

GUI Conventions
The GUI conventions that may be found in this document are defined as follows. Convention Boldface > Description Buttons, menus, parameters, tabs, window, and dialog titles are in boldface. For example, click OK. Multi-level menus are in boldface and separated by the ">" signs. For example, choose File > Create > Folder.

iv

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

Issue 02 (2010-09-24)

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

About This Document

Update History
Updates between document versions are cumulative. Therefore, the latest document version contains all updates made to previous versions.

Updates in Issue 02 (2010-09-24) Based on Product Version V100R002C01


The second release of the iManager U2000 V100R002C01. Some bugs in the manual of the previous version are fixed.

Updates in Issue 01 (2010-08-16) Based on Product Version V100R002C01


The first release of the iManager U2000 V100R002C01.

Issue 02 (2010-09-24)

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

Contents

Contents
About This Document...................................................................................................................iii 1 Managing RTN Protection Subnets........................................................................................1-1
1.1 Basic Concepts................................................................................................................................................1-3 1.1.1 Protection Subnet...................................................................................................................................1-3 1.1.2 Isolated Node..........................................................................................................................................1-3 1.2 Searching for Protection Subnets....................................................................................................................1-4 1.3 Configuring an MSP Ring...............................................................................................................................1-4 1.3.1 Creating an MS Ring Protection Subnet................................................................................................1-5 1.3.2 Checking Networkwide Multiplex Section Parameters.........................................................................1-7 1.3.3 Verifying MSP Protection Switching.....................................................................................................1-7 1.4 Configuring Linear MSP.................................................................................................................................1-9 1.4.1 Creating a Linear MS Protection Subnet................................................................................................1-9 1.4.2 Checking Networkwide Multiplex Section Parameters.......................................................................1-11 1.4.3 Verifying MSP Protection Switching...................................................................................................1-12 1.5 Creating an Path Protection Ring..................................................................................................................1-13 1.6 Configuring a Non-Protection Ring..............................................................................................................1-14 1.7 Configuring a Non-Protection Chain............................................................................................................1-15 1.8 Configuring DNI Protection..........................................................................................................................1-16 1.9 Configuring IF 1+1 Protection......................................................................................................................1-17 1.10 Configuring IF N+1 Protection...................................................................................................................1-18 1.11 Maintaining Protection Subnets..................................................................................................................1-19 1.11.1 Finding Protection Subnets................................................................................................................1-20 1.11.2 Querying Protection Subnet Resources..............................................................................................1-21 1.11.3 Collecting Statistics on the SDH Protection Subnet Resources.........................................................1-21 1.11.4 Checking MS Protection Switching Status........................................................................................1-22 1.11.5 Setting Protection Subnet Parameters................................................................................................1-22 1.11.6 Checking TPS Switching status.........................................................................................................1-23 1.11.7 Performing MSP Switching...............................................................................................................1-23 1.11.8 Performing SNCP Service Switching................................................................................................1-24 1.11.9 Adjusting the Capacity of an MSP Ring............................................................................................1-25 1.11.10 Adjusting the Capacity of a Linear MSP.........................................................................................1-26 1.11.11 Changing an NP Chain to a 1+1 Linear MSP..................................................................................1-26 1.11.12 Checking IF 1+1 Protection Switching Status.................................................................................1-29 Issue 02 (2010-09-24) Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. vii

Contents

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management 1.11.13 Checking IF N+1 Protection Switching Status................................................................................1-29

1.12 Deleting Protection Subnets........................................................................................................................1-29 1.13 Deleting Isolated Nodes..............................................................................................................................1-30

2 End-to-End RTN Management................................................................................................2-1


2.1 Managing SDH Trails.....................................................................................................................................2-2 2.1.1 Configuration Task Flow.......................................................................................................................2-3 2.1.2 Basic Concepts.......................................................................................................................................2-4 2.1.2.1 SDH Trail............................................................................................................................................2-5 2.1.2.2 Radio Trails.........................................................................................................................................2-7 2.1.2.3 Conflict Trail.......................................................................................................................................2-9 2.1.2.4 Trail Creation Method.......................................................................................................................2-10 2.1.2.5 Process for Creating a Trail...............................................................................................................2-12 2.1.2.6 Trail Protection Strategy...................................................................................................................2-15 2.1.2.7 Trail Resource Use Strategy..............................................................................................................2-17 2.1.2.8 Principles for Selecting Timeslots During the Trail Creation...........................................................2-17 2.1.2.9 Platinum Service Group....................................................................................................................2-19 2.1.3 Disabling a Fiber..................................................................................................................................2-20 2.1.4 Creating SDH Trails by Trail Search...................................................................................................2-21 2.1.4.1 Searching for SDH Trails..................................................................................................................2-21 2.1.4.2 Viewing Discrete Services................................................................................................................2-22 2.1.4.3 Discrete Service Causes and Handling Measures.............................................................................2-23 2.1.4.4 Setting the Remarks of a Discrete Service........................................................................................2-24 2.1.4.5 Activating and Deactivating Discrete Services.................................................................................2-26 2.1.4.6 Acknowledging or Unacknowledging Discrete Services..................................................................2-26 2.1.4.7 Deleting Discrete Services................................................................................................................2-27 2.1.5 Automatically Creating VC4 Trails.....................................................................................................2-28 2.1.5.1 Creating a Non-SNCP VC4 Trail......................................................................................................2-28 2.1.5.2 Creating an SNCP VC4 Trail............................................................................................................2-30 2.1.5.3 Verifying the SNCP Trail Protection Switching...............................................................................2-33 2.1.6 Automatically Creating VC12 and VC3 Trails....................................................................................2-33 2.1.6.1 Creating a VC4 Server Trail..............................................................................................................2-34 2.1.6.2 Creating a Non-SNCP VC12 or VC3 Trail.......................................................................................2-36 2.1.6.3 Creating an SNCP VC12 or VC3 Trail.............................................................................................2-38 2.1.6.4 Verifying the SNCP Trail Protection Switching...............................................................................2-41 2.1.7 Creating a Platinum Service Group......................................................................................................2-42 2.1.8 Bound Platinum Service Group............................................................................................................2-43 2.1.9 Creating an SDH Trail Manually.........................................................................................................2-44 2.1.10 Creating PDH Radio Trails................................................................................................................2-45 2.1.10.1 Creating a Link Server Trail............................................................................................................2-45 2.1.10.2 Creating a PDH Radio Trail............................................................................................................2-47 2.1.11 Creating SDH Radio Trails................................................................................................................2-49 2.1.11.1 Creating a VC4 Server Trail............................................................................................................2-49 viii Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. Issue 02 (2010-09-24)

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

Contents

2.1.11.2 Creating an SDH Radio Trail..........................................................................................................2-51 2.1.12 Copying SDH Trails...........................................................................................................................2-52 2.1.13 Modifying an SDH Trail....................................................................................................................2-54 2.1.13.1 Modifying the Port/Timeslot/Route of an SDH Trail.....................................................................2-54 2.1.13.2 Modifying the SNC Service Control of SDH Trails.......................................................................2-55 2.1.13.3 Modifying Trail Names in Batches.................................................................................................2-56 2.1.13.4 Modifying the Trails in a Platinum Service Group.........................................................................2-57 2.1.14 Removing a Trail from a Platinum Service Group............................................................................2-57 2.1.15 Configuring Overhead Bytes of an SDH Trail...................................................................................2-58 2.1.15.1 Setting the Trace Byte.....................................................................................................................2-58 2.1.15.2 Setting the C2 Byte.........................................................................................................................2-60 2.1.15.3 Setting the V5 Byte.........................................................................................................................2-61 2.1.15.4 Setting the Overhead Termination..................................................................................................2-62 2.1.15.5 Setting Service Load Signals...........................................................................................................2-63 2.1.16 Changing Between SNCP and Non-SNCP Trails..............................................................................2-64 2.1.16.1 Changing a Non-SNCP Trail to an SNCP Trail..............................................................................2-64 2.1.16.2 Changing an SNCP Trail to a Non-SNCP Trail..............................................................................2-66 2.1.17 Enabling or Disabling VC4 Server Trails..........................................................................................2-66 2.1.17.1 Disabling VC4 Server Trails...........................................................................................................2-67 2.1.17.2 Enabling VC4 Server Trails............................................................................................................2-67 2.1.18 Joining and Splitting VC4 Server Trails............................................................................................2-68 2.1.18.1 Joining VC4 Server Trails...............................................................................................................2-69 2.1.18.2 Splitting a VC4 Server Trail............................................................................................................2-70 2.1.19 Service Authorization Management...................................................................................................2-71 2.1.19.1 Specifying a Customer for a Service...............................................................................................2-72 2.1.19.2 Authorizing a Customer to a U2000 User.......................................................................................2-73 2.1.19.3 Authorizing a Trail to a U2000 User...............................................................................................2-74 2.1.19.4 Modifying Trail Authorization Information....................................................................................2-74 2.1.20 Viewing SDH Trails...........................................................................................................................2-75 2.1.20.1 Viewing SDH Trail Details.............................................................................................................2-75 2.1.20.2 Viewing the Use Information of a VC4 Server Trail......................................................................2-76 2.1.20.3 Viewing Relevant Client Trails.......................................................................................................2-77 2.1.20.4 Viewing the Optical Power for the Trails.......................................................................................2-77 2.1.20.5 Viewing the Status of the Fiber Break on an SDH Trail.................................................................2-78 2.1.20.6 Viewing Fiber Information of a Trail..............................................................................................2-79 2.1.21 Maintaining SDH Trails.....................................................................................................................2-79 2.1.21.1 Locking or Unlocking an SDH Trail...............................................................................................2-80 2.1.21.2 Activating or Deactivating an SDH Trail........................................................................................2-81 2.1.21.3 Setting a Loopback for a Trail.........................................................................................................2-82 2.1.21.4 Performing the Protection Switching for a Single SNCP Trail.......................................................2-84 2.1.21.5 Performing the SNCP Trail Switching in Batches..........................................................................2-85 2.1.21.6 Verifying Platinum Service Groups in Batches..............................................................................2-87 Issue 02 (2010-09-24) Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. ix

Contents

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management 2.1.21.7 Converting SDH Discrete Services to Mono Nodal Trails.............................................................2-87 2.1.22 Deleting SDH Trails...........................................................................................................................2-88

2.2 Managing Ethernet Trails..............................................................................................................................2-90 2.2.1 Basic Concepts.....................................................................................................................................2-91 2.2.1.1 Ethernet End-to-End Management....................................................................................................2-91 2.2.1.2 Ethernet Services...............................................................................................................................2-93 2.2.1.3 Relation Between SDH/Radio Trails and Ethernet Trails.................................................................2-94 2.2.1.4 Tag Attributes....................................................................................................................................2-95 2.2.2 Creating Ethernet Trails by Trail Search..............................................................................................2-96 2.2.2.1 Searching for Ethernet Trails............................................................................................................2-96 2.2.2.2 Viewing Ethernet Discrete Services..................................................................................................2-98 2.2.3 Configuring EPL Service.....................................................................................................................2-98 2.2.3.1 Creating a VC4 Server Trail..............................................................................................................2-99 2.2.3.2 Creating a Trunk Link.....................................................................................................................2-101 2.2.3.3 Creating an EPL Trail.....................................................................................................................2-103 2.2.3.4 Verifying Ethernet Services............................................................................................................2-104 2.2.3.5 Sample Application: Configuring EPL Services.............................................................................2-105 2.2.4 Configuring an Unterminated EPL Service.......................................................................................2-111 2.2.4.1 Creating a VC4 Server Trail............................................................................................................2-112 2.2.4.2 Creating an Unterminated Trunk Link............................................................................................2-114 2.2.4.3 Creating a Trunk Link.....................................................................................................................2-115 2.2.4.4 Creating an Unterminated EPL Trail..............................................................................................2-116 2.2.4.5 Verifying Ethernet Services............................................................................................................2-117 2.2.5 Configuring EVPL Services...............................................................................................................2-118 2.2.5.1 Creating a VC4 Server Trail............................................................................................................2-118 2.2.5.2 Creating a Trunk Link.....................................................................................................................2-120 2.2.5.3 Creating an EVPL Trail...................................................................................................................2-122 2.2.5.4 Verifying Ethernet Services............................................................................................................2-123 2.2.6 Configuring EPLAN Service.............................................................................................................2-124 2.2.6.1 Creating a VC4 Server Trail............................................................................................................2-124 2.2.6.2 Creating a Trunk Link.....................................................................................................................2-127 2.2.6.3 Creating an EPLAN Trail................................................................................................................2-128 2.2.6.4 Adjusting VB Mount Ports in an EPLAN.......................................................................................2-131 2.2.6.5 Verifying Ethernet Services............................................................................................................2-132 2.2.7 Configuring EVPL (QinQ) Service ...................................................................................................2-133 2.2.7.1 Creating a VC4 Server Trail............................................................................................................2-133 2.2.7.2 Creating a Trunk Link.....................................................................................................................2-135 2.2.7.3 Creating an EVPL (QinQ) Trail......................................................................................................2-137 2.2.7.4 Verifying Ethernet Services............................................................................................................2-138 2.2.8 Specifying a Customer for a Created Trail.........................................................................................2-139 2.2.9 Checking the Connectivity of Ethernet Link......................................................................................2-140 2.2.9.1 Ethernet OAM.................................................................................................................................2-140 x Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. Issue 02 (2010-09-24)

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

Contents

2.2.9.2 Creating MPs...................................................................................................................................2-141 2.2.9.3 Performing a CC Check..................................................................................................................2-142 2.2.9.4 Performing an LB Check.................................................................................................................2-142 2.2.9.5 Performing an LT Check.................................................................................................................2-143 2.2.9.6 Performing a Ping Test....................................................................................................................2-144 2.2.9.7 Performing Performance Detection.................................................................................................2-145 2.2.10 Viewing Ethernet Services...............................................................................................................2-145 2.2.10.1 Viewing Trunk Links....................................................................................................................2-146 2.2.10.2 Analyzing the Trunk Link Fault....................................................................................................2-146 2.2.10.3 Viewing Relevant Trails of a Trunk Link.....................................................................................2-147 2.2.10.4 Viewing Ethernet Trails................................................................................................................2-148 2.2.10.5 Viewing the Server Trail of an Ethernet Trail...............................................................................2-148 2.2.10.6 Analyzing the Ethernet Trail Fault................................................................................................2-149 2.2.10.7 Viewing the Connectivity of Ethernet Services Networkwide.....................................................2-150 2.2.11 Maintaining Ethernet Trails.............................................................................................................2-150 2.2.11.1 Adjusting the Ethernet Trail Bandwidth.......................................................................................2-150 2.2.11.2 Activating or Deactivating Ethernet Services...............................................................................2-151 2.2.12 Deleting Ethernet Services...............................................................................................................2-152 2.2.12.1 Deleting Ethernet Trails................................................................................................................2-152 2.2.12.2 Deleting Trunk Links....................................................................................................................2-153 2.3 Managing Alarms of an SDH Trail.............................................................................................................2-154 2.3.1 Viewing Current Alarms of an SDH Trail.........................................................................................2-155 2.3.2 Viewing History Alarms of an SDH Trail.........................................................................................2-156 2.3.3 Setting Alarm Reversion for an SDH Trail........................................................................................2-156 2.3.4 Inserting an Alarm on an SDH Trail..................................................................................................2-157 2.3.5 Managing Networkwide SDH Alarm Trails in Real Time.................................................................2-158 2.3.6 Analyzing SDH alarm correlation......................................................................................................2-158 2.3.7 Browsing Relevant WDM Trails........................................................................................................2-159 2.4 Managing the Performance of SDH Trails..................................................................................................2-160 2.4.1 Viewing Current Performance Data of an SDH Trail........................................................................2-160 2.4.2 Viewing History Performance Data of an SDH Trail........................................................................2-161 2.4.3 Viewing UAT of SDH Trails.............................................................................................................2-162 2.4.4 Viewing Performance Threshold-Crossing Records of SDH Trails..................................................2-162 2.4.5 Setting Performance Monitoring Parameters of an SDH Trail..........................................................2-163 2.4.6 Setting SDH Trail Performance Threshold........................................................................................2-164 2.5 Managing Ethernet Trail Alarms.................................................................................................................2-164 2.5.1 Viewing Current Alarms of a Trunk Link..........................................................................................2-165 2.5.2 Viewing History Alarms of a Trunk Link..........................................................................................2-166 2.5.3 Viewing Current Alarms of an Ethernet Trail....................................................................................2-166 2.5.4 Viewing History Alarms of an Ethernet Trail....................................................................................2-167 2.5.5 Managing Networkwide ETH Alarm Trails in Real Time.................................................................2-168 2.6 Browsing the Performance of an Ethernet Trail..........................................................................................2-168 Issue 02 (2010-09-24) Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. xi

Contents

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

3 End-to-End RTN IP Management...........................................................................................3-1


3.1 Process of Configuring RTN IP Services........................................................................................................3-2 3.2 Automatically Searching RTN IP Services.....................................................................................................3-3 3.3 Managing Tunnel............................................................................................................................................3-4 3.3.1 Introduction to the Tunnel......................................................................................................................3-5 3.3.1.1 Introduction to the Tunnel...................................................................................................................3-5 3.3.1.2 Standards and Protocols Compliance of the Tunnel...........................................................................3-7 3.3.1.3 Basic Concepts of the Tunnel..............................................................................................................3-9 3.3.1.4 Working Principles............................................................................................................................3-10 3.3.1.5 Tunnel Protection Group...................................................................................................................3-11 3.3.1.6 Application of the Tunnel.................................................................................................................3-13 3.3.2 Tunnel Configuration Flow..................................................................................................................3-14 3.3.3 Configuring a Tunnel...........................................................................................................................3-16 3.3.3.1 Creating a Tunnel..............................................................................................................................3-17 3.3.3.2 Creating Tunnels in Batches.............................................................................................................3-20 3.3.3.3 Creating a Protection Group..............................................................................................................3-21 3.3.3.4 Configuring OAM for a Tunnel........................................................................................................3-23 3.3.3.5 Automatic Search for Protection Groups..........................................................................................3-24 3.3.3.6 Deploying a Tunnel...........................................................................................................................3-25 3.3.3.7 Viewing a Discrete Tunnel................................................................................................................3-26 3.3.3.8 Deleting a Tunnel..............................................................................................................................3-26 3.3.4 Monitoring a Tunnel.............................................................................................................................3-27 3.3.4.1 Viewing the VPN Service Carried on a Tunnel................................................................................3-27 3.3.4.2 Viewing the Topology of a Tunnel...................................................................................................3-28 3.3.4.3 Viewing the Performance of a Tunnel..............................................................................................3-29 3.3.4.4 Viewing the Alarms of a Tunnel.......................................................................................................3-29 3.3.4.5 Monitoring the Running Status of a Tunnel......................................................................................3-30 3.3.4.6 Viewing the LSP Topology of a Tunnel...........................................................................................3-30 3.3.4.7 Diagnosing a Tunnel.........................................................................................................................3-31 3.3.5 Configuration Example (Static CR Tunnel).........................................................................................3-32 3.3.5.1 Networking Diagram.........................................................................................................................3-32 3.3.5.2 Service Planning................................................................................................................................3-33 3.3.5.3 Configuration Process (Creating a Static CR Tunnel)......................................................................3-35 3.3.6 Configuration Example (RSVP TE Tunnel)........................................................................................3-44 3.3.6.1 Networking Diagram.........................................................................................................................3-44 3.3.6.2 Service Planning................................................................................................................................3-45 3.3.6.3 Configuration Process (Creating a RSVP TE Tunnel)......................................................................3-47 3.4 Configuring a Service Template...................................................................................................................3-59 3.4.1 Creating a Service Template................................................................................................................3-60 3.4.2 Creating a Service by Using a Template..............................................................................................3-60 3.5 Viewing a Service Resource.........................................................................................................................3-61 3.5.1 Querying Public Resources..................................................................................................................3-61 xii Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. Issue 02 (2010-09-24)

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

Contents

3.5.2 Querying CTP Resources.....................................................................................................................3-62 3.6 Managing PWE3 Services.............................................................................................................................3-62 3.6.1 Overview of PWE3..............................................................................................................................3-63 3.6.1.1 Introduction.......................................................................................................................................3-64 3.6.1.2 Reference Standards and Protocols...................................................................................................3-64 3.6.1.3 PWE3 Basic Principle.......................................................................................................................3-65 3.6.1.4 PW Template.....................................................................................................................................3-69 3.6.1.5 VCCV................................................................................................................................................3-70 3.6.1.6 Static and Dynamic Hybrid Multi-Hop PW......................................................................................3-70 3.6.1.7 PW Protection...................................................................................................................................3-71 3.6.1.8 ATM Cell Transparent Transmission................................................................................................3-74 3.6.1.9 The Application of PWE3 Service....................................................................................................3-77 3.6.2 PWE3 Configuration Process...............................................................................................................3-78 3.6.3 PWE3 Operation Tasks........................................................................................................................3-83 3.6.3.1 Creating a CES Service.....................................................................................................................3-83 3.6.3.2 Creating an ETH Service...................................................................................................................3-86 3.6.3.3 Creating an ATM Service.................................................................................................................3-88 3.6.3.4 Creating a PWE3 Service Through Duplication...............................................................................3-92 3.6.3.5 Deploying a PWE3 Service...............................................................................................................3-94 3.6.3.6 Adjusting a Discrete PWE3 Service..................................................................................................3-94 3.6.4 PWE3 Service Monitoring...................................................................................................................3-95 3.6.4.1 Viewing the PWE3 Service Topology..............................................................................................3-96 3.6.4.2 Monitoring Performance of a PWE3 Service....................................................................................3-96 3.6.4.3 Monitoring Alarms of a PWE3 Service............................................................................................3-97 3.6.5 Locating a PWE3 Service Fault...........................................................................................................3-98 3.6.5.1 CES Service Troubleshooting...........................................................................................................3-98 3.6.5.2 ATM Service Troubleshooting........................................................................................................3-101 3.6.5.3 Ethernet Service Troubleshooting...................................................................................................3-104 3.6.6 Example for Configuring a CES Emulation Service..........................................................................3-107 3.6.6.1 Networking Diagram.......................................................................................................................3-107 3.6.6.2 Service Planning..............................................................................................................................3-108 3.6.6.3 Configuration Process.....................................................................................................................3-111 3.6.7 Example for Configuring an ATM Emulation Service......................................................................3-127 3.6.7.1 Networking Diagram.......................................................................................................................3-128 3.6.7.2 Service Planning..............................................................................................................................3-128 3.6.7.3 Configuration Process.....................................................................................................................3-132 3.6.8 Example for Configuring an Ethernet Private Line Emulation Service.............................................3-147 3.6.8.1 Networking Diagram.......................................................................................................................3-147 3.6.8.2 Service Planning..............................................................................................................................3-147 3.6.8.3 Configuration Process.....................................................................................................................3-149 3.7 Modifying Configurations...........................................................................................................................3-158 3.7.1 Modifying Tunnel Attributes.............................................................................................................3-159 Issue 02 (2010-09-24) Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. xiii

Contents

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management 3.7.1.1 Modifying a Tunnel.........................................................................................................................3-159 3.7.1.2 Deleting a Tunnel............................................................................................................................3-159 3.7.2 Modifying PWE3 Attributes..............................................................................................................3-160 3.7.2.1 Modifying a PWE3 Service.............................................................................................................3-160 3.7.2.2 Deleting a PWE3 Service................................................................................................................3-160 3.7.2.3 Deleting a PWE3 Service on the Network Side..............................................................................3-161 3.7.2.4 Undeploying a PWE3 Service.........................................................................................................3-161

xiv

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

Issue 02 (2010-09-24)

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

Figures

Figures
Figure 1-1 DNI protection example...................................................................................................................1-16 Figure 2-1 End-to-end RTN network management flow.....................................................................................2-4 Figure 2-2 A conflict trail generated because a fiber is added.............................................................................2-9 Figure 2-3 A conflict trail generated because a single station cross-connection is lost.......................................2-9 Figure 2-4 A conflict trail generated because a protection service is deleted on a per-NE basis......................2-10 Figure 2-5 Creating trails by trail search............................................................................................................2-13 Figure 2-6 Creating trails in the automatic mode...............................................................................................2-14 Figure 2-7 Creating trails in the manual mode...................................................................................................2-15 Figure 2-8 Platinum service group.....................................................................................................................2-19 Figure 2-9 Downgraded platinum service group................................................................................................2-20 Figure 2-10 Joining and splitting VC4 server trails...........................................................................................2-68 Figure 2-11 Restrictions on VC4 server trail joining.........................................................................................2-69 Figure 2-12 Restrictions on VC4 server trail joining.........................................................................................2-70 Figure 2-13 Service authorization management.................................................................................................2-72 Figure 2-14 Loopback to Source........................................................................................................................2-82 Figure 2-15 Loopback to Sink............................................................................................................................2-83 Figure 2-16 Basic hierarchy of the Ethernet feature..........................................................................................2-93 Figure 2-17 EPL services of the Port type.........................................................................................................2-93 Figure 2-18 EPL services sharing a PORT port.................................................................................................2-94 Figure 2-19 EPL services sharing a VCTRUNK port........................................................................................2-94 Figure 2-20 Relation Between SDH Trails and Ethernet Trails.........................................................................2-95 Figure 2-21 Networking diagram.....................................................................................................................2-106 Figure 2-22 IDU board configuration .............................................................................................................2-106 Figure 2-23 Configuring Ethernet services......................................................................................................2-106 Figure 2-24 Timeslot allocation of Ethernet services.......................................................................................2-107 Figure 2-25 Server trail for an unterminated EPL service...............................................................................2-111 Figure 2-26 EPLAN between different boards on an NE.................................................................................2-129 Figure 3-1 Process of configuring RTN IP services.............................................................................................3-2 Figure 3-2 MPLS tunnel on the MPLS network..................................................................................................3-6 Figure 3-3 ATM PWE3 over IP tunnel................................................................................................................3-7 Figure 3-4 Process of creating a tunnel..............................................................................................................3-10 Figure 3-5 Working process of a tunnel.............................................................................................................3-11 Figure 3-6 Principles of the tunnel protection....................................................................................................3-13 Issue 02 (2010-09-24) Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. xv

Figures

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management Figure 3-7 Transparent transmission of point-to-point data packets..................................................................3-14 Figure 3-8 Tunnel configuration flow................................................................................................................3-15 Figure 3-9 The figure of tunnel protection group...............................................................................................3-22 Figure 3-10 Networking diagram of the MPLS tunnel...................................................................................... 3-32 Figure 3-11 Networking diagram of the MPLS tunnel...................................................................................... 3-44 Figure 3-12 Basic transmission components of the PWE3................................................................................3-66

Figure 3-13 PWE3 single-hop topology.............................................................................................................3-67 Figure 3-14 PWE3 multi-hop topology..............................................................................................................3-68 Figure 3-15 Network of the static and dynamic hybrid multi-hop PW..............................................................3-71 Figure 3-16 PW redundancy protection............................................................................................................. 3-72 Figure 3-17 CE symmetrical access dual-homing protection.............................................................................3-72 Figure 3-18 Backup protection...........................................................................................................................3-73 Figure 3-19 PW APS protection.........................................................................................................................3-73 Figure 3-20 Application of the PWE3................................................................................................................3-77 Figure 3-21 CES service configuration process.................................................................................................3-78 Figure 3-22 ATM service configuration process................................................................................................3-80 Figure 3-23 Flow of configuring an IP line service........................................................................................... 3-82 Figure 3-24 Flowchart for troubleshooting CES service faults........................................................................3-100 Figure 3-25 Flowchart for troubleshooting ATM service faults......................................................................3-103 Figure 3-26 Flowchart for troubleshooting Ethernet service faults..................................................................3-106 Figure 3-27 Networking diagram of the CES service......................................................................................3-107 Figure 3-28 Networking diagram of the IMA service......................................................................................3-128 Figure 3-29 Networking diagram of the Ethernet service................................................................................3-147

xvi

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

Issue 02 (2010-09-24)

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

Tables

Tables
Table 2-1 SDH trail level......................................................................................................................................2-7 Table 2-2 Comparison of methods for creating trails.........................................................................................2-11 Table 2-3 Priority relations of protection strategies...........................................................................................2-16 Table 2-4 Scheme for managing timeslot resources...........................................................................................2-18 Table 2-5 Processing policy at ingress...............................................................................................................2-95 Table 2-6 Processing policy at egress.................................................................................................................2-96 Table 3-1 Tunnel configuration tasks.................................................................................................................3-15 Table 3-2 Microwave port planning...................................................................................................................3-33 Table 3-3 NE parameter planning......................................................................................................................3-33 Table 3-4 Tunnel planning.................................................................................................................................3-34 Table 3-5 Planning of protection group parameters...........................................................................................3-35 Table 3-6 Microwave port planning...................................................................................................................3-45 Table 3-7 NE parameter planning......................................................................................................................3-45 Table 3-8 Control plane planning.......................................................................................................................3-46 Table 3-9 Tunnel planning.................................................................................................................................3-46 Table 3-10 Features of the ATM cell transparent transmission services............................................................3-76 Table 3-11 Applicable scenarios of various connection types...........................................................................3-76 Table 3-12 Comparison between 1-to-1 and N-to-1 modes...............................................................................3-77 Table 3-13 Tasks for configuring a CES service................................................................................................3-79 Table 3-14 Tasks for configuring an ATM service............................................................................................3-80 Table 3-15 Operation tasks for configuring an IP line service...........................................................................3-82 Table 3-16 List of common symptoms of CES service faults............................................................................3-99 Table 3-17 List of common symptoms of ATM service faults........................................................................3-102 Table 3-18 List of common symptoms of Ethernet service faults....................................................................3-104 Table 3-19 Service port planning.....................................................................................................................3-108 Table 3-20 Parameters for configuring the CES service: NE2-NE3 (The E1 timeslots are partially occupied.) ...........................................................................................................................................................................3-108 Table 3-21 Parameters for configuring the CES service: NE2-NE3 (The E1 timeslots are fully occupied.) ...........................................................................................................................................................................3-109 Table 3-22 Parameters for configuring the CES service: NE1-NE3 (The E1 timeslots are fully occupied.) ...........................................................................................................................................................................3-110 Table 3-23 Parameters of general attributes.....................................................................................................3-114 Table 3-24 Parameters of the source node........................................................................................................3-115 Table 3-25 Parameters of the sink node...........................................................................................................3-116 Issue 02 (2010-09-24) Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. xvii

Tables

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management Table 3-26 PW parameters...............................................................................................................................3-118 Table 3-27 Parameters of advanced attributes..................................................................................................3-120 Table 3-28 Parameters of general attributes.....................................................................................................3-121 Table 3-29 Parameters of the source node........................................................................................................3-121 Table 3-30 Parameters of the sink node...........................................................................................................3-121 Table 3-31 PW parameters...............................................................................................................................3-122 Table 3-32 Parameters of advanced attributes..................................................................................................3-123 Table 3-33 Parameters of general attributes.....................................................................................................3-124 Table 3-34 Parameters of the source node........................................................................................................3-124 Table 3-35 Parameters of the sink node...........................................................................................................3-125 Table 3-36 PW parameters...............................................................................................................................3-125 Table 3-37 Parameters of advanced attributes..................................................................................................3-127 Table 3-38 Service port planning.....................................................................................................................3-129 Table 3-39 IMA planning.................................................................................................................................3-129 Table 3-40 ATM QoS policy planning.............................................................................................................3-130 Table 3-41 ATM service planning....................................................................................................................3-130 Table 3-42 Parameters of general attributes.....................................................................................................3-136 Table 3-43 Parameters of the source node........................................................................................................3-137 Table 3-44 Parameters of the sink node...........................................................................................................3-138 Table 3-45 PW parameters...............................................................................................................................3-138 Table 3-46 Parameter for configuring a ATM connection...............................................................................3-140 Table 3-47 Parameters of advanced attributes..................................................................................................3-141 Table 3-48 Parameters of general attributes.....................................................................................................3-142 Table 3-49 Parameters of the source node........................................................................................................3-142 Table 3-50 Parameters of the sink node...........................................................................................................3-143 Table 3-51 PW parameters...............................................................................................................................3-143 Table 3-52 Parameter for configuring a ATM connection...............................................................................3-145 Table 3-53 Parameters of advanced attributes..................................................................................................3-146 Table 3-54 Service port planning.....................................................................................................................3-148 Table 3-55 Ethernet service planning...............................................................................................................3-148 Table 3-56 Parameters of general attributes.....................................................................................................3-151 Table 3-57 Parameters of the source node........................................................................................................3-151 Table 3-58 Parameters of the sink node...........................................................................................................3-151 Table 3-59 PW parameters...............................................................................................................................3-152 Table 3-60 Service parameters.........................................................................................................................3-154 Table 3-61 PW QoS parameters.......................................................................................................................3-154 Table 3-62 Parameters of advanced attributes..................................................................................................3-154 Table 3-63 Parameters of general attributes.....................................................................................................3-155 Table 3-64 Parameters of the source node........................................................................................................3-155 Table 3-65 Parameters of the sink node...........................................................................................................3-156 Table 3-66 PW parameters...............................................................................................................................3-156 Table 3-67 Service parameters.........................................................................................................................3-157

xviii

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

Issue 02 (2010-09-24)

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

Tables

Table 3-68 PW QoS parameters.......................................................................................................................3-158 Table 3-69 Parameters of advanced attributes..................................................................................................3-158

Issue 02 (2010-09-24)

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

xix

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

1 Managing RTN Protection Subnets

Managing RTN Protection Subnets

About This Chapter


A protection subnet has a structure of providing complete self-protection functions. The purpose of managing RTN protection subnets is to configure and display network protection, for example, viewing, creating, deleting, modifying and searching for protection subnets, managing NNIs, and managing isolated nodes. 1.1 Basic Concepts According to the layered structure of transport network, protection subnet, belonging to the network layer, refers to a network structure that has a comprehensive self-protection function. The protection subnet is a network unit of composing the optical transport network. To have a good understanding of the protection subnet, you need to learn some basic concepts of the network layer. 1.2 Searching for Protection Subnets By searching for a protection subnet, the configured protection attributes at the NE layer on the U2000 are synchronized to the network layer on the U2000 to create protection subnets automatically. 1.3 Configuring an MSP Ring In a ring network topology or when a service exists between rings or between a ring and a chain, you can configure an MSP ring to protect the service if a fault occurs. 1.4 Configuring Linear MSP In the linear network topology, you can configure the linear MSP to protect the network section by section. 1.5 Creating an Path Protection Ring A path protection ring is used to protect a private ring network. Normally, the protection path also transmits the primary service. STM-N signals can be quickly protected at a VC level without runnig a switching protocol. 1.6 Configuring a Non-Protection Ring When services on a ring do not need protection, you can configure a non-protection (NP) ring. All timeslots on the ring can be used to transmit services. 1.7 Configuring a Non-Protection Chain If a service in the chain does not need to be protected, you can configure a non-protection chain. In this case, all the timeslots in the chain can be used to transmit the service.
Issue 02 (2010-09-24) Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. 1-1

1 Managing RTN Protection Subnets

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

1.8 Configuring DNI Protection You can create DNI protection for the interworking nodes of two rings, and for the protection of the interworking services between two ring networks. The network can be a combination of equipment from different vendors or different protection modes. Moreover, DNI is also available to fiber and node failures. 1.9 Configuring IF 1+1 Protection IF 1+1 protection uses a standby path to protect an active service. 1.10 Configuring IF N+1 Protection IF N+1 protection uses a standby path to protect N active services. 1.11 Maintaining Protection Subnets When the protection status of a network is abnormal or when adjusting a network, you need to maintain the protection subnet. 1.12 Deleting Protection Subnets When an existing protection subnet is not suitable, you can delete the protection subnet. 1.13 Deleting Isolated Nodes To release protection resources that are used by isolated nodes, you need to delete isolated nodes.

1-2

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

Issue 02 (2010-09-24)

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

1 Managing RTN Protection Subnets

1.1 Basic Concepts


According to the layered structure of transport network, protection subnet, belonging to the network layer, refers to a network structure that has a comprehensive self-protection function. The protection subnet is a network unit of composing the optical transport network. To have a good understanding of the protection subnet, you need to learn some basic concepts of the network layer. 1.1.1 Protection Subnet A protection subnet refers to a network architecture that has a comprehensive self-protection function. It is a network that composes the optical transmission network. In the U2000, the protection subnet is a generalized concept that includes not only the network architecture with the comprehensive self-protection function, such as the MSP ring and PP ring, but also the network architecture without the self-protection function, such as the non-protection ring and non-protection chain. 1.1.2 Isolated Node An isolated node is not equal to an isolated NE. An isolated node refers to a special logical system that is independent from any protection subnet. It is independent from any protection subnet.

1.1.1 Protection Subnet


A protection subnet refers to a network architecture that has a comprehensive self-protection function. It is a network that composes the optical transmission network. In the U2000, the protection subnet is a generalized concept that includes not only the network architecture with the comprehensive self-protection function, such as the MSP ring and PP ring, but also the network architecture without the self-protection function, such as the non-protection ring and non-protection chain. In the U2000, a protection subnet is a network level concept rather than merely an MSP ring or a PP ring. NEs and fiber connections are the basic elements required to construct a protection subnet. You should create NEs, perform basic configurations for them, and then properly create fiber connections between the NEs. You should have access to sufficient resources to create a protection subnet.

1.1.2 Isolated Node


An isolated node is not equal to an isolated NE. An isolated node refers to a special logical system that is independent from any protection subnet. It is independent from any protection subnet. An isolated node is a node that is configured at NEs but cannot or does not compose a protection subnet with other nodes. An isolated node should not exist in a transmission network that runs normally. The reason for the existence of any isolated nodes can be as follows: l The fiber that should be connected to the node is not created on the U2000.

Issue 02 (2010-09-24)

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

1-3

1 Managing RTN Protection Subnets

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

1.2 Searching for Protection Subnets


By searching for a protection subnet, the configured protection attributes at the NE layer on the U2000 are synchronized to the network layer on the U2000 to create protection subnets automatically.

Prerequisite
l l You must be an NM user with "network maintainer" authority or higher. The NE data must be configured, and fibers must be properly created.

Procedure
Step 1 Choose Service > SDH Protection Subnet > Search for SDH Protection Subnet from the Main Menu. Step 2 In the Consistency Verification of Existing Subnet screen, select the protection subnet and click Next.
NOTE

If the verification is unsuccessful and the subnet becomes abnormal, the search menu is unavailable. In this case, you need to delete the abnormal subnet from the network layer and then re-search for the subnet.

Step 3 Click Search to start the search. The Subnet Name, Consistent Status and Subnet Type parameters of the searched protection subnet are automatically displayed. Step 4 Click Next. The isolated nodes are displayed in the upper left pane of the window. Step 5 Optional: Select the nodes that do not form any protection subnet, and click Delete. Click Yes in the Operation Prompt dialog box. Step 6 Click Finish. The searched protection subnet is displayed in the Main Topology. ----End

1.3 Configuring an MSP Ring


In a ring network topology or when a service exists between rings or between a ring and a chain, you can configure an MSP ring to protect the service if a fault occurs. 1.3.1 Creating an MS Ring Protection Subnet The MS ring protection scheme is adopted in a common ring network. Normally, it is adopted to protect a channel to transmit additional services. By running the APS protocol, it achieves the MS level protection. 1.3.2 Checking Networkwide Multiplex Section Parameters In the same MSP subnet, each NE should have the same multiplex section parameter settings. After configuring or adjusting an MSP subnet, you need to check the parameters for the networkwide multiplex section. 1.3.3 Verifying MSP Protection Switching After creating a protection scheme and setting the related parameters, you can check whether the protection scheme functions normally by performing a switching operation and query the switching status.
1-4 Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. Issue 02 (2010-09-24)

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

1 Managing RTN Protection Subnets

1.3.1 Creating an MS Ring Protection Subnet


The MS ring protection scheme is adopted in a common ring network. Normally, it is adopted to protect a channel to transmit additional services. By running the APS protocol, it achieves the MS level protection.

Prerequisite
l l You must be an NM user with "network maintainer" authority or higher. The NE data must be configured, and fibers must be properly created.

Context
l l The number of nodes in an MSP ring cannot exceed 16. When creating a protection subnet, select SDH NEs only. It is not required to select REG or WDM equipment.

Procedure
Step 1 Choose Service > SDH Protection Subnet > Create 2f_MS SPRing from the Main Menu. The Prompt dialog box is displayed. Click OK.
NOTE

l To create a four-fiber bidirectional MS shared protection ring, choose Service > SDH Protection Subnet > Create 4f_MS SPRing from the Main Menu to display the related dialog box. l To create a two-fiber unidirectional MS shared protection ring, choose Service > SDH Protection Subnet > Create 2f_MS DPRing from the Main Menu to display the related dialog box.

Step 2 Enter the name of the protection subnet. The default name is usually used, for example, 2f_MS SPRing_1. Step 3 Select the rate of the protection subnet, for example, STM-4.

Issue 02 (2010-09-24)

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

1-5

1 Managing RTN Protection Subnets

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

Step 4 Select Resource Sharing and Assigned by VC4 as needed.


NOTE

l Resource Sharing indicates that a port is mapped into multiple protection subnets. If multiple protection subnets uses one port of a board, you need to check the Resource Sharing check box. If different protection subnets use different ports of a board, do not check this check box. If MSP Sharing is enabled, you can check the Resource Sharing check box to map a port of the board to multiple MSPs. l Select the Assigned by VC4 option when there are different VC4s belonging to different protection subnets to achieve virtual optical path protection. For example, for an STM-16 fiber, the VC4 1-4 belong to an STM-4 MSP, and VC4 5-8 belong to a non-protection ring.

Step 5 Add nodes to the protection subnet to be created. Double-click the NE on the Main Topology to add it to the node list in the left-hand pane. Meanwhile, is displayed on the NE icon. If you want to cancel the selection, double-click the NE again.

NOTE

For easy maintenance, the nodes should be added anticlockwise to the protection subnet.

Step 6 Set the attribute of the nodes. Select MSP Node in this example.
1-6 Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. Issue 02 (2010-09-24)

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

1 Managing RTN Protection Subnets

Step 7 Click Next to proceed to the Select Link screen of the wizard. Set parameters, such as Physical Link Information.
NOTE

l If there are multiple fibers between two NEs, select them from the Physical Link Information dropdown list. l If Assigned by VC4 is selected, you can select the working and protection VC4 timeslots as needed.

Step 8 Click Finish to deliver the configuration data. Then the Operation Result prompt box is displayed. Click Close. Step 9 Right-click the protection subnet and choose Protection Subnet Attributes from the shortcut menu. Step 10 Click the Protection Subnet Maintenance tab to check whether the protocol controller starts. If not, select all the NEs of the protection subnet. Right-click and choose Start/Stop Protocol > Start from the shortcut menu. Click Yes in the dialog box that is displayed twice. Ensure that the status of all the values in the Protocol Controller column is Protocol Started. Step 11 Click the Protection Subnet Parameters tab and set the WTR time and SD Condition as needed. Click Apply to deliver the configuration.
NOTE

The WTR time of all NEs in the same protection subnet should be the same.

----End

1.3.2 Checking Networkwide Multiplex Section Parameters


In the same MSP subnet, each NE should have the same multiplex section parameter settings. After configuring or adjusting an MSP subnet, you need to check the parameters for the networkwide multiplex section.

Prerequisite
l l l You must be an NM user with "network monitor" authority or higher. The MSP protection subnet must be created. You need to select the Protection Type in the filter from the Main Topology.

Procedure
Step 1 Choose Service > SDH Protection Subnet > Verify Networkwide MS Parameters from the Main Menu. A progress bar is displayed. Step 2 A prompt appears telling you that the operation was successful. Click Close. ----End

1.3.3 Verifying MSP Protection Switching


After creating a protection scheme and setting the related parameters, you can check whether the protection scheme functions normally by performing a switching operation and query the switching status.
Issue 02 (2010-09-24) Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. 1-7

1 Managing RTN Protection Subnets

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

Prerequisite
l l You must be an NM user with "network operator" authority or higher. The MSP protection subnet must be created.

Context
NOTE

The external switching for MSP protection includes: lockout, forced switching, manual switching and exercise switching. l In the event of lockout of switching, the switching request for the port is denied, but the reversion of switching is allowed. Regardless of the status of the working and protection channels, the services are locked in the working channel. l Forced switching has a higher priority than signal failure and signal degrade, on the protection section. This switching is performed regardless of the protection channel state, unless the protection channel is satisfying a higher priority bridging request. l Manual switching has a lower priority than signal failure and signal degrade, on the protection section. The manual switching request is valid only when there is no signal failure or signal degrade on the protection section. l The exercise switching is used to test the APS protocol. In fact services are not switched to the protection section, and only the calculation result of the protocol is displayed.

CAUTION
Switching other than the exercise switching may interrupt services.

Procedure
Step 1 Choose Service > SDH Protection Subnet > Maintain SDH Protection Subnet from the Main Menu. Step 2 Select an MSP protection subnet from the subnet list. The attribute information of the protection subnet is displayed in the right pane. Step 3 Click the Protection Subnet Maintenance tab. Step 4 Right-click the desired NE and choose an office direction to switch, lock out or clear switching. The prompt dialog box is displayed.
NOTE

l The office direction can be switched only when it is not locked out. l For two-fiber and four-fiber rings, only two office directions can be switched.

Step 5 Click Yes. A prompt appears telling you that the operation was successful. Click OK. Step 6 Click Query and check whether the service of the node is already switched to the protection path. Step 7 Select the node to be verified, right-click it and choose East > Clear All or West > Clear All to clear the switching. ----End
1-8 Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. Issue 02 (2010-09-24)

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

1 Managing RTN Protection Subnets

1.4 Configuring Linear MSP


In the linear network topology, you can configure the linear MSP to protect the network section by section. 1.4.1 Creating a Linear MS Protection Subnet In a chain network, an NE can protect a service in different sections of the fiber after a linear MS protection subnet is created. 1.4.2 Checking Networkwide Multiplex Section Parameters In the same MSP subnet, each NE should have the same multiplex section parameter settings. After configuring or adjusting an MSP subnet, you need to check the parameters for the networkwide multiplex section. 1.4.3 Verifying MSP Protection Switching After creating a protection scheme and setting the related parameters, you can check whether the protection scheme functions normally by performing a switching operation and query the switching status.

1.4.1 Creating a Linear MS Protection Subnet


In a chain network, an NE can protect a service in different sections of the fiber after a linear MS protection subnet is created.

Prerequisite
l l You must be an NM user with "network maintainer" authority or higher. The NE data must be configured, and fibers must be properly created.

Context
Fibers that are related to an linear MSP cannot be used by other protection subnets. That is, an linear MSP and other subnets cannot create virtual fibers together.

Procedure
Step 1 Choose Service > SDH Protection Subnet > Create 1+1 Linear MSP from the Main Menu.
NOTE

To create a M:N linear MS protection scheme, choose Service > SDH Protection Subnet > Create M:N Linear MSP from the Main Menu to display the related dialog box.

Step 2 Enter the name of the protection subnet. The default name is usually used, for example, 1 +1_MSP_1. Step 3 Select the rate of the protection subnet, for example, STM-4.

Issue 02 (2010-09-24)

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

1-9

1 Managing RTN Protection Subnets

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

Step 4 Set Revertive Mode and Switching Mode based on the protection type and requirements.
NOTE

l For M:N linear MS protection scheme, set the number of working links to N. M indicates the number of protection links and cannot be set. Currently, the value is 1 only. l Revertive Mode refers to the handling strategy adopted after the faulty line recovers to normal. l Non-Revertive: The service does not automatically revert to the working channel after the faulty line recovers to normal. l Revertive: The service automatically reverts to the working channel after the faulty line recovers to normal. l Switching Mode refers to the switching strategy adopted after a fault occurs to the line. l Single-ended switching: To protect services, switching occurs at the receive end when the receive end is faulty and at the transmit end when the transmit end is faulty. l Dual-ended switching: To protect services, the switching occurs at the receive and transmit ends when either end is faulty. l Resource Sharing indicates that a port is mapped into multiple protection subnets. If multiple protection subnets uses one port of a board, you need to check the Resource Sharing check box. If different protection subnets use different ports of a board, do not check this check box. l Select the Assigned by VC4 option when there are different VC4s belonging to different protection subnets to achieve virtual optical path protection. For example, for an STM-16 fiber, the VC4 1-4 belong to an STM-4 MSP, and VC4 5-8 belong to a non-protection ring.

Step 5 Add nodes to the protection subnet to be created. Double-click the NE on the Main Topology to add it to the node list in the left-hand pane. Meanwhile, is displayed on the NE icon. If you want to cancel the selection, double-click the NE again.
1-10 Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. Issue 02 (2010-09-24)

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

1 Managing RTN Protection Subnets

Step 6 Click Next to proceed to the Select Link of the wizard. Set the Physical Link Information of Working Link and Protection Link. Step 7 Click Finish to deliver the configuration data. The Operation Result prompt box is displayed. ClickClose. Step 8 Right-click the protection subnet and choose Protection Subnet Attributes from the shortcut menu. Step 9 Click the Protection Subnet Maintenance tab to check whether the protocol controller is started.
NOTE

If the protocol controller is not started, select all the NEs of the protection subnet. Right-click them and choose Start/Stop Protocol > Start from the shortcut menu. Click Yes in the dialog box that is displayed twice. Ensure that the status of all the values in the Protocol Controller column is Protocol Started. Start/Stop Protocol > Start means to enables the APS protocol of the selected station. Start/Stop Protocol > Start the Protocol Networkwide means to enables the APS protocol of all nodes on the ring.

Step 10 Click the Protection Subnet Parameters tab and set the WTR time and SD condition as needed. Click Apply to deliver the configuration.
NOTE

The WTR time of all NEs in the same protection subnet should be the same. You can set the WTR Time only after you set the Revertive Mode to Revertive.

----End

1.4.2 Checking Networkwide Multiplex Section Parameters


In the same MSP subnet, each NE should have the same multiplex section parameter settings. After configuring or adjusting an MSP subnet, you need to check the parameters for the networkwide multiplex section.

Prerequisite
l l l You must be an NM user with "network monitor" authority or higher. The MSP protection subnet must be created. You need to select the Protection Type in the filter from the Main Topology.

Procedure
Step 1 Choose Service > SDH Protection Subnet > Verify Networkwide MS Parameters from the Main Menu. A progress bar is displayed. Step 2 A prompt appears telling you that the operation was successful. Click Close. ----End
Issue 02 (2010-09-24) Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. 1-11

1 Managing RTN Protection Subnets

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

1.4.3 Verifying MSP Protection Switching


After creating a protection scheme and setting the related parameters, you can check whether the protection scheme functions normally by performing a switching operation and query the switching status.

Prerequisite
l l You must be an NM user with "network operator" authority or higher. The MSP protection subnet must be created.

Context
NOTE

The external switching for MSP protection includes: lockout, forced switching, manual switching and exercise switching. l In the event of lockout of switching, the switching request for the port is denied, but the reversion of switching is allowed. Regardless of the status of the working and protection channels, the services are locked in the working channel. l Forced switching has a higher priority than signal failure and signal degrade, on the protection section. This switching is performed regardless of the protection channel state, unless the protection channel is satisfying a higher priority bridging request. l Manual switching has a lower priority than signal failure and signal degrade, on the protection section. The manual switching request is valid only when there is no signal failure or signal degrade on the protection section. l The exercise switching is used to test the APS protocol. In fact services are not switched to the protection section, and only the calculation result of the protocol is displayed.

CAUTION
Switching other than the exercise switching may interrupt services.

Procedure
Step 1 Choose Service > SDH Protection Subnet > Maintain SDH Protection Subnet from the Main Menu. Step 2 Select an MSP protection subnet from the subnet list. The attribute information of the protection subnet is displayed in the right pane. Step 3 Click the Protection Subnet Maintenance tab. Step 4 Right-click the desired NE and choose an office direction to switch, lock out or clear switching. The prompt dialog box is displayed.
NOTE

l The office direction can be switched only when it is not locked out. l For two-fiber and four-fiber rings, only two office directions can be switched.

Step 5 Click Yes. A prompt appears telling you that the operation was successful. Click OK.
1-12 Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. Issue 02 (2010-09-24)

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

1 Managing RTN Protection Subnets

Step 6 Click Query and check whether the service of the node is already switched to the protection path. Step 7 Select the node to be verified, right-click it and choose East > Clear All or West > Clear All to clear the switching. ----End

1.5 Creating an Path Protection Ring


A path protection ring is used to protect a private ring network. Normally, the protection path also transmits the primary service. STM-N signals can be quickly protected at a VC level without runnig a switching protocol.

Prerequisite
l l You must be an NM user with "network maintainer" authority or higher. On the U2000, the data of each NE must be configured, and fibers must be created correctly.

Procedure
Step 1 Choose Service > SDH Protection Subnet > Create PP(Diverse Route) from the Main Menu.
NOTE

To create a two-fiber bidirectional path protection ring, choose Service > SDH Protection Subnet > Create PP(Uniform Route) from the Main Menu to display the related dialog box.

Step 2 Enter the name of the protection subnet. Generally, enter the default name, for example, twofiber unidirectional path protection ring_1. Step 3 Select the capacity level of the protection subnet, for example, STM-4. Step 4 Select Resource Sharing or Assigned by VC4 as required.
NOTE

l Resource Sharing indicates that a port is mapped into multiple protection subnets. If multiple protection subnets uses one port of a board, you need to check the Resource Sharing check box. If MSP Sharing is enabled, you can check the Resource Sharing check box to map a port of the board to multiple MSPs. If different protection subnets use different ports of a board, do not check this check box. l Select the Assigned by VC4 option when there are different VC4s belonging to different protection subnets to achieve virtual optical path protection.

Step 5 Add nodes to the protection subnet to be created. Double-click the NE on the to add it to the node list in the left-hand pane. Meanwhile, is displayed on the NE icon. If you want to cancel the selection, double-click the NE again.

Issue 02 (2010-09-24)

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

1-13

1 Managing RTN Protection Subnets

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

NOTE

For easy maintenance, the nodes should be added anticlockwise to the protection subnet.

Step 6 Set the attribute of each node to PP Node. Step 7 Click Next to proceed to the Select Link screen of the wizard. Set parameters, such as Physical Link Information. Step 8 Click Finish to deliver the configuration data. Then the Operation Result prompt box is displayed. Click Close. ----End

1.6 Configuring a Non-Protection Ring


When services on a ring do not need protection, you can configure a non-protection (NP) ring. All timeslots on the ring can be used to transmit services.

Prerequisite
l l You must be an NM user with "network maintainer" authority or higher. The NE data must be configured, and fibers must be properly created.

Procedure
Step 1 Choose Service > SDH Protection Subnet > Create Unprotected Ring from the Main Menu. Step 2 Enter the name of the protection subnet. The default name is usually used, for example, NP_Ring_1. Step 3 Select the rate of the protection subnet, for example, STM-4. Step 4 Select Resource Sharing and Assigned by VC4 as needed.

1-14

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

Issue 02 (2010-09-24)

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management
NOTE

1 Managing RTN Protection Subnets

l Resource Sharing indicates that a port is mapped into multiple protection subnets. When multiple protection subnets occupy a port of a board, Resource Sharing must be selected. When different protection subnets occupy different ports of a board, Resource Sharing is not required. l Assigned by VC4 indicates that different VC4s belong to different protection subnets to achieve virtual optical path protection. For example, in the case of an STM-16 fiber, the first through fourth VC4s belong to an STM-4 MS shared protection, while the fifth through eighth VC4s belong to a nonprotection ring. If you enable multiple MSPs for a single optical port, you can configure multiple MSP rings by VC4 for the optical port.

Step 5 Add nodes to the protection subnet to be created. Double-click the NE on the Main Topology and add it to the node list in the left-hand pane. Meanwhile, is displayed on the NE icon. If you want to cancel the selection, double-click the NE again.

Step 6 Click Next to proceed to the Select Link screen of the wizard. Set parameters, such as Physical Link Information. Step 7 Click Finish to deliver the configuration data. Then the Operation Result prompt box is displayed. Click Close. ----End

1.7 Configuring a Non-Protection Chain


If a service in the chain does not need to be protected, you can configure a non-protection chain. In this case, all the timeslots in the chain can be used to transmit the service.

Prerequisite
l l You must be an NM user with "network maintainer" authority or higher. On the U2000, the data of each NE must be configured, and fibers must be created correctly.

Procedure
Step 1 Choose Service > SDH Protection Subnet > Create Unprotected Chain from the Main Menu. Step 2 Enter the name of the protection subnet. Generally, enter the default name, for example, nonprotection chain_1. Step 3 Select the capacity level of the protection subnet, for example, STM-4. Step 4 Select Resource Sharing and Assigned by VC4 as needed.
Issue 02 (2010-09-24) Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. 1-15

1 Managing RTN Protection Subnets


NOTE

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

l Resource Sharing indicates that a port is mapped into multiple protection subnets. When multiple protection subnets occupy a port of a board, Resource Sharing must be selected. When different protection subnets occupy different ports of a board, Resource Sharing is not required. l Assigned by VC4 indicates that different VC4s belong to different protection subnets to achieve virtual optical path protection. For example, in the case of an STM-16 fiber, the first through fourth VC4s belong to an STM-4 MS shared protection, while the fifth through eighth VC4s belong to a nonprotection ring. If you enable multiple MSPs for a single optical port, you can configure multiple MSP rings by VC4 for the optical port.

Step 5 Select a node to create a non-protection chain. Double-click an NE in the Main Topology and add it to the left node list. At the same time, is displayed on the NE icon. Double-click the NE icon again to cancel the selection.

Step 6 Click Next to display the Select Link dialog box. Set parameters, such as Physical Link Information. Step 7 Click Finish to deliver the configuration data. Then the Operation Result prompt box is displayed. Click Close. ----End

1.8 Configuring DNI Protection


You can create DNI protection for the interworking nodes of two rings, and for the protection of the interworking services between two ring networks. The network can be a combination of equipment from different vendors or different protection modes. Moreover, DNI is also available to fiber and node failures.

Prerequisite
l l l l You must be an NM user with "network maintainer" authority or higher. NE data must be configured, and fibers must be properly created. Protection subnets must be created for the two rings for which you want to create DNI protection. The DNI protection cannot be created on four-fiber rings.

Context
Figure 1-1 shows a sample networking of DNI protection. Figure 1-1 DNI protection example NE3 or NE5 is the master node while the NE4 or NE6 is the slave node.

1-16

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

Issue 02 (2010-09-24)

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

1 Managing RTN Protection Subnets

NE1

NE4 NP CHAIN_2 Two-fiber MS SPRING_1 NE6 NE7

NE2

NE3 NP CHAIN_1 NE5

Two-fiber PP RING_1

NE8

Procedure
Step 1 Choose Service > SDH Protection Subnet > Create DNI from the Main Menu. Step 2 Enter the name of the protection subnet, for example, DNI_1. Step 3 Double-click the icons of NE3 and NE4 on the view, and select them as the master and slave nodes respectively for the DNI protection.
NOTE

When you select DNI nodes on a protection ring, the west node is the master node and the east node is the slave node.

Step 4 Click Next to select the protection subnet to which the nodes are associated. Select the associated protection subnet from the protection subnet list: 2f-MS-SPRING_1.

Step 5 Click Finish to deliver the configuration data. Step 6 Repeat Steps 2 through 6 to create the master node and the slave node, which are NE5 and NE6. ----End

1.9 Configuring IF 1+1 Protection


IF 1+1 protection uses a standby path to protect an active service.

Prerequisite
l l
Issue 02 (2010-09-24)

You must be an NM user with "network maintainer" authority or higher. The corresponding IF board and the ODU that connects to the IF board must be added.
Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. 1-17

1 Managing RTN Protection Subnets

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

Procedure
Step 1 Choose Service > RTN Protection Subnet > Create IF_1+1 Protection Subnet from the Main Menu. Step 2 Enter the name of the protection subnet. The default name is usually used. For example, IF_1 +1_1. Step 3 Select the capacity level of the protection subnet. For example, STM-1. Step 4 Select the working mode of the protection subnet. For example, SD. Step 5 Select the revertive mode of the protection subnet. For example, non-revertive. l l Revertive: The service is switched back to the working channel after the waiting time specified in WTR Time when the working channel recovers. Non-Revertive: The service keeps working in the protection channel after the working channel recovers.

Step 6 Choose whether to enable reverse switching of a protection subnet. For example, Enable.
NOTE

l Enable: When the active or standby IF board has a service alarm at the source, switching takes place at the source. l Disable: When the preceding situation occurs, switching does not take place at the source.

Step 7 Select the nodes that the protection subnet contains. Double-click the selected NE on the Main Topology and add it to the left-hand node list. Meanwhile, is displayed on the NE icon. Doubleclick the NE again to cancel it. Step 8 Click Next. Set parameters such as Working Link and Protection Link. Step 9 Click Finish to impose the settings. The Operation Result dialog box is displayed. Click Close. ----End

1.10 Configuring IF N+1 Protection


IF N+1 protection uses a standby path to protect N active services.

Prerequisite
l l l l You must be an NM user with "network maintainer" authority or higher. The IF boards and ODUs connected to the IF boards must be created. The STM-1 optical/electrical interface boards (only for the primary NE in the case of 3+1 protection) must be created. In the case of 3+1 protection, configure REG on the secondary NEs.

Procedure
Step 1 Choose Service > RTN Protection Subnet > Create IF_N+1 Protection Subnet from the Main menu.
1-18 Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. Issue 02 (2010-09-24)

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

1 Managing RTN Protection Subnets

Step 2 Enter the name of the protection subnet. The default name is usually used, for example, IF_N +1_1. Step 3 Choose the capacity level for the protection subnet, for example, STM-1. Step 4 Set N, which indicates the number of working channels in the protection subnet.
NOTE

"M" indicates the number of protection links. By default, it is 1. "N" indicates the number of working links.

Step 5 Select included NEs for the protection subnet to be created. In Main Topology, double-click the selected NEs to add them to the node list on the left. Then, the NE icons are displayed as . To cancel the setting, double-click the selected NEs again. Step 6 Click Next. Set the parameters about the physical link information in Working Link and Protection Link. Step 7 Click Finish to deliver the configuration data. The Operation Result dialog box is displayed. Click Close. ----End

1.11 Maintaining Protection Subnets


When the protection status of a network is abnormal or when adjusting a network, you need to maintain the protection subnet. 1.11.1 Finding Protection Subnets When there are a number of protection subnets in a network, you use the search function to quickly find the desired protection subnet. 1.11.2 Querying Protection Subnet Resources You can query the resources of the protection subnets to know the resource distribution in the existing network. Then, you can rationally plan the services. 1.11.3 Collecting Statistics on the SDH Protection Subnet Resources The statistics on the information about protection subnet resources include the basic information about protection subnets and detailed parameters of each node. 1.11.4 Checking MS Protection Switching Status By checking MS protection switching status, in addition to learning about the faults of the NEs or fibers in the MS protection subnet, the network maintenance personnel can locate the faults according to the switching status of each NE in the MS protection subnet. 1.11.5 Setting Protection Subnet Parameters For the SDH and RTN equipment, youYou can set parameters for protection subnet by using the protection subnet maintenance function. 1.11.6 Checking TPS Switching status If tributary protection switching (TPS) takes place, it indicates that the protected tributary board has failed. You can check the TPS switching status to detect faults that caused the failure. 1.11.7 Performing MSP Switching During deployment and commissioning, you can perform switching to test whether MSP switching works properly. In fault maintenance, you can perform this operation to locate faults. 1.11.8 Performing SNCP Service Switching
Issue 02 (2010-09-24) Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. 1-19

1 Managing RTN Protection Subnets

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

During deployment and commissioning, you can perform switching to test whether SNCP switching works properly. In fault maintenance, you can perform this operation to locate faults. 1.11.9 Adjusting the Capacity of an MSP Ring To increase bandwidth utilization without interrupting services, you can adjust the VC4 channels that the configured MSP ring occupies. 1.11.10 Adjusting the Capacity of a Linear MSP You can adjust the number of VC4 channels that the configured linear MSP occupies, without interrupting the service. 1.11.11 Changing an NP Chain to a 1+1 Linear MSP The U2000 allows you to change some protection types without interrupting services, deleting existing services from the protection subnet, and changing the trail name and other attributes. To facilitate network management and maintenance, you can change a non-protection (NP) chain to a 1+1 linear MSP. 1.11.12 Checking IF 1+1 Protection Switching Status If IF 1+1 protection switching occurs, it means that the protected IF board is faulty. By checking the IF 1+1 protection switching status, the network maintenance personnel can detect a fault in a timely manner and prevent the fault from affecting services. 1.11.13 Checking IF N+1 Protection Switching Status Checking protection switching status helps the network maintenance personnel to detect faults in NEs or radio links in the IF N+1 protection subnet and to locate faults to the specific NE.

1.11.1 Finding Protection Subnets


When there are a number of protection subnets in a network, you use the search function to quickly find the desired protection subnet.

Prerequisite
l l You must be an NM user with "network monitor" authority or higher. The protection subnet must be created.

Procedure
Step 1 Right-click in the Main Topology and choose Search SDH Protection Subnet. The Search Protection Subnet dialog box is displayed.

1-20

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

Issue 02 (2010-09-24)

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management
NOTE

1 Managing RTN Protection Subnets

You need to select the Protection check box on the upper right corner of the Main Topology in advance.

Step 2 Set the search condition and enter the keyword. Step 3 Click Search and the protection subnet that is searched out is highlighted in the Network View. ----End

1.11.2 Querying Protection Subnet Resources


You can query the resources of the protection subnets to know the resource distribution in the existing network. Then, you can rationally plan the services.

Prerequisite
l l l You must be an NM user with "network maintainer" authority or higher. The data of each NE must have be configured on the U2000 and the fibers must have been properly created. The protection subnet must have been configured.

Procedure
Step 1 Choose Service > SDH Protection Subnet > Maintain SDH Protection Subnet from the Main Menu to display the Protection Subnet Attributes dialog box. Step 2 Select the protection subnet to be viewed from the protection subnet list. The attribute information of the protection subnet is displayed in the right pane. Step 3 Click the Resource Description tab, view related resources. ----End

1.11.3 Collecting Statistics on the SDH Protection Subnet Resources


The statistics on the information about protection subnet resources include the basic information about protection subnets and detailed parameters of each node.

Prerequisite
You must be an NM user with "network monitor" authority or higher.

Procedure
Step 1 Choose Inventory > SDH Report > Statistics Report of SDH Protection Subnet Resources from the main menu. Step 2 In the Filter window, select the protection subnet type and click Filter. Step 3 In the Statistics Report of SDH Protection Subnet Resource window, view the resources of the qualified protection subnets. Step 4 Optional: Click Print or Save As to output the report. ----End
Issue 02 (2010-09-24) Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. 1-21

1 Managing RTN Protection Subnets

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

1.11.4 Checking MS Protection Switching Status


By checking MS protection switching status, in addition to learning about the faults of the NEs or fibers in the MS protection subnet, the network maintenance personnel can locate the faults according to the switching status of each NE in the MS protection subnet.

Prerequisite
l l You must be an NM user with "network monitor" authority or higher. The MSP protection subnet must be created.

Procedure
Step 1 Choose Service > SDH Protection Subnet > Maintain SDH Protection Subnet from the Main Menu to display the Protection Subnet Attributes dialog box. Step 2 Select an MSP protection subnet from the left pane. The attribute information of the protection subnet is displayed in the right pane. Step 3 Click the Protection Subnet Maintenance tab. Step 4 Click Query to query the switching status of each node. ----End

1.11.5 Setting Protection Subnet Parameters


For the SDH and RTN equipment, youYou can set parameters for protection subnet by using the protection subnet maintenance function.

Prerequisite
l l l You must be an NM user with "network maintainer" authority or higher. On the U2000, the data of each NE must be configured, and fibers are created correctly. The protection subnet must be configured.

Procedure
Step 1 Choose Service > SDH Protection Subnet > Maintain SDH Protection Subnet from the Main Menu. Step 2 In the left-hand pane, select a protection subnet and the attributes of the protection subnet are displayed in the right-hand pane. Step 3 Click the Protection Subnet Parameters tab. Step 4 Click Query to query the parameters of the protection subnet Step 5 Click the WTR Time(s) text box and enter a new value.
NOTE

In the case of the RTN equipment, after you create a protection subnet, you cannot modify the working mode.

Step 6 Optional: To set the SD as the trigger condition of the switching, check the SD Condition check box.
1-22 Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. Issue 02 (2010-09-24)

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

1 Managing RTN Protection Subnets

Step 7 Click Apply. Click Close in the Operation Result dialog box displayed. ----End

1.11.6 Checking TPS Switching status


If tributary protection switching (TPS) takes place, it indicates that the protected tributary board has failed. You can check the TPS switching status to detect faults that caused the failure.

Prerequisite
l l You must be an NM user with "NE and network monitor" authority or higher. TPS protection must be configured.

Procedure
Step 1 In the NE Explorer, select an NE and choose Configuration > TPS Protection from the Function Tree. Step 2 Click Query to query the protection switching status. Step 3 Click Close. ----End

1.11.7 Performing MSP Switching


During deployment and commissioning, you can perform switching to test whether MSP switching works properly. In fault maintenance, you can perform this operation to locate faults.

Prerequisite
l l You must be an NM user with "network operator" authority or higher. The MSP must be created.

Context
NOTE

The external switching for MSP protection includes: lockout, forced switching, manual switching and exercise switching. l In the event of lockout of switching, the switching request for the port is denied, but the reversion of switching is allowed. Regardless of the status of the working and protection channels, the services are locked in the working channel. l Forced switching has a higher priority than signal failure and signal degrade, on the protection section. This switching is performed regardless of the protection channel state, unless the protection channel is satisfying a higher priority bridging request. l Manual switching has a lower priority than signal failure and signal degrade, on the protection section. The manual switching request is valid only when there is no signal failure or signal degrade on the protection section. l The exercise switching is used to test the APS protocol. In fact services are not switched to the protection section, and only the calculation result of the protocol is displayed.

Issue 02 (2010-09-24)

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

1-23

1 Managing RTN Protection Subnets

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

CAUTION
Switching other than the exercise switching may interrupt services.

Procedure
Step 1 Choose Service > SDH Protection Subnet > Maintain SDH Protection Subnet from the Main Menu. Step 2 Select an MSP protection subnet from the subnet list. The attribute information of the protection subnet is displayed in the right pane. Step 3 Click the Protection Subnet Maintenance tab. Step 4 Right-click the desired NE and choose an office direction to switch, lock out or clear switching. The prompt dialog box is displayed.
NOTE

l The office direction can be switched only when it is not locked out. l For two-fiber and four-fiber rings, only two office directions can be switched.

Step 5 Click Yes. A prompt appears telling you that the operation was successful. Click OK. ----End

1.11.8 Performing SNCP Service Switching


During deployment and commissioning, you can perform switching to test whether SNCP switching works properly. In fault maintenance, you can perform this operation to locate faults.

Prerequisite
l l You must be an NM user with "network operator" authority or higher. The SNCP services must be configured.

Context
The external switching for SNCP protection includes: lockout, forced switching and manual switching. l In the event of lockout of switching, the switching request for the port is denied, but the reversion of switching is allowed. Regardless of the status of the working and protection channels, the services are locked in the working channel. Forced switching has a higher priority than signal failure and signal degrade, on the protection section. This switching is performed regardless of the protection channel state, unless the protection channel is satisfying a higher priority bridging request. Manual switching has a lower priority than signal failure and signal degrade, on the protection section. The manual switching request is valid only when there is no signal failure or signal degrade on the protection section.

1-24

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

Issue 02 (2010-09-24)

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

1 Managing RTN Protection Subnets

CAUTION
All switching may interrupt services.

Procedure
Step 1 In the NE Explorer, select an NE and choose Configuration > SNCP Service Control from the Function Tree. Step 2 Select the service in Working Service and right-click on the Current Status. Select the switching or lock operation.
NOTE

A service can be switched only when it is not locked.

Step 3 Click OK. A prompt appears telling you that the operation was successful. Click Close. Step 4 Click Query to query the switching status. ----End

1.11.9 Adjusting the Capacity of an MSP Ring


To increase bandwidth utilization without interrupting services, you can adjust the VC4 channels that the configured MSP ring occupies.

Prerequisite
l l You must be an NM user with "network maintainer" authority or higher. The MSP ring must be created.

Context
l l The capacity adjustment for a protection subnet results in the loss of service protection. Capacity adjustment cannot be performed when the protection subnet is in the switching state.

Procedure
Step 1 Choose Service > SDH Protection Subnet > Manage SDH Protection Subnetfrom the Main Menu. Step 2 Select the desired MSP subnet for which you wish to adjust capacity from the protection subnet list, right-click and choose Capacity adjustment from the shortcut menu, the dialogue box is displayed, click Yes. Step 3 Select the capacity level in the Modify Information field, and check the Resource Sharing check box. Step 4 Click VC4 in Modify Information. Select the desired VC4 channel from the drop-down list, and click
Issue 02 (2010-09-24)

to set it as the selected channel.


Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. 1-25

1 Managing RTN Protection Subnets

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

Step 5 Click Apply. In the Operation Result dialog box displayed, click Close. ----End

1.11.10 Adjusting the Capacity of a Linear MSP


You can adjust the number of VC4 channels that the configured linear MSP occupies, without interrupting the service.

Prerequisite
l l You must be an NM user with "network maintainer" authority or higher. The linear MSP must be created.

Context
l l l This function applies to 1+1 linear MSP and 1:N linear MSP. If the timeslots of a protection subnet is occupied, you cannot change the capacity of the protection subnet to a smaller value. Capacity adjustment cannot be performed when the protection subnet is in the switching state.

Procedure
Step 1 Choose Service > SDH Protection Subnet > Manage SDH Protection Subnetfrom the Main Menu. Step 2 Select the desired MSP subnet from the protection subnet list, right-click and choose Capacity adjustment, the dialogue box is displayed, click Yes. Step 3 Select the capacity level in the Modify Information field, and check the Resource Sharing check box. Step 4 Click VC4 in Modify Information. Select the desired VC4 channel from the drop-down list, and click Step 5 Click Apply. Step 6 Click Yes in the dialog box. A prompt is displayed telling you that the operation was successful. Click Close. ----End to set it as the selected channel.

1.11.11 Changing an NP Chain to a 1+1 Linear MSP


The U2000 allows you to change some protection types without interrupting services, deleting existing services from the protection subnet, and changing the trail name and other attributes. To facilitate network management and maintenance, you can change a non-protection (NP) chain to a 1+1 linear MSP.

Prerequisite
l
1-26

You must be an NM user with "network maintainer" authority or higher.


Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. Issue 02 (2010-09-24)

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

1 Managing RTN Protection Subnets

l l

The protection type should be changed for both the release 5.0 NEs. They should be configured on the U2000 and must run normally. A minimum of two fibers of the same level should lie between the two NEs and should not be occupied by other protection subnets, such as PP, MSP, NP ring, or NP chain with more than two NEs. The protection chain contains no service before you perform this operation.

Procedure
Step 1 Choose Service > SDH Protection Subnet > Change SDH Protection Type from the Main Menu. The protection type change wizard is displayed. Step 2 Select the switching type and the capacity level. Under the Protection switching type area, select a Capacity level. Click Next.

NOTE

As the U2000 allows only the change from an NP chain to a 1+1 linear MSP, you should use the default value for the change type.

Step 3 Select an NE. Select an NE in the List of available NEs pane or click NE on the Main Topology. Click the Click Next.

to select an

to transfer it to the List of selected NEs pane.

Issue 02 (2010-09-24)

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

1-27

1 Managing RTN Protection Subnets

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

NOTE

You can choose only two NEs.

Step 4 Select the working link and the protection link. Select appropriate links as the Working Link and the Protection Link in the Available links pane. Click Next. Step 5 Set the attributes of the protection subnet. Select values for Protection Subnet Name, Switching mode, and Revertive Mode, and set WTR time and Enabling SD.

1-28

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

Issue 02 (2010-09-24)

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

1 Managing RTN Protection Subnets

Step 6 Click Finish. ----End

1.11.12 Checking IF 1+1 Protection Switching Status


If IF 1+1 protection switching occurs, it means that the protected IF board is faulty. By checking the IF 1+1 protection switching status, the network maintenance personnel can detect a fault in a timely manner and prevent the fault from affecting services.

Prerequisite
l l You must be an NM user with "network monitor" authority or higher. The IF 1+1 protection group must be created.

Procedure
Step 1 Choose Service > SDH Protection Subnet > Maintain SDH Protection Subnet from the Main Menu. Step 2 In the left-hand pane, select an IF 1+1 protection subnet. The attributes of the protection subnet are displayed in the right-hand pane. Step 3 Click the Protection Subnet Maintenance tab. Step 4 Click Query to query the switching status of each node. ----End

1.11.13 Checking IF N+1 Protection Switching Status


Checking protection switching status helps the network maintenance personnel to detect faults in NEs or radio links in the IF N+1 protection subnet and to locate faults to the specific NE.

Prerequisite
l l You must be an NM user with "network monitor" authority or higher. An IF N+1 protection subnet must be created.

Procedure
Step 1 Choose Service > SDH Protection Subnet > Maintain SDH Protection Subnet from the Main menu. Step 2 In the left-hand pane, select an N+1 protection subnet, right-click. The attributes of the protection subnet are displayed in the right-hand pane. Step 3 Click the Protection Subnet Maintenance tab. Step 4 Click Query to query the switching status of each node. ----End

1.12 Deleting Protection Subnets


When an existing protection subnet is not suitable, you can delete the protection subnet.
Issue 02 (2010-09-24) Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. 1-29

1 Managing RTN Protection Subnets

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

Prerequisite
You must be an NM user with "network maintainer" authority or higher.

Context
NOTE

The deletion of a protection subnet will leave the equipment or services unprotected. Hence, exercise caution before this operation.

Procedure
Step 1 Choose Service > SDH Protection Subnet > Manage SDH Protection Subnet from the Main Menu. Step 2 Right-click the protection subnet to be deleted and choose Delete from the NM or Delete from the NE or Delete All from the NM from the shortcut menu.
NOTE

The methods to delete a protection subnet are as follows: l Delete from the NM: Deletes the relation between the protection subnet and logical systems at the NE side, to allow deleting of fibers, re-uploading, and so on. This command is not delivered to the NE and does not affect the services. The deleted protection subnet can be located by using the search feature. The U2000 locates it according to the NE layer protection information. l Delete from the NE: Deletes the protection subnet, logical systems at the NE side, and all traffic in the protection subnet. The deleted protection subnet cannot be restored without being created again. l Delete All from the NM: Deletes data other than fibers in the network layer. After the deletion, you can search out trails and protection subnets again by using the search feature. It is recommended that you do not select this option, because a large amount of data will be deleted.

Step 3 In the Operation Prompt dialog box, click Yes.


NOTE

If Delete from the NE is selected, you need to confirm the operation once more.

Step 4 Optional: If there are trails or services on the protection subnet, a confirmation dialog box is displayed. In the confirmation dialog box, specify whether to delete the trails that pass the protection subnet from the network layer of the U2000, and then click Continue. Step 5 After completion, click Close in the dialog box displayed to complete the operation. ----End

1.13 Deleting Isolated Nodes


To release protection resources that are used by isolated nodes, you need to delete isolated nodes.

Prerequisite
l l
1-30

You must be an NM user with "network operator" authority or higher. One or more isolated nodes must exist.
Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. Issue 02 (2010-09-24)

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

1 Managing RTN Protection Subnets

Context

CAUTION
Deleting isolated nodes may interrupt services. Exercise caution when you perform this operation.

Procedure
Step 1 Choose Service > SDH Protection Subnet > Manage SDH Isolated Node from the Main Menu. Step 2 Select the isolated node you want to delete, right-click and choose Delete. Step 3 Click Yes in the confirmation dialog box. ----End

Issue 02 (2010-09-24)

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

1-31

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

2 End-to-End RTN Management

2
About This Chapter
Prerequisite

End-to-End RTN Management

In the end-to-end configuration mode, you can quickly configure radio services and SDH services of the VC12, VC3, VC4 levels. During the end-to-end configuration, you only need to specify the source and sink for the service, and the U2000 automatically calculates the route and creates the service for each NE on the route. The end-to-end configuration mode is also called the trail management function.

The trail management license must be provided for the U2000. 2.1 Managing SDH Trails This section describes how to use the trail function of U2000 to configure an end-to-end SDH service. 2.2 Managing Ethernet Trails In the end-to-end configuration mode, you can quickly create Ethernet services, such as EPL, EVPL or EPLAN. During the end-to-end configuration, you only need to specify the source and sink for the service, and the U2000 automatically calculates the route and creates the service for each NE on the route. The end-to-end configuration mode is also called the trail management function. 2.3 Managing Alarms of an SDH Trail By using the end-to-end trail management function of the U2000, you can manage alarms generated on SDH trails at the network layer. 2.4 Managing the Performance of SDH Trails You can use the network layer function of the U2000 to perform end-to-end performance management on SDH trails. 2.5 Managing Ethernet Trail Alarms You can use the U2000 function of the end-to-end trail management to manage the alarms generated on Ethernet trails at the network layer. 2.6 Browsing the Performance of an Ethernet Trail By browsing the performance of the Ethernet trail, you can learn about the running status of the services in the existing trail.
Issue 02 (2010-09-24) Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. 2-1

2 End-to-End RTN Management

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

2.1 Managing SDH Trails


This section describes how to use the trail function of U2000 to configure an end-to-end SDH service.

Prerequisite
A U2000 user can manage all the trails that the user creates. To manage a trail that is created by another U2000 user, a U2000 user must meet any of the following conditions: l l The U2000 user belongs to the Administrators user group. The right to manage the required trail is allocated to the U2000 user.

2.1.1 Configuration Task Flow A configuration task flow describes the operation tasks that manage an RTN network by using the end-to-end function of the U2000. In addition, the relationships between the operation tasks are described. 2.1.2 Basic Concepts This section describes the basic concepts of the end-to-end management. 2.1.3 Disabling a Fiber Certain fibers may be deleted during O&M. Those fiber resources are not used when you create a trail. Therefore, you can disable those fibers. 2.1.4 Creating SDH Trails by Trail Search For the SDH trails created by trail search, the configured services on each NE are displayed on the U2000 in an end-to-end form. In this way, you can view and manage the routes and resources occupied of each service in an intuitive manner. 2.1.5 Automatically Creating VC4 Trails If you want to create SDH services of the E4, STM-1 levels, you can complete the service configuration quickly by creating end-to-end VC4 trails. 2.1.6 Automatically Creating VC12 and VC3 Trails If you want to create SDH services of the VC12 and VC3 levels, you can complete the service configuration quickly by creating end-to-end VC12 and VC3 trails. 2.1.7 Creating a Platinum Service Group In a platinum service group, the SDH trails do not pass through the same NE, fiber, or fiber/ cable pipe, so that the risk that multiple trails are interrupted is lowered. 2.1.8 Bound Platinum Service Group You can bind a trail or trails when you need to add an existing trail to a platinum service group or bind existing trails as a platinum service group. 2.1.9 Creating an SDH Trail Manually The U2000 has restrictions on trail route computation and does not support complicated network very well. If you fail to create trails using the route computation function, you can use the function of manually creating trails to create them. 2.1.10 Creating PDH Radio Trails When you create a PDH radio trail in the end-to-end mode, services configured on each NE are displayed in the U2000 in the end-to-end mode. This provides a visual display of the route of each service, so that you can view and manage routes and used resources in an easy way. 2.1.11 Creating SDH Radio Trails
2-2 Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. Issue 02 (2010-09-24)

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

2 End-to-End RTN Management

When you create an SDH radio trail in the end-to-end mode, services configured on each NE are displayed in the U2000 in the end-to-end mode. Such display facilitates the check and management over the routes of each service and resources used for each service. 2.1.12 Copying SDH Trails To expand a network, you can quickly create SDH trails by duplicating a created SDH trail. 2.1.13 Modifying an SDH Trail You can use the U2000 to modify a created SDH trail. 2.1.14 Removing a Trail from a Platinum Service Group When the platinum service protection is no longer required but the trail of the platinum service protection needs to be retained, you can remove the trail from the platinum service group. 2.1.15 Configuring Overhead Bytes of an SDH Trail If you want to maintain or monitor the SDH trails, you can set the trail overhead bytes. 2.1.16 Changing Between SNCP and Non-SNCP Trails In the case of a protection subnet change, you can change non-SNCP trails to SNCP trails and vice versa by following this process. This change may interrupt the service. 2.1.17 Enabling or Disabling VC4 Server Trails A VC4 server trail is used to carry lower order client trails between NEs. When the timeslot usage of a VC4 server trail reaches the limit, or you want to transfer a service to another server trail, you can disable or enable the VC4 server trail to set whether it continues to carry lower order trails. This function helps telecom operators to maintain network resources. 2.1.18 Joining and Splitting VC4 Server Trails A VC4 server trail is used only to carry the services between the source and sink NEs, and cannot be used by any intermediate NEs between the source and sink NEs. If you want to change the source and sink NEs of a configured VC4 server trail, you can use the joining and splitting functions. 2.1.19 Service Authorization Management If there are multiple service trails maintained by different operators, they may care about only the trails in their own responsibility but ignore the other services. Service authorization can filter the information not in concern of an operator, who then views and manages only the trails in the responsibility. In this manner, the management and maintenance efficiency is improved. 2.1.20 Viewing SDH Trails By viewing SDH trails, you can learn about the distribution and usage of the SDH trails in the network. 2.1.21 Maintaining SDH Trails You can check and maintain SDH trails to find potential faults in the earliest time. 2.1.22 Deleting SDH Trails The deletion of needless SDH trails releases relevant network resources.

2.1.1 Configuration Task Flow


A configuration task flow describes the operation tasks that manage an RTN network by using the end-to-end function of the U2000. In addition, the relationships between the operation tasks are described. Referring to the Figure 2-1, configure and manage an RTN network.

Issue 02 (2010-09-24)

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

2-3

2 End-to-End RTN Management

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

Figure 2-1 End-to-end RTN network management flow


Configure a protection subnet Configure a trail Maintain a trail

Create an SDH trail Create a radio trail Create a platinum service Configure overheads

View trails

Switch trails

Manage alarms Manage performance

Modify a trail

Disable a server trail Merge server trails Mandatory Delete a trail Optional

NOTE

l When you create a Client or an ODUk trail whose source or sink is an NG WDM NE, you need to set the working mode of the card, and service mode and service type of the port. For details, see Configuring Board Parameters. l When you create a Client or an ODUk trail in a network that consists of NG WDM NEs, you can create the trail on an OCh server trail directly. Specifically, cross-layer creation is supported and the U2000 can create mid-layer server trails automatically.

In the landscape orientation of the configuration flow diagram, the main phases of managing an RTN network by using the end-to-end function of the U2000 are shown, that is, configuring and maintaining a trail. All these functions require the corresponding license that provides the endto-end management function. The portrait orientation of the flow chart shows the relations between operation tasks in each phase.

2.1.2 Basic Concepts


This section describes the basic concepts of the end-to-end management.
2-4 Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. Issue 02 (2010-09-24)

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

2 End-to-End RTN Management

2.1.2.1 SDH Trail This section describes the definition, level and related knowledge of the SDH trail. 2.1.2.2 Radio Trails Describes the definition of the radio trail and related information about the radio trail. 2.1.2.3 Conflict Trail If a trail exists on the U2000, but the cross-connection that forms the trail does not exist at the NE layer, this trail is a conflict trail. 2.1.2.4 Trail Creation Method The U2000 provides multiple methods for creating trails to meet different operation habits of users and requirements of different service scenarios. 2.1.2.5 Process for Creating a Trail The trail creation process describes a series of procedures before a trail is generated on the U2000. The detailed process varies with the creation method. 2.1.2.6 Trail Protection Strategy During trail creation, if multiple routes exist between the source and sink of the trail and the routes belong to different protection subnets, you can use a protection priority strategy to automatically select a route. In the case of sharing of protection subnet resources on the same route, you can also select a different protection priority strategy to determine a protection subnet that the trail uses on this route. 2.1.2.7 Trail Resource Use Strategy Resource use strategies specify the protection subnet resources or timeslots that can be used when the U2000 automatically computes a route during trail creation. 2.1.2.8 Principles for Selecting Timeslots During the Trail Creation After the working and protection routes are defined through the route computation, the U2000 defines the detailed timeslots that each segment of the working or protection route of the trail passes through, according to the networking, the requirement that whether the same timeslots are used, and different schemes for managing timeslot resources. 2.1.2.9 Platinum Service Group The platinum service group is the combination of multiple trails. Any two trails in the group do not pass through the same NE, fiber, or fiber/cable pipe. In this way, services are not hardly interrupted.

2.1.2.1 SDH Trail


This section describes the definition, level and related knowledge of the SDH trail.

Definition
The U2000 network-layer management functions enable the U2000 to implement the SDH service end-to-end management. By using the SDH end-to-end management function, an authorized U2000 user can perform the following operations: l l l l
Issue 02 (2010-09-24)

Configure end-to-end services. View the routes of a trail through the GUI. View details of a trail. Quickly filter, search for and locate trails.
Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. 2-5

2 End-to-End RTN Management

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

l l l

Manage and maintain trails in a centralized manner. Manage alarms and performances based on trails. Print trail reports.

Purpose and Gain


The U2000 provides graphic wizards to display information and guide you to perform SDH endto-end management operations. In this way the operations on the U2000 are performed in an intuitive manner. An SDH trail can be created in the following three modes: automatic, semiautomatic and manual. l l l Using the automatic mode, you only need to specify the source node, sink node and ports for a trail. Using the semi-automatic mode, you can specify the routes and timeslots that a trail passes. Using the manual mode, you need to manually specify the routes and timeslots for a trail.

The end-to-end management is the core of the U2000 network-layer functions. The trail-based way of management greatly simplifies the operation of service configuration and thus reduces the chances of misoperation. l Without the end-to-end management function, configuring a trail requires completely manual operations. For example, to configure a 2M trail that is added from an NE and dropped to the number n NE after passing n NEs, you need to configure cross-connections on each of the n+1 NEs. With the help of the end-to-end management function, configuring such a trail is much simplified. You can ignore the intermediate n-1 nodes. The U2000 automatically generates a trail after you specify the source port and sink port of the trail.

Availability
l l Involved NE: The U2000 SDH end-to-end management function is applicable to all SDH and RTN NEs. license support: SDH end-to-end management is an optional feature of the U2000. It is controlled by license. Hence, the SDH end-to-end management function is available only after a license that supports this feature is obtained. Supporting version: The U2000 V100R001 and later versions support the SDH end-to-end management feature.

Impact
l Impact on system performance: If the requirements for the U2000 system are met and if the U2000 runs normally, SDH end-to-end management does not impose severe impacts on the system. However, the system performance is likely to be affected if the U2000 runs in heavy load. Impact on other features: The SDH end-to-end management is based on the fiber configuration and the protection subnet configuration. The data end-to-end management, if any, is based on the SDH end-to-end management.

SDH Trail Level


Table 2-1 lists the SDH trail levels.
2-6 Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. Issue 02 (2010-09-24)

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

2 End-to-End RTN Management

Table 2-1 SDH trail level Trail Level VC12 VC3 VC4 Rate (Mbit/s) 2 34 155

NOTE

For a trail of the VC12 or VC3 level, you need to create a VC4 server trail first.

Principle
The following describes the principles for the automatic creation of end-to-end SDH trails. l l l l A user selects the source, sink and the level of the trail to be created on the U2000 GUI. The U2000 automatically calculates the routes for the trail and displays the routes on the GUI. The user confirms the trail routes and delivers the command of trail creation. The U2000 creates the trail according to the source, sink and routes of the trail, calculates corresponding cross-connections and gives them down to NEs.

In this way, an end-to-end SDH trail is created on the U2000 and at the same time, the service is automatically delivered to related NEs.

Implementation
SDH end-to-end management is an optional function, available only after a license that supports this function is provided.

2.1.2.2 Radio Trails


Describes the definition of the radio trail and related information about the radio trail.

Definition
Radio trails are classified into PDH radio trails and SDH radio trails. Radio end-to-end management refers to the end-to-end management of radio services by using the network-level management function of the U2000. With the radio end-to-end management function, the user can perform the following operations: l l l l l l
Issue 02 (2010-09-24)

Configures end-to-end services. View the routes of a trail through the GUI. Queries details on trails. Quickly filters, searches for, and locates trails. Manages and maintains trails in a centralized manner. Manages alarms and performance events by trail.
Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. 2-7

2 End-to-End RTN Management

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

Prints trail reports.

Objective and Benefit


In the case of radio end-to-end management, the operations are performed and displayed in a graphic wizard, which makes the operations vivid. A radio trail can be created in the semiautomatic mode, automatic mode, or manual mode. l l l Automatic mode: Specify only the source node and sink node, and the port on each node. Semi-automatic mode: Optionally specify the routes that the trail traverses along and involved timeslots. Manual mode: Manually specify each route that the trail traverses and each involved timeslot.

End-to-end management is the key network-level function of the U2000. Configuring services by means of trail management simplifies the operations and reduces the error likeliness to a great extent. l If the end-to-end management function is unavailable, configuration of a trail is totally based on manual operations. For example, a required 2 Mbit/s trail starts from an NE, traverses N-1 NEs, and finally ends at the Nth NE. To configure such a 2 Mbit/s trail, you need to configure timeslot cross-connections on each of the N NEs. The end-to-end function makes configuration of such a trail as simple as to specify only the source port and sink port. Then, the U2000 generates the required trail.

Availability
l l Involved NEs: The radio end-to-end management function of the U2000 is intended to manage all RTN NEs. License support: The radio end-to-end management feature is optional for the U2000 and is controlled by a license file. The radio end-to-end management function is available only when the required license file is provided. Version support: The radio end-to-end management function is supported by the U2000 of V100R001 or any later version.

Impact
l Impact on System Performance On the required conditions for the management capability of U2000, the radio end-to-end management does not cause great impact on system performance. If the U2000 works with overload, the system performance, however, is definitely affected. l Impact on Other Features The end-to-end radio trail management is based on configuration of fibers and protection subnets. The data end-to-end function, if made available, depends on the radio end-to-end function.

Principles
The principle for automatic creation of a radio end-to-end trial is as follows: l
2-8

The user selects the level, source, and sink for the trail to be created on the U2000.
Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. Issue 02 (2010-09-24)

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

2 End-to-End RTN Management

l l l

The U2000 automatically computes the routes for the trail and displays the routes in the user interface. The user checks the routes for the trail and confirms creation of the trail. The U2000 creates the trail according to the source, sink, and routes, computes the crossconnections, and delivers the configuration to NEs.

In this way, one end-to-end radio trail is created on the U2000. Also, the trail configuration is delivered to NEs for trail setup.

Implementation
The radio end-to-end function is optional and is available only when the required license file is provided.

2.1.2.3 Conflict Trail


If a trail exists on the U2000, but the cross-connection that forms the trail does not exist at the NE layer, this trail is a conflict trail.

Cause
A trail consists of a single station cross-connection at the NE layer. If the configuration data at the NE layer changes and a complete trail cannot be formed at the network layer, the trail that exists on the U2000 is a conflict trail, and the corresponding cross-connection at the NE layer becomes a discrete service. l Adding a fiber leads to trail extension. Assume that a trail is NE A-> NE B. Create a fiber from NE B to NE C, and create a service on NE C. As a result, the trail is extended as NE A->NE C. The trail NE A-> NE B that exists on the U2000 becomes a conflict trail. See Figure 2-2. Figure 2-2 A conflict trail generated because a fiber is added

NE A

NE B

NE C

The single station cross-connection is lost. The original trail is NE A-> NE C. The cross-connection of the trail on NE B is deleted. On the U2000, the original trail of NE A-> NE C becomes a conflict trail and services on NE A and NE C become discrete services. See Figure 2-3. Figure 2-3 A conflict trail generated because a single station cross-connection is lost

NE A
Issue 02 (2010-09-24)

NE B

NE C
2-9

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

2 End-to-End RTN Management

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

Delete a protection service on a per-NE basis. NE 1 and NE 2 comprises a 1+1 linear protection and the original trail is NE 1-> NE 2. If cross-connection D of NE 2 is deleted, the original trail of NE 1-> NE 2 becomes a conflict trail. See Figure 2-4. Figure 2-4 A conflict trail generated because a protection service is deleted on a per-NE basis
Cross-Connection A Working Trail Cross-Connection C

Cross-Connection B NE1

Protection Trail

Cross-Connection D NE2

Handling Method
During trail search, if the U2000 searches out a conflict trail, the U2000 stops the searching and asks you to confirm the conflict trail. There are the following two handling methods: l Stop searching. If you fail to verify that the conflict trail is correct, you can choose to stop searching. The conflict trail remains, but the U2000 does not generate a new trail. l Continue to search. The system deletes the conflict trail from the network layer. This operation does not delete the cross-connection on a per-NE basis, and does not affect services on the NE.
NOTE

After the conflict trail is deleted, its customized information, including the trail name, remarks, is permanently lost and cannot be restored.

2.1.2.4 Trail Creation Method


The U2000 provides multiple methods for creating trails to meet different operation habits of users and requirements of different service scenarios. To successfully create a trail on the U2000, the following prerequisites must be met: l l l All the NEs that the trail passes through must have enough idle resources. The data on the U2000 must be consistent with the data on the NE. The fibers on the U2000 are correctly connected.

Table 2-2 shows the methods, features, and application scenarios of the trail creation.

2-10

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

Issue 02 (2010-09-24)

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

2 End-to-End RTN Management

Table 2-2 Comparison of methods for creating trails Trail Creation Method Feature Application Scenario This method is applicable to the scenario that the service is already configured on a perNE basis. This method requires better technical knowledge of users. During the search, users may need to handle conflict trails and discrete services. This method is applicable to the creation of a majority of normal trails.

Creating trails by trail search On a per-NE basis, configure all nodes that a service passes through. Then, by using the network-layer trail search function, combine crossconnections of each node to form end-to-end trails.

Creating trails in the automatic mode

l The service is configured directly at the network layer. After the activation of the trail, the U2000 deliver the crossconnections related to the trail to all NEs involved. l The route can be computed automatically. l If multiple routes exist between the selected source and sink, you can set to select a route.

Creating trails in the manual mode

l The service is configured directly at the network layer. After the activation of the trail, the U2000 deliver the crossconnections related to the trail to all NEs involved. l The method does not support the automatic route computation, and thus you need to manually add all segments of the routes.

This method is applicable to certain special trails, such as the mono nodal trail whose source and sink are the same NE, the trail that passes through a DNI protection subnet, the trail with multiple sources and sinks, and the broadcast trail. This method is usually used to create broadcast services. Operations of this function are complicated. Thus, this function is not recommended for the creation of normal trails.

Issue 02 (2010-09-24)

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

2-11

2 End-to-End RTN Management

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

Trail Creation Method Creating trails by trail replication

Feature l The service is configured directly at the network layer. After the activation of the trail, the U2000 deliver the crossconnections related to the trail to all NEs involved. l The route can be computed automatically. l You can only use the exsiting trail on the U2000 as a template and create the trails with the same route in batches.

Application Scenario This method is applicable to the batch creation of trails with the same route, that is, the trails share the same source, sink, and server trail with the original trail.

2.1.2.5 Process for Creating a Trail


The trail creation process describes a series of procedures before a trail is generated on the U2000. The detailed process varies with the creation method. Figure 2-5 shows the process for creating trails by trail search. Figure 2-6 shows the process for creating trails in the automatic mode. Figure 2-7 shows the process for creating trails in the manual mode. Creating trails by trail replication depends on the existing trail on the U2000. The process is similar to the process of creating trails in the automatic mode.

2-12

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

Issue 02 (2010-09-24)

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

2 End-to-End RTN Management

Figure 2-5 Creating trails by trail search


Start

Obtain all cross-connections of NEs networkwide

Sort cross-connections by level

Search out trails at the server layer and then the client layer

Check whether new trails conflict with original trails

The searched is paused and conflicting trails are displayed

Delete conflicting trails

Whether to resume the search N Stop the trail search

The network management system starts to manage new trails

Check whether discrete services that do not form trails exist Y N The information about discrete services is displayed

End

Issue 02 (2010-09-24)

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

2-13

2 End-to-End RTN Management

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

Figure 2-6 Creating trails in the automatic mode


Start

Check whether the server trail for the trail to be created exists Y Set trail attributes, such as the direction, level, and rate

Create or search out the server trail

Set the resource use strategy and protection priority strategy (optional)

Set the source and sink NEs for the trail

Set route restriction conditions related to the node, link, and timeslot (optional)

Whether to set the trail as an SNCP trail N Set basic attributes for the trail

Set the SNCP protection route

Activate the trail

End

2-14

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

Issue 02 (2010-09-24)

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

2 End-to-End RTN Management

Figure 2-7 Creating trails in the manual mode


Start

Check whether the server trail for the trail to be created exists Y Set trail attributes, such as the direction, level, and rate

Create or search out the server trail

Set the source and sink NEs for the trail

Specify the routes that the trail passes through section by section

Set basic attributes for the trail

Activate the trail

End

2.1.2.6 Trail Protection Strategy


During trail creation, if multiple routes exist between the source and sink of the trail and the routes belong to different protection subnets, you can use a protection priority strategy to automatically select a route. In the case of sharing of protection subnet resources on the same route, you can also select a different protection priority strategy to determine a protection subnet that the trail uses on this route. The U2000 provides three protection priority strategies, that is, Trail Protection First, SNCP First, and NP First, as shown in Table 2-3. Based on different protection priority strategies, the protection subnets have different priorities.

Issue 02 (2010-09-24)

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

2-15

2 End-to-End RTN Management

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

Table 2-3 Priority relations of protection strategies Priority 1 Trail Protection First Two-fiber bidirectional MS shared protection ring Four-fiber bidirectional MS shared protection ring Two-fiber unidirectional MS dedicated protection ring MS linear protection 1:N MS linear protection 1+1 Non-protection SNCP protection SNCP First DNI NP First Non-protection

SNCP protection

SNCP protection

Two-fiber unidirectional PP ring Two-fiber bidirectional PP ring MS linear protection 1+1 MS linear protection 1:N Two-fiber unidirectional MS dedicated protection ring Four-fiber bidirectional MS shared protection ring Two-fiber bidirectional MS shared protection ring Non-protection

Two-fiber bidirectional PP ring

Two-fiber unidirectional PP ring MS linear protection 1+1 MS linear protection 1:N Two-fiber bidirectional MS shared protection ring Four-fiber bidirectional MS shared protection ring Two-fiber unidirectional MS dedicated protection ring DNI

5 6 7

Two-fiber bidirectional PP ring

Two-fiber unidirectional PP ring DNI

10

Application Example of Trail Protection Strategies


According to priority relations of protection strategies, when you select SNCP First, the path protection is prior to the non-protection. When the path protection and non-protection share resources on a route, if you want to configure the service to a path ring to obtain the ring protection by using the trail management function, you must set Protection Priority Strategy to SNCP First.
2-16 Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. Issue 02 (2010-09-24)

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

2 End-to-End RTN Management

2.1.2.7 Trail Resource Use Strategy


Resource use strategies specify the protection subnet resources or timeslots that can be used when the U2000 automatically computes a route during trail creation. U2000 defines three resource use strategies. That is, Protected Resource, Extra Resource, and All Resource. The principles for selecting the resource use strategies are as follows: l Protected Resource: During trail creation, the following resources are available: PP, SNCP, non-protection, 1+1 protection, protection timeslots of an MSP ring, and protection timeslots of 1:1 protection. Select this strategy to create trails in general situations. Extra Resource: During trail creation, the following resources are available: nonprotection, extra timeslots of an MSP ring, and extra timeslots of 1:1 protection. Select this strategy to create extra trails. All Resource: During trail creation, the following resources are available: PP, SNCP, nonprotection, 1+1 protection, protection timeslots of an MSP ring, extra timeslots of an MSP ring, protection timeslots of 1:1 protection, and extra timeslots of 1:1 protection. This strategy means that all resources can be used.

Application Example for Resource Use Strategies


l If you want to create a trail that uses the extra timeslots of the PP ring and MSP ring, you should select the All Resource strategy. If you select the other two options, a trail of this type cannot be created. If the non-protection subnet and the protection subnet without extra resources exist, during the trail creation, the Extra Resource strategy cannot be used to create trails on the nonprotection subnet.

2.1.2.8 Principles for Selecting Timeslots During the Trail Creation


After the working and protection routes are defined through the route computation, the U2000 defines the detailed timeslots that each segment of the working or protection route of the trail passes through, according to the networking, the requirement that whether the same timeslots are used, and different schemes for managing timeslot resources. The process for selecting timeslots during the trail creation is a process that consists of the check of available timeslot resources and the computation of detailed timeslots.

Management of Timeslot Resources


The U2000 provides two schemes for managing timeslot resources, as shown in Table 2-4. They differ from each other in the methods of saving idle resources. The two schemes complement each other and can define timeslots for a majority of networking. The U2000 often combine the working and protection routes and then define timeslots. If the U2000 fails to define timeslots, the U2000 defines timeslots for the working and protection routes respectively, combine the working and protection routes, and verify whether the timeslots conflict with each other.

Issue 02 (2010-09-24)

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

2-17

2 End-to-End RTN Management

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

Table 2-4 Scheme for managing timeslot resources Scheme for Managing Timeslot Resources All idle resources of routes are managed in a uniform manner. Advantage It is easy to handle a normal situation. Disadvantage l The situation that the protection subnet is of resource sharing or the protection subnet is divided according to VC4 cannot be handled. l The situation that the forward and inverse resources are not symmetrical cannot be handled. Each segment of working or protection route manages the available resources on its own route respectively. l The situation that the protection subnet is of resource sharing or the protection subnet is divided according to VC4 can be handled. l The situation that the forward and inverse resources are not symmetrical can be handled. l The resources for each segment of the route are saved respectively. Thus, the handling of timeslots can be flexible. When you calculate detailed timeslots, you should consider saving forward and inverse resources respectively and the forward and inverse resource should be symmetrical whenever possible.

Principles for Calculating Timeslots


The timeslot calculation must follow certain rules. For example, the timeslot that is occupied by each segment of the route on the MSP ring must be consistent and, on the release 4.0 NEs, the timeslots that are used by a dual fed and selective receiving service must be the same. These limitations or optimization schemes form the principles for calculating timeslots. The details are as follows: l Principle for binding timeslots: Certain segments of the route are bound. When the timeslot for a certain segment of the route is updated, the timeslots for other segments of the route are updated. For example, in the case of the unidirectional MSP on the trail, you should bind the forward and inverse timeslots, that is, the forward and inverse timeslots should be symmetrical whenever possible. Principle for reducing timeslots: With consideration of all situations, reduce idle timeslots gradually and select available timeslots from the remaining idle timeslots. For example, to make inverse and forward routes to use the same timeslots, you should reduce the inverse resources according to the existing forward resources.
Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. Issue 02 (2010-09-24)

2-18

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

2 End-to-End RTN Management

Situation That Timeslots Cannot Be Defined Automatically


In the case of a minority of networking, if you create a cross-ring E4 service on intersecting path protection shared rings, the U2000 cannot select timeslots automatically. Thus, you need to specify the explicit timeslots for all segments of the route manually. If the timeslots failed to be defined, check whether there are enough idle timeslots in the forward and inverse directions of the server trail and check whether the selected explicit timeslots are correct.

2.1.2.9 Platinum Service Group


The platinum service group is the combination of multiple trails. Any two trails in the group do not pass through the same NE, fiber, or fiber/cable pipe. In this way, services are not hardly interrupted. As shown in Figure 2-8, a bidirectional service exists between Router1 and Router2 and this service is displayed as trail A between NE1 and NE2 in the management scope of the U2000. To protect the service, another bidirectional trail needs to be added between the two routers and this trail is displayed as trail B between NE3 and NE4 in the management scope of the U2000. When you create trail B, trail A is considered as a reference trail so that the two trails do not pass through the same NE, fiber, or fiber/cable pipe. In this way, the risk that the two trails are interrupted at the same time is lowered. Therefore, trail A and trail B form a platinum service group. Figure 2-8 Platinum service group

The platinum service group must meet the requirements as follows: l l l l A platinum service group contains a minimum of two trails. The trails cannot pass through the same NEs. The trails cannot pass through the same fiber. The trails cannot pass through the same fiber/cable pipes.

When a third trail needs to be added into the platinum service group, you only need to specify the existing trail A or trail B as the reference trail and then the U2000 automatically searches out the two existing trails and groups the three trails.
NOTE

You can also bind the existing trails to generate a platinum service group.

Issue 02 (2010-09-24)

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

2-19

2 End-to-End RTN Management

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

As shown in Figure 2-8, when the platinum service group is no longer required, you can remove trail B from the platinum service group instead of deleting trail B. In this way, trail A and trail B are independent of each other and their routes are not mutually constrained. If rerouting occurs or the route is modified, the two trails may pass through the same NE, fiber, and fiber/cable pipe. When you create trails, different trails cannot fully comply with the requirements of the platinum services due to insufficient resources and then you can create downgraded platinum services. As shown in Figure 2-9, trail A and trail B pass through NE5 and thus you can create only a downgraded platinum service group. A downgraded platinum service group cannot provide the expected protection of a platinum service group. For example, when NE5 is faulty, the connection between Router1 and Router2 is interrupted. To make the service group fully comply with the requirements of the platinum service, you can change the route of trail B to the route of trail C between NE3 and NE4, when resources are sufficient. Figure 2-9 Downgraded platinum service group A platinum service group contains multiple trails. Therefore, the service is not interrupted unless all trails are interrupted. After detecting the interruption of a certain trail, the U2000 checks whether other trails in the platinum service group are interrupted. If a complete trail exists, the severity of the service interruption alarm is reduced to a lower level. When the platinum service group does not meet the requirements due to a certain cause, the platinum service group is in the downgraded state and the U2000 reports an alarm about the downgrade of the platinum service.

2.1.3 Disabling a Fiber


Certain fibers may be deleted during O&M. Those fiber resources are not used when you create a trail. Therefore, you can disable those fibers.

Prerequisite
l l You must be an NM user with "network administrator" authority or higher. When both ends of a fiber are connected to the SDH equipment, the fiber can be disabled. When both ends of a fiber are connected to the WDM equipment or Ethernet cards, the fiber cannot be disabled. When one end of a fiber is connected to the SDH equipment and the other end is connected to the WDM equipment, the fiber cannot be disabled.

Procedure
Step 1 Choose Inventory > Fiber/Cable > Fiber/Cable Management from the Main Menu. Step 2 Select the fiber/cable to be disabled and click Modify Fiber/Cable. Step 3 In the dialog box that is displayed, double-click Disabled Status and select from Disable the drop-down list. Step 4 Click OK. Step 5 In the Operation Result dialog box, click Close. ----End
2-20 Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. Issue 02 (2010-09-24)

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

2 End-to-End RTN Management

2.1.4 Creating SDH Trails by Trail Search


For the SDH trails created by trail search, the configured services on each NE are displayed on the U2000 in an end-to-end form. In this way, you can view and manage the routes and resources occupied of each service in an intuitive manner. 2.1.4.1 Searching for SDH Trails After a new network is set up or services are configured on a per-NE basis, you need to perform an SDH trail search so that you can manage configured services by using the trail management function. 2.1.4.2 Viewing Discrete Services If some cross-connections on an NE cannot form trails of the network layer and can only be isolated on the NE, these cross-connections are called discrete services. 2.1.4.3 Discrete Service Causes and Handling Measures After trail search, discrete services are usually caused by the following factors, which are unsatisfied trail search conditions, U2000 trail search restrictions, incomplete or wrong configuration of cross-connections. 2.1.4.4 Setting the Remarks of a Discrete Service When managing discrete services, you can set the remarks of a discrete service. 2.1.4.5 Activating and Deactivating Discrete Services If certain cross-connections on NEs cannot form network-layer trails but exist on NEs separately, these cross-connections are called discrete services. Deactivating discrete services deletes the NE cross-connections from NEs and saves the relevant data on the U2000 only. This operation helps to release the occupied channels. On the contrary, activating discrete services deploys cross-connections to NEs according to the data saved on the U2000. 2.1.4.6 Acknowledging or Unacknowledging Discrete Services In this user interface, you can acknowledge discrete services and filter discrete services based on their acknowledgment status. 2.1.4.7 Deleting Discrete Services Discrete services occupy the cross-connections required by normal services. As a result, normal services cannot be created. Therefore, you need to delete the discrete services that are not in use.

2.1.4.1 Searching for SDH Trails


After a new network is set up or services are configured on a per-NE basis, you need to perform an SDH trail search so that you can manage configured services by using the trail management function.

Prerequisite
l l l l l You must be an NM user with "network maintainer" authority or higher. The license for the trail management function must be provided. NE data must be uploaded to the U2000. Fiber connections between the NEs must be created correctly. All the desired services that are configured on a per-NE basis must be active when trails are created through trail search.

Issue 02 (2010-09-24)

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

2-21

2 End-to-End RTN Management

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

Context
The search only updates the trail information at the network layer on the U2000. The service operation or the configuration data of the NE is not affected by the search. In the searching progress, the U2000 does not permit another SDH trail search, a search for SDH protection subnets, or creation of SDH trails.

Procedure
Step 1 Choose Service > SDH Trail > Search for SDH Trail from the Main Menu. Step 2 Optional: Select a proper Search Strategy if necessary.
NOTE

l Search Discrete Cross-Connections Only: searches for all discrete cross-connections that do not form trails in the entire network. l Search By Subnet: searches for trails only in the specific subnet.

Step 3 In the Search for SDH Trail wizard displayed, click Next to start the trail search.
NOTE

If an end-to-end trail cannot be formed due to the conflict of cross-connections, the information about the cross-connections in conflict is displayed. The search can only be continued after deleting the conflicting trails. Deleting conflicting trails does not affect services.

Step 4 The search process lasts for some time, with the specific duration depending on the number of services. Wait until the search is complete as indicated by the progress bar, and then click Next to view the trail information. Step 5 Optional: Select a trail and right-click to set the management flag.
NOTE

The management flag indicates whether the trail is included in the network trail management. By default, the trail is under management. If you exclude the trail from the network trail management, you can also manage cross-connections of single NEs during station-by-station service configuration.

Step 6 Click Next and the trails that are searched out without the management flags are deleted from the network layer by the U2000. This operation does not affect the NE services or the NM data of single NEs. You can then view all discrete services (that is, the cross-connections that cannot form trails) in the network. Step 7 Click Finish. ----End

2.1.4.2 Viewing Discrete Services


If some cross-connections on an NE cannot form trails of the network layer and can only be isolated on the NE, these cross-connections are called discrete services.

Prerequisite
You must be an NM user with "network monitor" authority or higher.

2-22

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

Issue 02 (2010-09-24)

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

2 End-to-End RTN Management

Procedure
Step 1 Choose Service > SDH Trail > Manage SDH Discrete Service from the Main Menu. Step 2 In the Prompt dialog box displayed, click OK. Step 3 In the Set Discrete Service Browse Filter Criteria dialog box displayed, select the filter criteria and click Filter. In the Manage SDH Discrete Service window, you can view details of the discrete services and causes of forming these services.

----End

2.1.4.3 Discrete Service Causes and Handling Measures


After trail search, discrete services are usually caused by the following factors, which are unsatisfied trail search conditions, U2000 trail search restrictions, incomplete or wrong configuration of cross-connections.

Causes of Discrete Services


1. Unsatisfied trail search conditions l The data on the U2000 is inconsistent with those on NEs. l The fibers created on the U2000 do not match actual fiber connections. l Protection subnets are not created or cannot be searched. l The NE data configuration is incorrect. For example, a non-protection chain service is created on the protection ring, the NE logic system of the service does not belong to any protection subnet, or the protection subnet configuration is wrong.
Issue 02 (2010-09-24) Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. 2-23

2 End-to-End RTN Management

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

2.

U2000 trail search restrictions l If the VC4 server trail is created between two NEs but the lower order (VC12 and VC3) trails are not created, the services are not sent to NEs. In this case, when another U2000 performs the trail search on these two NEs, the VC4 server trail cannot be searched out. l In a VC4 server trail with multiple sources and multiple sinks, if some sources or sinks are on SDH NNIs and others are on common optical and electrical interfaces, the trail cannot be searched.

3.

Incomplete or wrong configuration of cross-connections l The timeslot for the protection route is not configured. This often happens in a PP or SNCP protection subnet. l The timeslot configured for the protection route is wrong. l The SNCP service configuration is wrong, which results in an incomplete protection route. l The service configuration is incomplete. Check whether incomplete services are configured in the station-by-station mode, for example, pass-through services may not be configured on pass-through NEs. You should complete this service configuration and search for the trails again.

Handling Discrete Services


1. Method I: (1) Perform a consistency check to check whether the data on the U2000 and the data on the NEs are consistent or not. If not, upload the configuration data to the U2000. (2) Verify that the fiber connections created on the U2000 are consistent with the actual fiber connections, and that there are no errors like wrong fiber connection on the U2000. (3) Search for protection subnets. Verify that all the protection subnets are searched. Check whether the parameters for protection subnets and the logical system of each node are set correctly, and whether SDH NNIs are created for SDH NNI services. (4) Perform a trail search on the U2000. (5) If discrete services are found, analyze and handle them according to the causes displayed on the U2000 and the handling measures that are given above. It is recommended that you handle the discrete services at add/drop tributaries first, then handle the those SDH NNI discrete services, and finally the pass-through discrete services. 2. Method II: Convert discrete services to mono nodal trails. For detailed operations, see 2.1.21.7 Converting SDH Discrete Services to Mono Nodal Trails.

How to Avoid Discrete Services


Use the trail management function to configure services whenever possible. This is because services configured in this way do not form discrete services. When a discrete service is found, handle it as soon as possible so that it does not affect subsequent service configuration.

2.1.4.4 Setting the Remarks of a Discrete Service


When managing discrete services, you can set the remarks of a discrete service.
2-24 Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. Issue 02 (2010-09-24)

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

2 End-to-End RTN Management

Prerequisite
You must be an NM user with "network operator" authority or higher.

Context
When the NMS receives notifications like deleting cross-connections or fibers, trails may be deleted. As a result, discrete services exist. The remarks of these discrete services automatically record the original path.

Procedure
Step 1 Choose Service > SDH Trail > Manage SDH Discrete Service from the Main Menu. Step 2 In the Prompt dialog box displayed, click OK. Step 3 In the Set Discrete Service Browse Filter Conditions dialog box displayed, select the filter criteria and click Filter. In the Manage SDH Discrete Service window, you can view details of the discrete services and causes of forming these services.

NOTE

In the remarks of the Set Discrete Service Browse Filter Conditions dialog box, enter the keyword. Then, you can perform a fuzzy query for discrete services by remarks.

Step 4 Select a discrete service, right-click, and then choose Remarks from the shortcut menu. Step 5 In the dialog box that is displayed, set the remarks of the discrete service, and click OK. ----End
Issue 02 (2010-09-24) Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. 2-25

2 End-to-End RTN Management

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

Postrequisite
You can click the table header to sort discrete services by remarks.

2.1.4.5 Activating and Deactivating Discrete Services


If certain cross-connections on NEs cannot form network-layer trails but exist on NEs separately, these cross-connections are called discrete services. Deactivating discrete services deletes the NE cross-connections from NEs and saves the relevant data on the U2000 only. This operation helps to release the occupied channels. On the contrary, activating discrete services deploys cross-connections to NEs according to the data saved on the U2000.

Prerequisite
You must be an NM user with "network operator" authority or higher.

Procedure
Step 1 Choose Service > SDH Trail > Manage SDH Discrete Service from the Main Menu. Step 2 In the prompt dialog box, click OK. Step 3 In the Set Discrete Service Browse Filter Criteria dialog box, set the filter criteria, and click Filter. Step 4 Optional: Select one or more inactive discrete services, right-click, and then choose Active from the shortcut menu. Step 5 Optional: Select one or more active discrete services, right-click, and then choose Deactivate from the shortcut menu.
NOTE

When activating or deactivating discrete services in batches each time, you can select a maximum number of 1,000 records. Otherwise, the Active or Deactivate menu grays out.

Step 6 In the prompt dialog box, click OK. Step 7 In the Operation Result dialog box, click Close. ----End

2.1.4.6 Acknowledging or Unacknowledging Discrete Services


In this user interface, you can acknowledge discrete services and filter discrete services based on their acknowledgment status.

Prerequisite
You must be an NM user with "network operator" authority or higher.

Context
Discrete services occupy network resources and this may affect the successful creation of trails. Therefore, you can acknowledge unnecessary cross-connections. In this way, another network maintainer can determine whether a discrete service is an unnecessary cross-connection based on the acknowledgment status. If unnecessary, the maintainer deletes the service.
2-26 Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. Issue 02 (2010-09-24)

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

2 End-to-End RTN Management

Procedure
Step 1 Choose Service > SDH Trail > Manage SDH Discrete Service from the Main Menu. Step 2 In the dialog box displayed, click OK. Step 3 In the Set Discrete Service Browse Filter Criteria dialog box, set filter criteria and click Filter. Step 4 Optional: In the list, select one or more discrete services that are not acknowledged, right-click, and choose Acknowledge from the shortcut menu. Step 5 Optional: In the list, select one or more discrete services that are acknowledged, right-click, and choose Cancel Acknowledgement from the shortcut menu. Step 6 In the Operation Result dialog box, click Close.
NOTE

Right-click one or more discrete services and choose Remarks from the shortcut menu. In the Remarks dialog box, enter detailed descriptions of the discrete services.

----End

Result
l l If a discrete service is acknowledged, Acknowledge Status of the service is Yes. If a discrete service is not acknowledged yet, Acknowledge Status of the service is No.

Postrequisite
l l When viewing discrete services, you can filter the services based on their acknowledgment status. To release resources, you can delete the discrete services that are acknowledged. For detailed operations, see 2.1.4.7 Deleting Discrete Services.

2.1.4.7 Deleting Discrete Services


Discrete services occupy the cross-connections required by normal services. As a result, normal services cannot be created. Therefore, you need to delete the discrete services that are not in use.

Prerequisite
l l You must be an NM user with "network operator" authority or higher. The discrete services to be deleted must be in the inactive state.

Procedure
Step 1 Choose Service > SDH Trail > Manage SDH Discrete Service from the Main Menu. Step 2 In the prompt dialog box, click OK. Step 3 In the Set Discrete Service Browse Filter Criteria dialog box, set the filter criteria, and click Filter. Step 4 Select one or more discrete services to be deleted, right-click, and then choose Delete from the shortcut menu.
Issue 02 (2010-09-24) Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. 2-27

2 End-to-End RTN Management


NOTE

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

When deleting discrete services in batches each time, you cannot select inactive and active discrete services and can select a maximum number of 1,000 records. Otherwise, the Delete menu grays out.

Step 5 In the prompt dialog box, click OK. Step 6 In the Operation Result dialog box, click Close. ----End

2.1.5 Automatically Creating VC4 Trails


If you want to create SDH services of the E4, STM-1 levels, you can complete the service configuration quickly by creating end-to-end VC4 trails. 2.1.5.1 Creating a Non-SNCP VC4 Trail By creating an end-to-end VC4 trail, you can quickly create an E4, STM-1 SDH service without SNCP. In different protection subnets, the methods for creating a non-SNCP VC4 trail are the same. 2.1.5.2 Creating an SNCP VC4 Trail By creating an end-to-end VC4 trail, you can quickly create an E4, STM-1 SDH service with SNCP. The methods for creating an SNCP VC4 trail are the same in different protection subnets. 2.1.5.3 Verifying the SNCP Trail Protection Switching To detect faults on NEs or on fibers through which an SNCP trail passes, the maintenance engineers can check the switching status of the trail. The engineers can then locate the point where the fault is generated according to the switching status of each NE in the protection subnet.

2.1.5.1 Creating a Non-SNCP VC4 Trail


By creating an end-to-end VC4 trail, you can quickly create an E4, STM-1 SDH service without SNCP. In different protection subnets, the methods for creating a non-SNCP VC4 trail are the same.

Prerequisite
l l You must be an NM user with "network operator" authority or higher. The license for the trail management function must be provided.

Context
When creating the VC4 trail, you do not need to create a server trail.

Procedure
Step 1 Choose Service > SDH Trail > Create SDH Trail from the Main Menu. Step 2 Set the service direction according to the protection subnet type. Set the service level to VC4 or VC4-Xc. Step 3 Set the Service Domain, Resource Usage Strategy and Protection Priority Strategy.
2-28 Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. Issue 02 (2010-09-24)

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management
NOTE

2 End-to-End RTN Management

l Resource Usage Strategy defines the protection subnet resources or timeslots available during trail creation. The values are Protected Resource, Extra Resource and All Resource. l Protection Priority Strategy defines the protection subnet resources that must be selected first during trail creation. The values are Trail Protection First, SNCP First and NP First.

Step 4 Optional: On the main topology in the right pane of the trail creation window, right-click the required NE, and then choose Browse Alarms List from the shortcut menu. Then, you can view the alarms of the NE. This operation helps to plan and configure services in a better way. Step 5 Double-click the source NE and the sink NE in turn. Select the board and port in the Select Board Port dialog box and click OK. The trail is automatically selected, and is displayed between the source and sink NEs.

Step 6 Optional: Specify the explicit link of the service. l l Click a server trail between the NEs to specify the included route. Click the trail again or click Cancel Route Restriction to cancel the selection. Click the Explicit Link tab. Right-click the blank area in the tab and choose Add from the shortcut menu. In the Add Explicit Link window displayed, you can search for the existing server trails and set them as the explicit links of the trails to be created.

Step 7 Optional: Specify the explicit node. l Click the Explicit Node tab. Double-click an NE of the subnet to specify the explicit NE of the route. This NE is shown as the icon. Double-click the NE again to cancel the selection. Click the Explicit Node tab. Right-click the blank area in the tab and choose Add from the shortcut menu. In the Add Explicit Node window displayed, you can search for the nodes and set them as the explicit nodes of the trails to be created.

Step 8 Optional: Specify the excluded node. l Click the Excluded Node tab. You can specify the NE that the route of the trail to be created is not allowed to pass through by double-clicking the NE. The selected NE is marked with a sign. (Double-click the NE again to cancel the selection.) Click the Excluded Node tab. Right-click the blank area and choose Add from the shortcut menu. In the Add Excluded Node window displayed, you can search for the nodes and set them as the explicit nodes of the trails to be created.

Step 9 Optional: Click Set Route Timeslot. The Set Route Timeslot dialog box is displayed. Select the timeslot and click OK.
Issue 02 (2010-09-24) Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. 2-29

2 End-to-End RTN Management


NOTE

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

l If you do not assign the timeslot, the first available timeslot is selected automatically. l If multiple trails are selected, right-click them and choose Uniform Timeslot. U2000 consider the timeslot value of the trail in the first row as the datum value and modify the timeslot values of other trails to be consistent with the datum value. In this way, all trails use the same timeslot.

Step 10 Optional: If the trail passes through an ASON domain, you can check the SPC First check box and click ASON Attributes Settings to set the parameters. Step 11 Optional: Click the General Attributes tab and set the general attributes of the trail, such as the Name and Order No.. Step 12 Optional: If you do not want to activate the created trail when the configuration is issued to NEs, you can uncheck the Activate the trail check box.
NOTE

l If you activate a trail, the service configuration data of the trail is sent to the NE. l If you do not activate a trail, the service configuration data of the trail is stored at the NE layer on the U2000.

Step 13 Optional: Check the Alarm Reversion check box to set the alarm reversion on the trail to be created. Step 14 Optional: If you want to create multiple trails with the same route, check the Copy after Creation check box. After the creation of the trail, a dialog box is displayed and you can copy the trail. Step 15 Click Apply. Step 16 Optional: If the creation is successful, click Browse Trail in the displayed dialog box. Then, you can view the trail on the interface. ----End

2.1.5.2 Creating an SNCP VC4 Trail


By creating an end-to-end VC4 trail, you can quickly create an E4, STM-1 SDH service with SNCP. The methods for creating an SNCP VC4 trail are the same in different protection subnets.

Prerequisite
l l You must be an NM user with "network operator" authority or higher. The license for the trail management function must be provided.

Context
When creating the VC4 trail, you do not need to create a server trail.

Procedure
Step 1 Choose Service > SDH Trail > Create SDH Trail from the Main Menu. Step 2 Set the service direction and the level to VC4 or VC4-Xc. Step 3 Set the Service Domain.
2-30 Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. Issue 02 (2010-09-24)

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

2 End-to-End RTN Management

Step 4 Set the resource usage strategy to Protected Resource and the protection priority strategy to SNCP First.
NOTE

l Resource Usage Strategy defines the protection subnet resources or timeslots available during trail creation. The values are Protected Resource, Extra Resource and All Resource. l Protection Priority Strategy defines the protection subnet resources that must be selected first during trail creation. The values are Trail Protection First, SNCP First and NP First.

Step 5 Optional: On the main topology in the right pane of the trail creation window, right-click the required NE, and then choose Browse Alarms List from the shortcut menu. Then, you can view the alarms of the NE. This operation helps to plan and configure services in a better way. Step 6 Double-click the source NE and the sink NE in turn. Select the board and port in the Select Board Port dialog box and click OK. The trail is automatically selected, and is displayed between the source and sink NEs.

Step 7 Optional: Specify the explicit link of the service. l l Click a server trail between the NEs to specify the included route. Click the trail again or click Cancel Route Restriction to cancel the selection. Click the Explicit Link tab. Right-click the blank area in the tab and choose Add from the shortcut menu. In the Add Explicit Link window displayed, you can search for the existing server trails and set them as the explicit links of the trails to be created.

Step 8 Optional: Specify the explicit node. l Click the Explicit Node tab. Double-click an NE of the subnet to specify the explicit NE of the route. This NE is shown as the icon. Double-click the NE again to cancel the selection. Click the Explicit Node tab. Right-click the blank area in the tab and choose Add from the shortcut menu. In the Add Explicit Node window displayed, you can search for the nodes and set them as the explicit nodes of the trails to be created.

Step 9 Optional: Specify the excluded node. l Click the Excluded Node tab. You can specify the NE that the route of the trail to be created is not allowed to pass through by double-clicking the NE. The selected NE is marked with a sign. (Double-click the NE again to cancel the selection.) Click the Excluded Node tab. Right-click the blank area and choose Add from the shortcut menu. In the Add Excluded Node window displayed, you can search for the nodes and set them as the explicit nodes of the trails to be created.
Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. 2-31

Issue 02 (2010-09-24)

2 End-to-End RTN Management

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

Step 10 Optional: Click Set Route Timeslot. The Set Route Timeslot dialog box is displayed. Select the timeslot and click OK.
NOTE

l If you do not assign the timeslot, the first available timeslot is selected automatically. l If multiple trails are selected, right-click them and choose Uniform Timeslot. U2000 consider the timeslot value of the trail in the first row as the datum value and modify the timeslot values of other trails to be consistent with the datum value. In this way, all trails use the same timeslot.

Step 11 Click the SNCP setting tab. l Right-click the dual-fed point and choose Set Dual-Fed Point, and the node is marked with a l sign. Right-click the selective-receiving point and choose Set Selective-Receiving sign. Point, and the node is marked with a

Right-click in the dual-fed and selective-receiving list and choose Add from the shortcut menu. In the Add the dual-fed and selective-receiving node displayed, select Dual-Fed Point and Selective-Receiving Point. Click OK.

Step 12 Click the SNCP Attribute tab and set SNCP attribute. Step 13 Optional: If the trail passes through an ASON domain, you can check the SPC First check box and click ASON Attributes Settings to set the parameters. Step 14 Optional: Click the General Attributes tab and set the general attributes of the trail, such as the Name and Order No.. Step 15 Optional: If you do not want to activate the created trail when the configuration is issued to NEs, you can uncheck the Activate the trail check box.
NOTE

l If you activate a trail, the service configuration data of the trail is sent to the NE. l If you do not activate a trail, the service configuration data of the trail is stored at the NE layer on the U2000.

Step 16 Optional: Check the Alarm Reversion check box to set the alarm reversion on the trail to be created. Step 17 Optional: If you want to create multiple trails with the same route, check the Copy after Creation check box. After the creation of the trail, a dialog box is displayed and you can copy the trail. Step 18 Click Apply.
2-32 Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. Issue 02 (2010-09-24)

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

2 End-to-End RTN Management

Step 19 Optional: If the creation is successful, click Browse Trail in the displayed dialog box. Then, you can view the trail on the interface. ----End

2.1.5.3 Verifying the SNCP Trail Protection Switching


To detect faults on NEs or on fibers through which an SNCP trail passes, the maintenance engineers can check the switching status of the trail. The engineers can then locate the point where the fault is generated according to the switching status of each NE in the protection subnet.

Prerequisite
l l You must be an NM user with "network operator" authority or higher. The SNCP trail must be created.

Context

CAUTION
Performing the SNCP switching may cause short interruption of the services.

Procedure
Step 1 Select Service > SDH Trail > Manage SDH Trail from the Main Menu. Step 2 In the Set Trail Browse Filter Criteria dialog box, set the filter conditions, and then click Filter All. The trails are displayed in the list.
NOTE

l Click Filter All to refresh and display all the qualified trails. l Click Secondary Filter to filter the trails that are already displayed. l Click Incremental Filter to add the newly qualified trails to the list without refreshing the trails that are already displayed.

Step 3 Select an SNCP trail from the list. Click the Maintenance > SNC Service Control. Step 4 In the SNC Service Controldialog box, select the source or sink of the SNC. Click Function. Then select a proper switching mode to switch the SNC service. Step 5 Click Query. Check whether Active Channel shows that the SNC service is switched to the expected trail. If not, the explicit NE or fiber of the trail is faulty. Step 6 If you want to clear the switching, select the NE verified in Step 4. Click Function, and then select Clear. ----End

2.1.6 Automatically Creating VC12 and VC3 Trails


If you want to create SDH services of the VC12 and VC3 levels, you can complete the service configuration quickly by creating end-to-end VC12 and VC3 trails.

Issue 02 (2010-09-24)

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

2-33

2 End-to-End RTN Management

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

2.1.6.1 Creating a VC4 Server Trail A VC4 server trail is used to carry the VC12 and VC3 trails between the NEs. Before creating a VC12 or VC3 trail, you need to create a VC4 server trail between the NEs. 2.1.6.2 Creating a Non-SNCP VC12 or VC3 Trail By creating an end-to-end VC12 or VC3 trail, you can quickly create an E1 or T1 or E3 or T3 SDH service without SNCP. In different protection subnets, the methods for creating a nonSNCP VC12 or VC3 trail are the same. 2.1.6.3 Creating an SNCP VC12 or VC3 Trail By creating an end-to-end VC12 or VC3 trail, you can quickly create an E1 or T1 or E3 or T3 SDH service with SNCP. The methods for creating an SNCP VC12 or VC3 trail in different protection subnets are the same. 2.1.6.4 Verifying the SNCP Trail Protection Switching To detect faults on NEs or on fibers through which an SNCP trail passes, the maintenance engineers can check the switching status of the trail. The engineers can then locate the point where the fault is generated according to the switching status of each NE in the protection subnet.

2.1.6.1 Creating a VC4 Server Trail


A VC4 server trail is used to carry the VC12 and VC3 trails between the NEs. Before creating a VC12 or VC3 trail, you need to create a VC4 server trail between the NEs.

Prerequisite
l l You must be an NM user with "network operator" authority or higher. A protection subnet must be created for release 4.0 NEs, including the OptiX 155/622H (Metro 1000), the OptiX 155/622, the OptiX 2500+ (Metro 3000), and the OptiX Metro 3100 and so on. The license for the trail management function must be provided. The OptiX 10G (Metro 5000) NE must have the AMXS, EMXS or ETXC board where the low order cross-connection protection pairs are created in U2000. The OptiX OSN 9500 NE must have the GXCL or EXCL board where the lower order cross-connection protection pairs are created in U2000. The available resources must be sufficient.

l l l l

Context
l A VC4 server trail is used only to carry services between the source and sink NEs, and cannot be used by any intermediate NEs. Hence, for the convenience of bandwidth use, VC4 server trails are usually created between two adjacent NEs, instead of between two NEs that have intermediate NEs. Before deleting a VC4 server trail, you need to delete its lower order trail. A VC4 server trail is used to carry the VC12 and VC3 trails between the NEs. Hence, when you create higher order services such as VC4 or VC4-Xc services, you need not create the VC4 server trail.

Procedure
Step 1 Choose Service > SDH Trail > Create SDH Trail from the Main Menu. Step 2 Set the service direction to Bidirectional and level to VC4 Server Trail.
2-34 Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. Issue 02 (2010-09-24)

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

2 End-to-End RTN Management

Step 3 Set the Service Domain, Resource Usage Strategy and Protection Priority Strategy parameters.
NOTE

Pay attention to the following points when setting the parameters: l Resource Usage Strategy defines the protection subnet resources or timeslots available during trail creation. The values are Protected Resource, Extra Resource and All Resource. l Protection Priority Strategy defines the protection subnet resources to be selected first during trail creation. The values are Trail Protection First, SNCP First and NP First.

Step 4 Double-click the source NE and the sink NE in turn. The automatically selected route is displayed between the NEs.

Step 5 Optional: Specify the explicit link of the service. l l Click a server trail between the NEs to specify the included route. Click the trail again or click Cancel Route Restriction to cancel the selection. Click the Explicit Link tab. Right-click the blank area and choose Add from the shortcut menu. In the Add Explicit Link window displayed, you can search for the existing server trails and set them as the explicit links of the trails to be created.

Step 6 Optional: Specify the explicit node. l Click the Explicit Node tab. Double-click an NE of the subnet to specify the explicit NE of the route. This NE is shown as the icon. Double-click the NE again to cancel the selection. Click the Explicit Node tab. Right-click the blank area in the tab and choose Add from the shortcut menu. In the Add Explicit Node window displayed, you can search for the nodes and set them as the explicit nodes of the trails to be created.

Step 7 Optional: Specify the excluded node. l l Double-click another NE in this subnet to specify the excluded nodes for the trail. The selected NE is marked with a sign. (Double-click the NE again to cancel the selection.) Click the Excluded Node tab. Right-click the blank area and choose Add from the shortcut menu. In the Add Excluded Node window displayed, you can search for the nodes and set them as the explicit nodes of the trails to be created.

Step 8 Optional: Click Set Route Timeslot. The Set Route Timeslot dialog box is displayed. Select the timeslot and click OK.

Issue 02 (2010-09-24)

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

2-35

2 End-to-End RTN Management


NOTE

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

l If you do not assign the timeslot, the first available timeslot is selected automatically. l If multiple trails are selected, right-click them and choose Uniform Timeslot. U2000 consider the timeslot value of the trail in the first row as the datum value and modify the timeslot values of other trails to be consistent with the datum value. In this way, all trails use the same timeslot.

Step 9 Optional: Click the General Attributes tab and set the general attributes of the trail, such as the Name and Order No.. Step 10 Optional: If you do not want to activate the created trail when the configuration is issued to NEs, you can uncheck the Activate the trail check box.
NOTE

l If you activate a trail, the service configuration data of the trail is sent to the NE. l If you do not activate a trail, the service configuration data of the trail is stored at the NE layer on the U2000.

Step 11 Optional: If you want to create multiple trails with the same route, check the Copy after Creation check box. After the creation of the trail, a dialog box is displayed and you can copy the trail. Step 12 Click Apply. Step 13 Optional: If the creation is successful, click Browse Trail in the displayed dialog box. Then, you can view the trail on the interface. ----End

2.1.6.2 Creating a Non-SNCP VC12 or VC3 Trail


By creating an end-to-end VC12 or VC3 trail, you can quickly create an E1 or T1 or E3 or T3 SDH service without SNCP. In different protection subnets, the methods for creating a nonSNCP VC12 or VC3 trail are the same.

Prerequisite
l l You must be an NM user with "network operator" authority or higher. The VC4 server trail is created between the source and sink NEs, and free timeslots are available on the VC4 server trail.

Context
l When the VC12/VC3 trail transits multiple VC4 server trails, the consistency of VC4 timeslot used by each server trail is not required, but the U2000 automatically uses the server trails that use the same VC4 timeslot if possible. To create a VC12/VC3 trail in a unidirectional or bidirectional PP ring, you need to create a VC4 server trail that forms a closed loop, and the VC4 timeslot used by each server trail must be consistent.

Procedure
Step 1 Choose Service > SDH Trail > Create SDH Trail from the Main Menu. Step 2 Select the service direction according to the protection subnet type. Set the service level to VC12 or VC3.
2-36 Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. Issue 02 (2010-09-24)

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

2 End-to-End RTN Management

Step 3 Configure the Service Domain, Resource Usage Strategy and Protection Priority Strategy.
NOTE

l Resource Usage Strategy defines the protection subnet resources or timeslots available during trail creation. The values are Protected Resource, Extra Resource and All Resource. l Protection Priority Strategy defines the protection subnet resources that must be selected first during trail creation. The values are Trail Protection First, SNCP First and NP First.

Step 4 Optional: On the main topology in the right pane of the trail creation window, right-click the required NE, and then choose Browse Alarms List from the shortcut menu. Then, you can view the alarms of the NE. This operation helps to plan and configure services in a better way. Step 5 Double-click the source NE and the sink NE in turn. Select the board and port in the Select Board Port dialog box and click OK. The trail is automatically selected, and is displayed between the NEs.

Step 6 Optional: Specify the explicit link of the service. l l Click a server trail between the NEs to specify the included route. Click the trail again or click Cancel Route Restriction to cancel the selection. Click the Explicit Link tab. Right-click the blank area in the tab and choose Add from the shortcut menu. In the Add Explicit Link window displayed, you can search for the existing server trails and set them as the explicit links of the trails to be created. Click the Explicit Node tab. Double-click an NE of the subnet to specify the explicit NE of the route. This NE is shown as the icon. Double-click the NE again to cancel the selection. Click the Explicit Node tab. Right-click the blank area in the tab and choose Add from the shortcut menu. In the Add Explicit Node window displayed, you can search for the nodes and set them as the explicit nodes of the trails to be created. Click the Excluded Node tab. You can specify the NE that the route of the trail to be created is not allowed to pass through by double-clicking the NE. The selected NE is marked with a sign. (Double-click the NE again to cancel the selection.) Click the Excluded Node tab. Right-click the blank area and choose Add from the shortcut menu. In the Add Excluded Node window displayed, you can search for the nodes and set them as the explicit nodes of the trails to be created.

Step 7 Optional: Specify the explicit node. l

Step 8 Optional: Specify the excluded node. l

Step 9 Optional: Click Set Route Timeslot. The Set Route Timeslot dialog box is displayed. Select the timeslot and click OK.
Issue 02 (2010-09-24) Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. 2-37

2 End-to-End RTN Management


NOTE

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

l If you do not assign the timeslot, the first available timeslot is selected automatically. l If multiple trails are selected, right-click them and choose Uniform Timeslot. U2000 consider the timeslot value of the trail in the first row as the datum value and modify the timeslot values of other trails to be consistent with the datum value. In this way, all trails use the same timeslot.

Step 10 Optional: If the trail passes through the ASON domain, you can check the Select ASON Server Trail First check box. Click the ASON Attributes Settings tab and set the corresponding protection attributes. Step 11 Optional: Click the General Attributes tab and set the general attributes of the trail, such as the Name and Order No.. Step 12 Optional: If you do not want to activate the created trail when the configuration is issued to NEs, you can uncheck the Activate the trail check box.
NOTE

l If you activate a trail, the service configuration data of the trail is sent to the NE. l If you do not activate a trail, the service configuration data of the trail is stored at the NE layer on the U2000.

Step 13 Optional: Check the Alarm Reversion check box to set the alarm reversion on the trail to be created. Step 14 Optional: If you want to create multiple trails with the same route, check the Copy after Creation check box. After the creation of the trail, a dialog box is displayed and you can copy the trail. Step 15 Click Apply. Step 16 Optional: If the creation is successful, click Browse Trail in the displayed dialog box. Then, you can view the trail on the interface. ----End

2.1.6.3 Creating an SNCP VC12 or VC3 Trail


By creating an end-to-end VC12 or VC3 trail, you can quickly create an E1 or T1 or E3 or T3 SDH service with SNCP. The methods for creating an SNCP VC12 or VC3 trail in different protection subnets are the same.

Prerequisite
l l You must be an NM user with "network operator" authority or higher. The VC4 server trail is created between the source and sink NEs, and free timeslots are available on the VC4 server trail.

Context
When the VC12/VC3 trail transits multiple VC4 server trails, the consistency of VC4 timeslot used by each server trail is not required, but the U2000 automatically uses the server trails that use the same VC4 timeslot if possible.

Procedure
Step 1 Choose Service > SDH Trail > Create SDH Trail from the Main Menu.
2-38 Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. Issue 02 (2010-09-24)

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

2 End-to-End RTN Management

Step 2 Set the service direction and the level to VC12 or VC3. Step 3 Set the Service Domain. Step 4 Set the resource usage strategy to Protected Resource and the protection priority strategy to SNCP First.
NOTE

l Resource Usage Strategy defines the protection subnet resources or timeslots available during trail creation. The values are Protected Resource, Extra Resource and All Resource. l Protection Priority Strategy defines the protection subnet resources that must be selected first during trail creation. The values are Trail Protection First, SNCP First and NP First.

Step 5 Optional: On the main topology in the right pane of the trail creation window, right-click the required NE, and then choose Browse Alarms List from the shortcut menu. Then, you can view the alarms of the NE. This operation helps to plan and configure services in a better way. Step 6 Double-click the source NE and the sink NE in turn. Select the board and port in the Select Board Port dialog box and click OK. The trail is automatically selected, and is displayed between the NEs.

Step 7 Optional: Specify the explicit link of the service. l l Click a server trail between the NEs to specify the included route. Click the trail again or click Cancel Route Restriction to cancel the selection. Click the Explicit Link tab. Right-click the blank area in the tab and choose Add from the shortcut menu. In the Add Explicit Link window displayed, you can search for the existing server trails and set them as the explicit links of the trails to be created.

Step 8 Optional: Specify the explicit node. l Click the Explicit Node tab. Double-click an NE of the subnet to specify the explicit NE of the route. This NE is shown as the icon. Double-click the NE again to cancel the selection. Click the Explicit Node tab. Right-click the blank area in the tab and choose Add from the shortcut menu. In the Add Explicit Node window displayed, you can search for the nodes and set them as the explicit nodes of the trails to be created.

Step 9 Optional: Specify the excluded node. l Click the Excluded Node tab. You can specify the NE that the route of the trail to be created is not allowed to pass through by double-clicking the NE. The selected NE is marked with a sign. (Double-click the NE again to cancel the selection.)
Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. 2-39

Issue 02 (2010-09-24)

2 End-to-End RTN Management

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

Click the Excluded Node tab. Right-click the blank area and choose Add from the shortcut menu. In the Add Excluded Node window displayed, you can search for the nodes and set them as the explicit nodes of the trails to be created.

Step 10 Optional: Click Set Route Timeslot. The Set Route Timeslot dialog box is displayed. Select the timeslot and click OK.
NOTE

l If you do not assign the timeslot, the first available timeslot is selected automatically. l If multiple trails are selected, right-click them and choose Uniform Timeslot. U2000 consider the timeslot value of the trail in the first row as the datum value and modify the timeslot values of other trails to be consistent with the datum value. In this way, all trails use the same timeslot.

Step 11 Click the SNCP Setting tab. l Right-click the dual-fed point and choose Set Dual-Fed Point, and the node is displayed as l . Right-click the selective-receiving point and choose Set Selective-Receiving Point, and the node is displayed as . Right-click the area in the tab and choose Add from the shortcut menu. In the Add the dual-fed and selective-receiving node displayed, select Dual-Fed Point and SelectiveReceiving Point. Click OK.

Step 12 Click the SNCP Attribute tab and set SNCP attribute. Step 13 Optional: If the trail passes through the ASON, you can check the Select ASON Server Trail First check box. Click the ASON Attributes Settings tab and set the corresponding protection attributes. Step 14 Optional: Click the General Attributes tab and set the general attributes of the trail, such as the Name and Order No.. Step 15 Optional: If you do not want to activate the created trail when the configuration is issued to NEs, you can uncheck the Activate the trail check box.
NOTE

l If you activate a trail, the service configuration data of the trail is sent to the NE. l If you do not activate a trail, the service configuration data of the trail is stored at the NE layer on the U2000.

Step 16 Optional: Check the Alarm Reversion check box to set the alarm reversion on the trail to be created.
2-40 Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. Issue 02 (2010-09-24)

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

2 End-to-End RTN Management

Step 17 Optional: If you want to create multiple trails with the same route, check the Copy after Creation check box. After the creation of the trail, a dialog box is displayed and you can copy the trail. Step 18 Click Apply. Step 19 Optional: If the creation is successful, click Browse Trail in the displayed dialog box. Then, you can view the trail on the interface. ----End

2.1.6.4 Verifying the SNCP Trail Protection Switching


To detect faults on NEs or on fibers through which an SNCP trail passes, the maintenance engineers can check the switching status of the trail. The engineers can then locate the point where the fault is generated according to the switching status of each NE in the protection subnet.

Prerequisite
l l You must be an NM user with "network operator" authority or higher. The SNCP trail must be created.

Context

CAUTION
Performing the SNCP switching may cause short interruption of the services.

Procedure
Step 1 Select Service > SDH Trail > Manage SDH Trail from the Main Menu. Step 2 In the Set Trail Browse Filter Criteria dialog box, set the filter conditions, and then click Filter All. The trails are displayed in the list.
NOTE

l Click Filter All to refresh and display all the qualified trails. l Click Secondary Filter to filter the trails that are already displayed. l Click Incremental Filter to add the newly qualified trails to the list without refreshing the trails that are already displayed.

Step 3 Select an SNCP trail from the list. Click the Maintenance > SNC Service Control. Step 4 In the SNC Service Controldialog box, select the source or sink of the SNC. Click Function. Then select a proper switching mode to switch the SNC service. Step 5 Click Query. Check whether Active Channel shows that the SNC service is switched to the expected trail. If not, the explicit NE or fiber of the trail is faulty. Step 6 If you want to clear the switching, select the NE verified in Step 4. Click Function, and then select Clear. ----End
Issue 02 (2010-09-24) Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. 2-41

2 End-to-End RTN Management

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

2.1.7 Creating a Platinum Service Group


In a platinum service group, the SDH trails do not pass through the same NE, fiber, or fiber/ cable pipe, so that the risk that multiple trails are interrupted is lowered.

Prerequisite
l l l l You must be an NM user with "network operator" authority or higher. The U2000 license that is used must support platinum services. The platinum service supports the SDH trail only, instead of the WDM trail, Ethernet trail, and radio trail. For the prerequisites of creating a lower order SDH trail, see 2.1.6.2 Creating a Non-SNCP VC12 or VC3 Trail. For the prerequisites of creating a higher order SDH trail, see 2.1.5.1 Creating a Non-SNCP VC4 Trail. The levels of the trails in a platinum service group must be consistent. The preconfigured trail cannot be added into a platinum service group. The platinum service cannot be manually created.

l l l

Context
The procedures of creating a platinum trail are almost the same as the procedures of creating a non-platinum service, that is, normal service. The only difference is that you need to select a reference trail for a platinum service. If a reference trail is selected, a platinum service group is created at the same time. Otherwise, a non-platinum service (normal service) is created. During the creation of a platinum service, if a reference trail is selected, the U2000 automatically filters out the NE, fiber, and fiber/cable pipe that the reference trail passes through to calculate a new route. If this reference trail already belongs to a certain platinum service group, the U2000 also considers other trails in the platinum service group as reference trails to calculate a new route. If the U2000 cannot calculate a route after filtering out the NE, fiber, and fiber/cable pipe that the reference trail passes through, the U2000 reduces the restrictions. Then, the U2000 calculates a relatively appropriate route that passes through the preceding NE, fiber, or fiber/cable pipe to continue the creation. Therefore, a downgraded platinum service group is created.

Procedure
Step 1 Create the trail in the platinum service group according to the procedures of creating a nonplatinum service. To Create Higher order trail Lower order trail See 2.1.5.1 Creating a Non-SNCP VC4 Trail 2.1.6.2 Creating a Non-SNCP VC12 or VC3 Trail

Step 2 In the Router Constraint area, click the Platinum Service Group tab. Step 3 Click Add. In the Set Trail Browse Filter Criteria dialog box displayed, set the filter criteria and then click Filter. The trails that meet the criteria are displayed in the list. Step 4 Select a trail as the reference trail and then click OK.
2-42 Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. Issue 02 (2010-09-24)

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management
NOTE

2 End-to-End RTN Management

If the new trail and the reference trail cannot fully comply with the requirements of the platinum service, in the Operation Result dialog box, click Close. Then, in the Calculate Platinum Service Trail dialog box displayed, determine whether to create the downgraded platinum service group. To create the downgraded platinum service group, click Yes. Otherwise, click No.

Step 5 Finish other settings and then click Apply. In the Operation Result dialog box displayed, click Close. ----End

2.1.8 Bound Platinum Service Group


You can bind a trail or trails when you need to add an existing trail to a platinum service group or bind existing trails as a platinum service group.

Prerequisite
l l l You must be an NM user with "network operator" authority or higher. The U2000 license that is used must support platinum services. The levels of the trails to be bound must be the same.

Context
The platinum service group can be bound in the following two scenarios: l l Add a trail or more to an existing platinum service group. Bind a trail or more as a new platinum service group.

In the preceding two scenarios, the levels of the trails must be the same. That is, in the first scenario, the level of the trail to be added must be the same as the platinum service group. In the second scenario, the levels of all trails must be the same. After the binding, the U2000 automatically checks whether the trails in the platinum service group meet the requirements.

Procedure
Step 1 Choose Service > SDH Trail > Manage SDH Trail from the Main Menu. Step 2 In the Set Trail Browse Filter Criteria dialog box displayed, set the filter criteria and click Filter All. The trails are displayed in the list.
NOTE

l Click Filter All to refresh and display all the qualified trails. l Click Secondary Filter to filter the trails that are already displayed. l Click Incremental Filter to add the newly qualified trails to the list without refreshing the trails that are already displayed.

Step 3 Select all the trails that you want to bind, right-click, and then choose Bind Platinum Service Group from the shortcut menu. Step 4 In the Operation Result dialog box, click Close.
Issue 02 (2010-09-24) Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. 2-43

2 End-to-End RTN Management

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

Step 5 Optional: In Platinum Service Group Status, you can check whether the status of the platinum service group is normal. ----End

2.1.9 Creating an SDH Trail Manually


The U2000 has restrictions on trail route computation and does not support complicated network very well. If you fail to create trails using the route computation function, you can use the function of manually creating trails to create them.

Prerequisite
l l l l You must be an NM user with "network operator" authority or higher. The license for the trail management function must be provided. The optical fiber at the server layer must be created. The VC4 server trail must be created before creating a VC12 or VC3 trail.

Context
You can use the function of manually creating an SDH trail to create the following trails: l l l A multi-source multi-home trail A trail that passes a DNI protection subnet A mono nodal trail whose source and sink terminate on the same NE

During manual creation of a bidirectional SDH trail, if you do not specify the reverse route, the U2000 automatically generates a reverse route. The generated reverse route and the positive route use a consistent route even if the protection subnet passed through is unidirectional. Therefore, make sure you specify the reverse route when manually creating a bidirectional trail that passes through a unidirectional PP ring.

Procedure
Step 1 Choose Service > SDH Trail > Create SDH Trail Manually from the Main Menu. Step 2 Select the Direction, Level and Service Domain for the service.
NOTE

If you want to create a broadcast trail, set the value of Direction to Unidirectional.

Step 3 Select the source and sink NEs for the trail that you want to create.
NOTE

In the Trail View, right-click an NE and choose Select Source or Select Sink from the shortcut menu to specify this NE as the source or sink NE. Alternatively, click Browse to designate the source and sink NEs for the trail.

Step 4 Optional: Select route computation policy.

2-44

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

Issue 02 (2010-09-24)

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management
NOTE

2 End-to-End RTN Management

l In the Calculate Route pane, select Normal reverse route or Reverse route between cross-ring nodes. The U2000 automatically creates the negative route according to the positive route manually created by the user. l In the Calculate Route pane, click Calculate Route. The U2000 automatically computes the route between the source and sink nodes.

Step 5 Specify the route.


NOTE

l When you create bidirectional trails, you need to specify the negative route. When you create a protected trail, you need to specify the protection route. l Click a route in the Trail View. The available trails on this route are displayed in the lower-right Set Route Timeslot pane. Set the Direction, Timeslot and Route Type parameters for the trail. Click Add and the trail is displayed in Route Information. If you need to delete trails from Route Information, click Delete.

Step 6 Repeat preceding step to specify the route segment by segment. Step 7 Click the General Attributes tab and set the general attributes of the trail, such as the Customer, Remarks, Name and Order No.. Step 8 Optional: If you do not want to activate the created trail when the configuration is issued to NEs, you can uncheck the Activated check box.
NOTE

l If you activate a trail, the service configuration data of the trail is sent to the NE. l If you do not activate a trail, the service configuration data of the trail is stored at the NE layer on the U2000.

Step 9 Optional: Check the Alarm Reversion check box to set the alarm reversion on the trail to be created.
NOTE

You cannot set this parameter when creating a VC4 server trail or link server trail.

Step 10 Click Apply. In the Operation Result dialog box displayed, click Close. ----End

2.1.10 Creating PDH Radio Trails


When you create a PDH radio trail in the end-to-end mode, services configured on each NE are displayed in the U2000 in the end-to-end mode. This provides a visual display of the route of each service, so that you can view and manage routes and used resources in an easy way. 2.1.10.1 Creating a Link Server Trail A link server trail is used to carry the PDH radio trails between NEs. You need to create a link server trail between NEs before you configure the PDH radio trails between the NEs. 2.1.10.2 Creating a PDH Radio Trail When you want to create a PDH radio service, you can quickly configure the service by creating an end-to-end PDH radio trail.

2.1.10.1 Creating a Link Server Trail


A link server trail is used to carry the PDH radio trails between NEs. You need to create a link server trail between NEs before you configure the PDH radio trails between the NEs.
Issue 02 (2010-09-24) Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. 2-45

2 End-to-End RTN Management

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

Prerequisite
l l l You must be an NM user with "network operator" authority or higher. You must have a license that supports radio end-to-end management to create a link server trail. Make sure that there are sufficient available resources.

Context
l A link server trail is used to carry only the services between the source and sink NEs, and cannot be used by any intermediate NEs between the source and sink NEs. Hence, in actual applications, for easier bandwidth utilization, you can create a link server trail between every two adjacent NEs in the network, instead of a link server trail that crosses multiple NEs. Currently, a link server trail between every two adjacent NEs is supported, and a link server trail that crosses multiple NEs is not supported. Before you delete a link server trail, you need to delete the lower level trails over the trail. A link server trail is used to carry the PDH radio trails between NEs. Hence, you need to create a link server trail before you create a higher order service.

l l

Procedure
Step 1 Choose Service > SDH Trail > Create SDH Trail from the Main Menu. Step 2 Set the service direction to Bidirectional and set the service level to Link Server Trail. Step 3 Set Resource Usage Strategy and Protection Priority Strategy.
NOTE

When setting parameters, note the following points: l The resource usage strategy means which protection subnet resources or timeslots that you can use during the process for creating a trail. The values are Protected Resource, Extra Resource, and All Resource. l The protection priority strategy means which types of protection subnets to which you give priority during the process for creating a trail. The values are Trail Protection First, SNCP First, and NP First.

Step 4 Double-click the source NE and then the sink NE. The system automatically selects a trail and displays it between the source NE and the sink NE. Step 5 Optional: Specify the explicit link of the service. l l Click a server trail between NEs to specify the explicit link for the service. To cancel your selection, click the route again or click Cancel Route Restriction. Click the Explicit Link tab. Right-click in the blank area and choose Add from the shortcut menu. In the Add Explicit Link window, you can search for the existing server trail and set it as the explicit link for the trail to be created.

Step 6 Optional: Specify the explicit node. l Click the Explicit Node tab. Double-click the NE in the subnet to specify the explicit NE that the route passes through. The NE is displayed as (double-click it again to cancel the selection).
Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. Issue 02 (2010-09-24)

2-46

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

2 End-to-End RTN Management

Click the Explicit Node tab. Right-click in the blank area and choose Add from the shortcut menu. In the Add Explicit Node window, you can search for the node and set it as the explicit node of the trail to be created. Click the Excluded Node tab. Double-click the other NE in the subnet to specify the excluded NE that the route should not pass through. The NE is displayed as (doubleclick it again to cancel the selection). Click the Excluded Node tab. Right-click the blank area and choose Add from the shortcut menu. In the Adding Excluded Node window, you can search for the node and set it as the excluded node of the trail to be created.

Step 7 Optional: Specify the excluded node. l

Step 8 Optional: Click the General Attributes tab and set the general attributes of the trail, such as Name and Order No. Step 9 Optional: If you do not want to apply the settings of the created trail to NEs, clear the Activate the trail check box.
NOTE

l In the case of an active trail, the service configuration data is applied to NEs. l In the case of an inactive trail, the service configuration data is saved in the U2000.

Step 10 Optional: If you want to create multiple trails that have the same route, select the Copy after Creation check box. After you create the trail, a dialog box is displayed and you can duplicate the trail. Step 11 Click Apply. In the Operation Result dialog box displayed, click Close. ----End

2.1.10.2 Creating a PDH Radio Trail


When you want to create a PDH radio service, you can quickly configure the service by creating an end-to-end PDH radio trail.

Prerequisite
l l You must be an NM user with "network operator" authority or higher. A link server trail must be created between the source and sink NEs of the service, and the link server trail has idle timeslots.

Procedure
Step 1 Choose Service > SDH Trail > Create SDH Trail from the Main Menu. Step 2 Set the Direction and Level of the service. Step 3 Set Resource Usage Strategy to Protected Resource, and set Protection Priority Strategy to SNCP First.

Issue 02 (2010-09-24)

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

2-47

2 End-to-End RTN Management


NOTE

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

When setting parameters, note the following points: l The resource usage strategy means which protection subnet resources or timeslots that you can use during the process for creating a trail. The values are Protected Resource, Extra Resource, and All Resource. l The protection priority strategy means which types of protection subnets to which you give priority during the process for creating a trail. The values are Trail Protection First, SNCP First, and NP First.

Step 4 Double-click the source NE and the sink NE in sequence. In the Select Board Port dialog box, select a port and then click OK. The system automatically selects a trail and displays it between the source NE and the sink NE. Step 5 Optional: Specify the explicit link of the service. l l Click a server trail between NEs to specify the explicit link for the service. To cancel your selection, click the route again or click Cancel Route Restriction. Click the Explicit Link tab. Right-click in the blank area and choose Add from the shortcut menu. In the Adding Explicit Link window, you can search for the existing server trail and set it as the explicit link of the trail to be created.

Step 6 Optional: Specify the explicit node. l Click the Explicit Node tab. Double-click the NE in the subnet to specify the explicit NE that the route passes through. The NE is displayed as (double-click it again to cancel the selection). Click the Explicit Node tab. Right-click in the blank area and choose Add from the shortcut menu. In the Adding Explicit Node window, you can search for a node and set it as the explicit node of the trail to be created.

Step 7 Optional: Specify the excluded node. l Click the Excluded Node tab. Double-click an NE in the subnet to specify the excluded NE that the route should not pass through. The NE is displayed as (double-click it again to cancel the selection). Click the Excluded Node tab. Right-click in the blank area and choose Add from the shortcut menu. In the Adding Excluded Node window, you can search for a node and set it as the explicit node of the trail to be created.

Step 8 Click the SNCP Setting tab. l Right-click the NE that dual-feeds services and choose Set Dual-Fed Point from the shortcut menu. A flag of the NE is displayed. Right-click the NE that selects a service flag of the NE is and choose Set Selective-Receiving Point from the shortcut menu. A displayed. l

Right-click the blank area in the tab and choose Add from the shortcut menu. In the Add the dual-fed and selective-receiving node window, select Dual-Fed Point and SelectiveReceiving Point. Click OK.

Step 9 Click the General Attributes tab. Set the general attributes of the trail, such as Name and Order No.. Step 10 Optional: If you do not want to activate the created trail when you apply the configuration to NEs, clear the Activate the trail check box.

2-48

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

Issue 02 (2010-09-24)

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management
NOTE

2 End-to-End RTN Management

l In the case of an active trail, the service configuration data is applied to NEs. l In the case of an inactive trail, the service configuration data is saved in the U2000.

Step 11 Optional: Check the Alarm Reversion check box to set the alarm reversion on the trail to be created. Step 12 Optional: If you want to create multiple trails that have the same route, select the Copy after Creation check box. After you create the trail, a dialog box is displayed and you can duplicate the trail. Step 13 Click Apply. In the Operation Result dialog box displayed, click Close. ----End

2.1.11 Creating SDH Radio Trails


When you create an SDH radio trail in the end-to-end mode, services configured on each NE are displayed in the U2000 in the end-to-end mode. Such display facilitates the check and management over the routes of each service and resources used for each service. 2.1.11.1 Creating a VC4 Server Trail A VC4 server trail is intended to bear inter-NE SDH radio trails. Create a VC4 server trail before you creating lower order SDH radio trails between NEs. 2.1.11.2 Creating an SDH Radio Trail The end-to-end creation of an SDH radio link helps to quickly provide an SDH radio service.

2.1.11.1 Creating a VC4 Server Trail


A VC4 server trail is intended to bear inter-NE SDH radio trails. Create a VC4 server trail before you creating lower order SDH radio trails between NEs.

Prerequisite
l l l You must be an NM user with "network operator" authority or higher. A license enabling the trail function must be available for creating a VC4 server trail. Sufficient resources must be available.

Context
l A VC4 server trail is intended to bear only the services on the source NE and sink NE, instead of the services on any intermediate NE. Practically, for convenience in using bandwidth, a VC4 server trail is always created between two adjacent NEs instead of multiple NEs. Delete the lower level service trails before you delete the underlying VC4 server trail. A VC4 server trial is intended to bear lower order SDH radio trails between NEs. Hence, no VC4 server trail is necessary in the course of creating higher order services.

Procedure
Step 1 Choose Service > SDH Trail > Create SDH Trail from the Main Menu.
Issue 02 (2010-09-24) Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. 2-49

2 End-to-End RTN Management

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

Step 2 Set the service direction to Bidirectional and set the service level to VC4 Server Trail. Step 3 Set Service Domain, Resource Usage Strategy and Protection Priority Strategy.
NOTE

Note the following when setting these parameters: l The resource usage policy defines the resources or timeslots of which protection subnets are available for creating the trail. This parameter can be set to Protected Resource, Extra Resource, or All Resource. l The protection priority policy defines which types of protection subnets are selected with priority during the course of trail creating. This parameter can be set to Trail Protection First, SNCP First, or NP First.

Step 4 Double-click the source NE and sink NE in sequence. Then, the system automatically selects a trail and displays it between the source NE and sink NE. Step 5 Optional: Specify explicit links for the service. l To specify an explicit link for the service, you need to click a server trail between NEs. To cancel the setting, you need to re-click the server trail or click Cancel Route Restriction. Click the Explicit Link tab, right-click the blank, and choose Add from the shortcut menu. In the Add Explicit Link window displayed, you can search for the existing server trails and set them as explicit links for the trail to be created. Click the Explicit Node tab. Double-click an NE in the subnet to specify it as an explicit node that the route traverses. Then, the NE is displayed as . To cancel the setting, doubleclick the NE. Click the Explicit Node tab, right-click the blank, and choose Add from the shortcut menu. In the Add Explicit Node window displayed, you can search for the nodes and set them as explicit nodes for the trail to be created. Double-click another NE in the protection subnet to specify it as an excluded NE. Then, the NE is displayed as . To cancel the setting, double-click the NE. Click the Excluded Node tab, right-click the blank, and choose Add from the shortcut menu. In the Add Excluded Node window displayed, you can search for the nodes and set them as excluded nodes for the trail to be created.

Step 6 Optional: Specify explicit nodes. l

Step 7 Optional: Specify excluded nodes. l l

Step 8 Optional: Click the General Attributes tab and set the general attributes of the trail, such as Name and Order No.. Step 9 Optional: If it is unnecessary to activate the created trail, deselect the Activate the trail check box.
NOTE

l If you activate the trail, the service configuration data is delivered to NEs. l If you leave the trail unactivated, the service configuration data is stored only on the U2000.

Step 10 Optional: To create multiple route-shared trails, select the Copy after Creation check box. When creation of the trail is complete, a dialog box is displayed indicating trail copying. Step 11 Click Apply. In the Operation Result dialog box displayed, click Close. ----End
2-50 Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. Issue 02 (2010-09-24)

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

2 End-to-End RTN Management

2.1.11.2 Creating an SDH Radio Trail


The end-to-end creation of an SDH radio link helps to quickly provide an SDH radio service.

Prerequisite
l l You must be an NM user with "network operator" authority or higher. In the case of a lower order SDH microwave trail, a VC4 server trail must be created between the source and sink NEs of the service. In addition, idle timeslots must be available on the VC4 server trail.

Procedure
Step 1 Choose Service > SDH Trail > Create SDH Trail from the Main Menu. Step 2 Specify the direction and level of the service. Step 3 Set the Service Domain. Step 4 Set the resource usage policy to Protected Resource and protection priority policy to SNCP First.
NOTE

Note the following when setting these parameters: l The resource usage policy defines the resources or timeslots of which protection subnets are available for creating the trail. This parameter can be set to Protected Resource, Extra Resource, or All Resource. l The protection priority policy defines which types of protection subnets are selected with priority during the course of trail creating. This parameter can be set to Trail Protection First, SNCP First, or NP First.

Step 5 Double-click the source NE and sink NE in sequence. In the Select Board Port dialog box, select a port and click OK. Then, the system automatically selects a trail and displays it between the source NE and the sink NE. Step 6 Optional: Specify explicit links for the service. l To specify an explicit link for the service, you need to click a server trail between NEs. To cancel the setting, you need to re-click the server trail or click Cancel Route Restriction. Click the Explicit Link tab, right-click the blank, and choose Add from the shortcut menu. In the Add Explicit Link window displayed, you can search for the existing server trails and set them as explicit links for the trail to be created.

Step 7 Optional: Specify explicit nodes. l Click the Explicit Node tab. Double-click an NE in the subnet to specify it as an explicit node that the route traverses. Then, the NE is displayed as . To cancel the setting, doubleclick the NE. Click the Explicit Node tab, right-click the blank, and choose Add from the shortcut menu. In the Add Explicit Node window displayed, you can search for the nodes and set them as explicit nodes for the trail to be created.

Step 8 Optional: Specify excluded nodes.

Issue 02 (2010-09-24)

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

2-51

2 End-to-End RTN Management

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

Click the Excluded Node tab. Double-click an NE in the subnet to specify it as an excluded node from all routes. Then, the NE is displayed as . To cancel the setting, double-click the NE. Click the Excluded Node tab, right-click the blank, and choose Add from the shortcut menu. In the Add Excluded Node window displayed, you can search for the nodes and set them as excluded nodes for the trail to be created. Right-click the NE where the service is dually fed, choose Set Dual-Fed Point from the shortcut menu. The NE is displayed as . Right-click the NE where the service is selectively received, choose Set Selective-Receiving Point from the shortcut menu. The NE is displayed as .

Step 9 Then, click the SNCP setting tab. l

Right-click the blank in the tab and choose Add from the shortcut menu. In the Add the dual-fed and selective-receiving node dialog box displayed, specify Dual-Fed Point and Selective-Receiving Point. Click OK.

Step 10 Click the General Attributes tab and set the general attributes of the trail, such as Name and Order No.. Step 11 Optional: If it is unnecessary to activate the created trail, deselect the Activate the trail check box.
NOTE

l If you activate the trail, the service configuration data is delivered to NEs. l If you leave the trail unactivated, the service configuration data is stored only on the U2000.

Step 12 Optional: Select the Alarm Reversion check box to set the alarm reversion on the created trail. Step 13 Optional: To create multiple route-shared trails, select the Copy after Creation check box. When creation of the trail is complete, a dialog box is displayed indicating trail copying. Step 14 Click Apply. In the Operation Result dialog box displayed, click Close. ----End

2.1.12 Copying SDH Trails


To expand a network, you can quickly create SDH trails by duplicating a created SDH trail.

Prerequisite
l l You must be an NM user with "network operator" authority or higher. The SDH trail must be created.

Context
In tangent ring and dual node interconnection (DNI) scenarios, SDH trails across the DNI protection can be copied.

Procedure
Step 1 Choose Service > SDH Trail > Manage SDH Trail from the Main Menu. Step 2 In the Set Trail Browse Filter Criteria dialog box, set the filter criteria and click Filter All. The trails are displayed in the list.
2-52 Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. Issue 02 (2010-09-24)

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management
NOTE

2 End-to-End RTN Management

l Click Filter All to refresh and display all the qualified trails. l Click Secondary Filter to filter the trails that are already displayed. l Click Incremental Filter to add newly qualified trails to the list without refreshing the trails that are already displayed.

Step 3 Right-click a trail and choose Copy. Step 4 In the Copy dialog box displayed, select the source and sink boards for the duplicate trail.

Step 5 In the Available Timeslots/Port area, select the source and sink timeslots for the duplicate trail. Click Add. In the Selected Timeslots/Port area, the selected timeslots and ports are displayed. Step 6 Optional: If you need to set the start timeslot of the trail, in the Copy setting pane, check Specify the start timeslot check box and select the corresponding start timeslot. Step 7 Optional: Select the start value of the trail name suffix. Step 8 Click OK. In the Operation Result dialog box displayed, click Close. ----End
Issue 02 (2010-09-24) Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. 2-53

2 End-to-End RTN Management

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

2.1.13 Modifying an SDH Trail


You can use the U2000 to modify a created SDH trail. 2.1.13.1 Modifying the Port/Timeslot/Route of an SDH Trail By using the U2000, you can modify the source or sink port, used timeslot, and route that a specified SDH trail passes through. When settings are applied to the NE, the system automatically deletes the original trail. 2.1.13.2 Modifying the SNC Service Control of SDH Trails You can modify the control attributes that were previously set when you create an SNCP service. 2.1.13.3 Modifying Trail Names in Batches The network administrator can set the trail naming rules and modify trail names in batches according to these rules. 2.1.13.4 Modifying the Trails in a Platinum Service Group You can modify the trails that do not fully comply with the requirements of the platinum service in the downgraded platinum service group. Therefore, the fully-compliant platinum service group is created.

2.1.13.1 Modifying the Port/Timeslot/Route of an SDH Trail


By using the U2000, you can modify the source or sink port, used timeslot, and route that a specified SDH trail passes through. When settings are applied to the NE, the system automatically deletes the original trail.

Prerequisite
l l l You must be an NM user with "network operator" authority or higher. The trail cannot be locked. The source and sink of the VC4 server trail and the information of the route that is near the source and sink cannot be modified.

Context
l l Change the route: Change the route of the trail based on unchanged source and sink NEs. For example, the NE that the trail passes through. Change the port or timeslot of a board on the source or sink NE: Change the port or timeslot of a board on the source or sink NE, based on unchanged route. For example, the line timeslot or tributary port that is used by the trail. The U2000 supports modifying the board, port and timeslot on the source and the sink NEs, and the route that the trail passes through at the same time.

CAUTION
This operation may interrupt services. Exercise caution when you perform this operation.

2-54

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

Issue 02 (2010-09-24)

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

2 End-to-End RTN Management

Procedure
Step 1 Choose Service > SDH Trail > Manage SDH Trail from the Main Menu. Step 2 In the Set Trail Browse Filter Criteria dialog box, set the filter criteria and click Filter All. The trails are displayed in the list.
NOTE

l Click Filter All to refresh and display all the qualified trails. l Click Secondary Filter to filter the trails that are already displayed. l Click Incremental Filter to add newly qualified trails to the list without refreshing the trails that are already displayed.

Step 3 Select a trail. Click Create/Modify and choose Modify Trail. Step 4 To modify the boards, ports or timeslots on the source and sink NEs, click Browse. In the window displayed, select new boards, ports or timeslots. Step 5 To modify the route that a trail passes through, in the Route constraint area, delete the original explicit links, explicit nodes and excluded nodes, and specify new explicit links, explicit nodes and excluded nodes. Step 6 To modify the timeslot on the route that a trail passes through, click Set Route Timeslot. In the Set Route Timeslot window displayed, select new Server Layer Trail Name, Server Layer Trail and Timeslot as required.
NOTE

If multiple trails are selected, right-click them and choose Uniform Timeslot. U2000 consider the timeslot value of the trail in the first row as the datum value and modify the timeslot values of other trails to be consistent with the datum value. In this way, all trails use the same timeslot.

Step 7 Click OK. In the Confirm dialog box, click Yes. A prompt is displayed, indicating that the operation is successful. Click Close. ----End

2.1.13.2 Modifying the SNC Service Control of SDH Trails


You can modify the control attributes that were previously set when you create an SNCP service.

Prerequisite
l l l You must be an NM user with "network operator" authority or higher. The trail cannot be locked. The SNCP service must be existed.

Context

CAUTION
This operation may interrupt services. Exercise caution when you perform this operation.

Issue 02 (2010-09-24)

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

2-55

2 End-to-End RTN Management

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

Procedure
Step 1 Choose Service > SDH Trail > Manage SDH Trail from the Main Menu. Step 2 In the Set Trail Browse Filter Criteria dialog box, set the filter criteria and click Filter All. The trails are displayed in the list.
NOTE

l Click Filter All to refresh and display all the qualified trails. l Click Secondary Filter to filter the trails that are already displayed. l Click Incremental Filter to add newly qualified trails to the list without refreshing the trails that are already displayed.

Step 3 Select an SNCP trail from the list, click Maintenance and choose SNC Service Control. Step 4 In the SNC Service Control dialog box, double-click and modify Revertive Mode, WTR Time and Hold-Off Time of the service.
NOTE

When Revertive Mode of the service is set to Revertive, you can modify WTR Time.

Step 5 Click Apply. In the Operation Result dialog box displayed, click Close. ----End

2.1.13.3 Modifying Trail Names in Batches


The network administrator can set the trail naming rules and modify trail names in batches according to these rules.

Prerequisite
l l You must be an NM user with "network operator" authority or higher. The trail naming rules must be set on the U2000.

Procedure
Step 1 Choose Service > SDH Trail > Manage SDH Trail from the Main Menu. Step 2 In the Set Trail Browse Filter Criteria dialog box, set the filter criteria and click Filter All. The trails are displayed in the list.
NOTE

l Click Filter All to refresh and display all the qualified trails. l Click Secondary Filter to filter the trails that are already displayed. l Click Incremental Filter to add newly qualified trails to the list without refreshing the trails that are already displayed.

Step 3 Right-click one or more trails from the list, and choose Name from the shortcut menu. For the naming rules, refer to Customizing Naming Rule. Step 4 In the Confirm dialog box displayed, click OK. ----End
2-56 Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. Issue 02 (2010-09-24)

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

2 End-to-End RTN Management

2.1.13.4 Modifying the Trails in a Platinum Service Group


You can modify the trails that do not fully comply with the requirements of the platinum service in the downgraded platinum service group. Therefore, the fully-compliant platinum service group is created.

Prerequisite
For details, see 2.1.13.1 Modifying the Port/Timeslot/Route of an SDH Trail.

Context
The procedures of modifying a trail in a platinum service group are almost the same as the procedures of modifying a non-platinum service, that is normal service. The differences are described as follows: l When a trail in the platinum service group is modified, the U2000 automatically considers other trails in the platinum service group as reference trails. Therefore, when calculating the route, the U2000 automatically filters out the available resources of the fibers in the fiber/cable pipe that the reference trails pass through. When the trail in the platinum service group is modified, the U2000 checks whether the trails in the platinum service group meet the requirements of the platinum service.

Procedure
Step 1 Modify the trail in the platinum service group according to the procedures of modifying the nonplatinum service. For details, see 2.1.13.1 Modifying the Port/Timeslot/Route of an SDH Trail. ----End

2.1.14 Removing a Trail from a Platinum Service Group


When the platinum service protection is no longer required but the trail of the platinum service protection needs to be retained, you can remove the trail from the platinum service group.

Prerequisite
l l l You must be an NM user with "network operator" authority or higher. The U2000 license that is used must support platinum services. The platinum service group must be created.

Context
If a trail is deleted or removed from the platinum service group, the U2000 automatically checks whether the trails in the platinum service group meet the requirements of the platinum service.

Procedure
Step 1 Choose Service > SDH Trail > Manage SDH Trail from the Main Menu. Step 2 In the Set Trail Browse Filter Criteria dialog box displayed, set the filter criteria and click Filter All. The trails are displayed in the list.
Issue 02 (2010-09-24) Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. 2-57

2 End-to-End RTN Management


NOTE

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

l Click Filter All to refresh and display all the qualified trails. l Click Secondary Filter to filter the trails that are already displayed. l Click Incremental Filter to add the newly qualified trails to the list without refreshing the trails that are already displayed.

Step 3 Right-click the trail that you want to remove from the platinum service group and then choose Move Out of Platinum Service Group from the shortcut menu. Step 4 In the Operation Result dialog box, click Close. ----End

2.1.15 Configuring Overhead Bytes of an SDH Trail


If you want to maintain or monitor the SDH trails, you can set the trail overhead bytes. 2.1.15.1 Setting the Trace Byte The trace byte is used by the receive end to confirm the continuous connection status with the transmit end. The trace byte of the equipment that belongs to the same vendor can be set to any same characters. Between equipment of different vendors, the trace byte must be set to the same characters that are previously agreed, so that the interconnection can be successful. 2.1.15.2 Setting the C2 Byte The C2 byte indicates the multiframe structure of VC frames and the type of bearer services (for example, PDH services or ATM services). 2.1.15.3 Setting the V5 Byte The V5 byte is an overhead byte at the lower order channel. During the interaction of VC12 services or interaction with a non-SDH service, you can set the V5 byte on a trail according to the interacted service. 2.1.15.4 Setting the Overhead Termination Overhead termination means that the SDH equipment processes and terminates the received overhead signals, and sends the recreated (or default) overhead signals to another optical board at the opposite end. 2.1.15.5 Setting Service Load Signals If a VC12 or VC3 trail is not loaded with services, you can set the loading status of the trail to unloaded. U2000 does not monitor the alarms that are generated on the trail whose loading status is set to unloaded.

2.1.15.1 Setting the Trace Byte


The trace byte is used by the receive end to confirm the continuous connection status with the transmit end. The trace byte of the equipment that belongs to the same vendor can be set to any same characters. Between equipment of different vendors, the trace byte must be set to the same characters that are previously agreed, so that the interconnection can be successful.

Prerequisite
l l
2-58

You must be an NM user with "network maintainer" authority or higher. Trails must be created and activated.
Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. Issue 02 (2010-09-24)

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

2 End-to-End RTN Management

Context
There are two modes for handling overhead bytes, which are the standard mode and the extended mode. In the extended mode, you can set bytes to be transmitted for pass-through services. In the standard mode, bytes to be transmitted cannot be set for pass-through services.

CAUTION
Correctly configure the trace byte. This operation may affect services.

Procedure
Step 1 Choose Service > SDH Trail > Manage SDH Trail from the Main Menu. Step 2 In the Set Trail Browse Filter Criteria dialog box displayed, set the filter criteria and click Filter All. The trails are displayed in the list.
NOTE

l Click Filter All to refresh and display all the qualified trails. l Click Secondary Filter to filter the trails that are already displayed. l Click Incremental Filter to add the newly qualified trails to the list without refreshing the trails that are already displayed.

Step 3 Select a trail, click Maintenance and select Trace Byte. Step 4 In the Set Overhead dialog box, double-click Byte to be sent or Byte to be received.

Step 5 In the Please input the overhead byte dialog box displayed, enter the contents of the overhead bytes and click OK. Step 6 In the Prompt dialog box displayed, click Yes. Step 7 In Set Overhead dialog box, click Apply.
Issue 02 (2010-09-24) Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. 2-59

2 End-to-End RTN Management


NOTE

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

You can click Switch Mode to select an overhead processing mode.

Step 8 Click Yes to confirm the operation. In the Operation Result dialog box displayed, click Close. ----End

2.1.15.2 Setting the C2 Byte


The C2 byte indicates the multiframe structure of VC frames and the type of bearer services (for example, PDH services or ATM services).

Prerequisite
l l You must be an NM user with "network maintainer" authority or higher. Trails must be created and activated.

Context
There are two modes for handling overhead bytes, which are the standard mode and the extended mode. In the extended mode, you can set bytes to be transmitted for pass-through services. In the standard mode, bytes to be transmitted cannot be set for pass-through services.

CAUTION
Correctly configure the C2 byte. This operation may affect services.

Procedure
Step 1 Choose Service > SDH Trail > Manage SDH Trail from the Main Menu. Step 2 In the Set Trail Browse Filter Criteria dialog box displayed, set the filter criteria and click Filter All. The trails are displayed in the list.
NOTE

l Click Filter All to refresh and display all the qualified trails. l Click Secondary Filter to filter the trails that are already displayed. l Click Incremental Filter to add the newly qualified trails to the list without refreshing the trails that are already displayed.

Step 3 Select the trail that you want to set the C2 byte, click Maintenance and select C2 Byte from the drop-down list. Step 4 In the Set Overhead dialog box, double-click and set Byte to be Sent or Byte to be Received. Click Apply.

2-60

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

Issue 02 (2010-09-24)

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

2 End-to-End RTN Management

NOTE

You can click Switch Mode to select an overhead processing mode.

Step 5 Click Yes to confirm the operation. In the Operation Result dialog box displayed, click Close. ----End

2.1.15.3 Setting the V5 Byte


The V5 byte is an overhead byte at the lower order channel. During the interaction of VC12 services or interaction with a non-SDH service, you can set the V5 byte on a trail according to the interacted service.

Prerequisite
l l You must be an NM user with "network maintainer" authority or higher. Applies for VC12 trails only.

Context
There are two modes for handling overhead bytes, which are the standard mode and the extended mode. In the extended mode, you can set bytes to be transmitted for pass-through services. In the standard mode, bytes to be transmitted cannot be set for pass-through services.

CAUTION
Correctly configure the V5 byte. This operation may affect services.

Procedure
Step 1 Choose Service > SDH Trail > Manage SDH Trail from the Main Menu. Step 2 In the Set Trail Browse Filter Criteria dialog box displayed, set the filter criteria and click Filter All. The trails are displayed in the list.
Issue 02 (2010-09-24) Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. 2-61

2 End-to-End RTN Management


NOTE

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

l Click Filter All to refresh and display all the qualified trails. l Click Secondary Filter to filter the trails that are already displayed. l Click Incremental Filter to add the newly qualified trails to the list without refreshing the trails that are already displayed.

Step 3 Select a VC12 trail that you want to set the V5 byte, click Maintenance and select V5 Byte from the drop-down list. Step 4 In the Set Overhead dialog box, double-click and set Byte to be Sent or Byte to be Received. Click Apply.

NOTE

You can click Switch Mode to select an overhead processing mode.

Step 5 Click Yes to confirm the operation. In the Operation Result dialog box displayed, click Close. ----End

2.1.15.4 Setting the Overhead Termination


Overhead termination means that the SDH equipment processes and terminates the received overhead signals, and sends the recreated (or default) overhead signals to another optical board at the opposite end.

Prerequisite
l l You must be an NM user with "network operator" authority or higher. Trails must be created and activated.

Context

CAUTION
Correctly set overhead termination. This operation may affect services.

2-62

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

Issue 02 (2010-09-24)

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

2 End-to-End RTN Management

Procedure
Step 1 Choose Service > SDH Trail > Manage SDH Trail from the Main Menu. Step 2 In the Set Trail Browse Filter Criteria dialog box displayed, set the filter criteria and click Filter All. The trails are displayed in the list.
NOTE

l Click Filter All to refresh and display all the qualified trails. l Click Secondary Filter to filter the trails that are already displayed. l Click Incremental Filter to add the newly qualified trails to the list without refreshing the trails that are already displayed.

Step 3 Select a trail and click Maintenance and select Overhead Termination. Step 4 In the Set Overhead dialog box displayed, double-click and set Overhead Status. Click Apply.

NOTE

You can click Switch Mode to select an overhead processing mode.

Step 5 Click Yes to confirm the operation. In the Operation Result dialog box displayed, click Close. ----End

2.1.15.5 Setting Service Load Signals


If a VC12 or VC3 trail is not loaded with services, you can set the loading status of the trail to unloaded. U2000 does not monitor the alarms that are generated on the trail whose loading status is set to unloaded.

Prerequisite
l l You must be an NM user with "network operator" authority or higher. In the case of a unidirectional trail, the source must be the tributary board. In the case of a bidirectional trail, one end should be the tributary board at least. The trail whose source and sink are line boards does not support setting the service load.
Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. 2-63

Issue 02 (2010-09-24)

2 End-to-End RTN Management

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

Context

CAUTION
Do not set the loading status of an SDH trail that already has services to unloaded. Otherwise, services are interrupted.

Procedure
Step 1 Choose Service > SDH Trail > Manage SDH Trail from the Main Menu. Step 2 In the Set Trail Browse Filter Criteria dialog box displayed, set the filter criteria and click Filter All. The trails are displayed in the list.
NOTE

l Click Filter All to refresh and display all the qualified trails. l Click Secondary Filter to filter the trails that are already displayed. l Click Incremental Filter to add the newly qualified trails to the list without refreshing the trails that are already displayed.

Step 3 Select a VC12/VC3 trail. Click Maintenance and choose Service Load Signal from the dropdown menu. Step 4 In the Service Load Signal dialog box displayed, double-click and set Loading Status. Step 5 Click Apply. In the Operation Result dialog box displayed, click Close. ----End

2.1.16 Changing Between SNCP and Non-SNCP Trails


In the case of a protection subnet change, you can change non-SNCP trails to SNCP trails and vice versa by following this process. This change may interrupt the service. 2.1.16.1 Changing a Non-SNCP Trail to an SNCP Trail In the case of a protection subnet change, you can change the non-SNCP trail to the SNCP trail. 2.1.16.2 Changing an SNCP Trail to a Non-SNCP Trail In the case of a protection subnet change, you can change an SNCP trail to a non-SNCP trail.

2.1.16.1 Changing a Non-SNCP Trail to an SNCP Trail


In the case of a protection subnet change, you can change the non-SNCP trail to the SNCP trail.

Prerequisite
l l You must be an NM user with "network operator" authority or higher. The normal trail must be created and the two ends of the trail cannot terminate at Ethernet boards.
Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. Issue 02 (2010-09-24)

2-64

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

2 End-to-End RTN Management

Context

CAUTION
This operation may cause short interruption of the services.

Procedure
Step 1 Choose Service > SDH Trail > Manage SDH Trail from the Main Menu. Step 2 In the Set Trail Browse Filter Criteria dialog box displayed, set the filter criteria and click Filter All. The trails are displayed in the list.
NOTE

l Click Filter All to refresh and display all the qualified trails. l Click Secondary Filter to filter the trails that are already displayed. l Click Incremental Filter to add the newly qualified trails to the list without refreshing the trails that are already displayed.

Step 3 Select a trail and click Create/Modify and choose Modify Trail. Step 4 Click the SNCP Setting tab. l Right-click the dual-fed point and choose Set Dual-Fed Point from the shortcut menu, and the node is displayed as . Right-click the selective-receiving point and choose Set Selective-Receiving Point from the shortcut menu, and the node is displayed as .

Right-click the blank area in the tab and choose Add from the shortcut menu. The Add the dual-fed and selective-receiving node is displayed, select Dual-Fed Point and SelectiveReceiving Point. Click OK.

Step 5 Click the SNCP Attribute tab and set SNCP attribute. Step 6 Click OK. In the Confirm dialog box, click Yes. In the Operation Result dialog box, click Close. ----End
Issue 02 (2010-09-24) Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. 2-65

2 End-to-End RTN Management

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

2.1.16.2 Changing an SNCP Trail to a Non-SNCP Trail


In the case of a protection subnet change, you can change an SNCP trail to a non-SNCP trail.

Prerequisite
l l You must be an NM user with "network maintainer" authority or higher. The SNCP trail must be created.

Context

CAUTION
This operation may cause short interruption of the services.

Procedure
Step 1 Choose Service > SDH Trail > Manage SDH Trail from the Main Menu. Step 2 In the Set Trail Browse Filter Conditions dialog box displayed, set the filter criteria and click Filter All. The trails are displayed in the list.
NOTE

l Click Filter All to refresh and display all the qualified trails. l Click Secondary Filter to filter the trails that are already displayed. l Click Incremental Filter to add the newly qualified trails to the list without refreshing the trails that are already displayed.

Step 3 Select an SNCP trail and click Create/Modify and select Modify Trail from the drop-down list. Step 4 Click the SNCP Setting tab. Right-click a record of dual-fed and selective-receiving points, and choose Delete from the shortcut menu.

Step 5 Click OK. In the Confirm dialog box, click Yes. In the Operation Result dialog box, click Close. ----End

2.1.17 Enabling or Disabling VC4 Server Trails


A VC4 server trail is used to carry lower order client trails between NEs. When the timeslot usage of a VC4 server trail reaches the limit, or you want to transfer a service to another server trail, you can disable or enable the VC4 server trail to set whether it continues to carry lower order trails. This function helps telecom operators to maintain network resources.

2-66

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

Issue 02 (2010-09-24)

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

2 End-to-End RTN Management

2.1.17.1 Disabling VC4 Server Trails You can disable a VC4 server trail, so that the trail no longer carries new lower order client services. When the timeslot usage of a VC4 server trail reaches the limit, or you want to transfer a service to another server trail, you can disable the VC4 server trail. In this way, when you create a new client service, the service automatically avoids the disabled VC4 server trail. 2.1.17.2 Enabling VC4 Server Trails A VC4 server trail is used to carry lower order client trails between NEs. When you need a disabled VC4 server trail to serve as a server trail for client trails, you can enable the VC4 server trail.

2.1.17.1 Disabling VC4 Server Trails


You can disable a VC4 server trail, so that the trail no longer carries new lower order client services. When the timeslot usage of a VC4 server trail reaches the limit, or you want to transfer a service to another server trail, you can disable the VC4 server trail. In this way, when you create a new client service, the service automatically avoids the disabled VC4 server trail.

Prerequisite
l l l You must be an NM user with "network operator" authority or higher. Applies to VC4 server trails only. The VC4 server trail must not be disabled.

Context
You can disable an ASON VC4 server trail, but when an ASON trail reroutes, it can be rerouted to a VC4 server trail that is enabled or disabled.

Procedure
Step 1 Choose Service > SDH Trail > Manage SDH Trail from the Main Menu. Step 2 In the Set Trail Browse Filter Criteria dialog box displayed, set the filter criteria and click Filter All. The trails are displayed in the list.
NOTE

l Click Filter All to refresh and display all the qualified trails. l Click Secondary Filter to filter the trails that are already displayed. l Click Incremental Filter to add the newly qualified trails to the list without refreshing the trails that are already displayed.

Step 3 Right-click one or more VC4 server trails that you want to disable, and choose Disable from the shortcut menu. Step 4 In the Operation Result dialog box displayed, click Close. ----End

2.1.17.2 Enabling VC4 Server Trails


A VC4 server trail is used to carry lower order client trails between NEs. When you need a disabled VC4 server trail to serve as a server trail for client trails, you can enable the VC4 server trail.
Issue 02 (2010-09-24) Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. 2-67

2 End-to-End RTN Management

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

Prerequisite
l l l You must be an NM user with "network operator" authority or higher. Applies to VC4 server trails only. The VC4 server trail must be disabled.

Procedure
Step 1 Choose Service > SDH Trail > Manage SDH Trail from the Main Menu. Step 2 In the Set Trail Browse Filter Criteria dialog box displayed, set the filter criteria and click Filter All. The trails are displayed in the list.
NOTE

l Click Filter All to refresh and display all the qualified trails. l Click Secondary Filter to filter the trails that are already displayed. l Click Incremental Filter to add the newly qualified trails to the list without refreshing the trails that are already displayed.

Step 3 Right-click one or more VC4 server trails that you want to enable, and choose Enable from the shortcut menu. Step 4 In the Operation Result dialog box displayed, click Close. ----End

2.1.18 Joining and Splitting VC4 Server Trails


A VC4 server trail is used only to carry the services between the source and sink NEs, and cannot be used by any intermediate NEs between the source and sink NEs. If you want to change the source and sink NEs of a configured VC4 server trail, you can use the joining and splitting functions.

Context
Figure 2-10 shows the joining and splitting of VC4 server trails. Figure 2-10 Joining and splitting VC4 server trails
NE2 Join NE1 Trail 2 NE2 Trail 3 Trail 1 NE3 Split NE3

NE1

There is only one VC4 server trail between NE1 and NE3. If you want to configure a VC12 or VC3 trail between NE1 and NE2 or between NE2 and NE3, you can split Trail 1 into two VC4 server trails, that is, Trail 2 and Trail 3. On the contrary, you can join Trail 2 and Trail 3 as Trail 1.
2-68 Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. Issue 02 (2010-09-24)

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

2 End-to-End RTN Management

2.1.18.1 Joining VC4 Server Trails An NE has two VC4 server trails for which the NE functions as the source for one trail and the sink for the other trail. The two trails carry lower order services that pass through the NE. You can combine the two trails into a VC4 server trail. The joining process deletes the lower order VC4 services that pass through the NE and creates higher order pass-through services at the same time. After the two VC4 server trails are joined, the VC4 server trail that passes through the NE does not use lower order cross-connections. Hence, the lower order cross-connect resources on the NE that the trail passes through are saved. 2.1.18.2 Splitting a VC4 Server Trail Splitting is the inverse process of joining. During the process of splitting, the VC4 server trail that passes through an NE is split in to two VC4 server trails. The NE functions as the source for one VC4 server trail and functions as the sink for the other VC4 server trail. The splitting process deletes the higher order VC4 services that pass through the NE and creates a lower order pass-through service at the same time. The two trails that are split carry lower order services that add or drop from the NE.

2.1.18.1 Joining VC4 Server Trails


An NE has two VC4 server trails for which the NE functions as the source for one trail and the sink for the other trail. The two trails carry lower order services that pass through the NE. You can combine the two trails into a VC4 server trail. The joining process deletes the lower order VC4 services that pass through the NE and creates higher order pass-through services at the same time. After the two VC4 server trails are joined, the VC4 server trail that passes through the NE does not use lower order cross-connections. Hence, the lower order cross-connect resources on the NE that the trail passes through are saved.

Prerequisite
l l l You must be an NM user with "network operator" authority or higher. The trails to be joined must not carry lower order services that are added/dropped at the joining NE. All lower order services carried by one trail must be able to pass through to the other trail.

Context

CAUTION
During the joining, services are interrupted. The lower order services carried by the trails to be joined cannot be added/dropped at the joining NE. Otherwise, the trails cannot be joined. See Figure 2-11. VC4 server trails 1 and 2 cannot be joined due to the existence of VC12 trail 1. Figure 2-11 Restrictions on VC4 server trail joining
VC4 Server Trail 1 VC4 Server Trail 2 VC12 Trail 1

NE1

NE2

NE3

Issue 02 (2010-09-24)

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

2-69

2 End-to-End RTN Management

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

The two trails can be joined only when all the lower order services carried by one trail are able to pass through to the other trail. The timeslots for the two trails can be different. See Figure 2-12. If any of VC12 trails 1 and 2 exists, VC4 server trails 1 and 2 cannot be joined. Figure 2-12 Restrictions on VC4 server trail joining

VC4 Server Trail 1 NE1 VC12 Trail 1 NE2

VC4 Server Trail 5

NE3

VC4 Server Trail 2 NE4 VC4 Server Trail 4

VC4 Server Trail 3 NE5

VC12 Trail 2 NE6

Procedure
Step 1 In the Physical Map, right-click an NE and choose Trails > Join VC4 Server Layer Trails from the shortcut menu.
NOTE

You need to select the Trail check box on the upper right corner of the Main Topology in advance.

Step 2 In the Join VC4 Server Trails dialog box displayed, select the trail numbers and click Join. If multiple trails are available, multiple combinations are displayed. You can select the combination as required. Step 3 Enter the name of the joined trail and click OK. Step 4 In the two Confirm dialog boxes displayed, click OK. In the Operation Result dialog box displayed, click Close. ----End

2.1.18.2 Splitting a VC4 Server Trail


Splitting is the inverse process of joining. During the process of splitting, the VC4 server trail that passes through an NE is split in to two VC4 server trails. The NE functions as the source for one VC4 server trail and functions as the sink for the other VC4 server trail. The splitting process deletes the higher order VC4 services that pass through the NE and creates a lower order pass-through service at the same time. The two trails that are split carry lower order services that add or drop from the NE.

Prerequisite
l l
2-70

You must be an NM user with "network operator" authority or higher. The NE that has been split must have sufficient lower order cross-connect resources.
Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. Issue 02 (2010-09-24)

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

2 End-to-End RTN Management

Context

CAUTION
During the splitting, services are interrupted.

Procedure
Step 1 In the Physical Map, right-click an NE and choose Trails > Split a VC4 Server Layer Trail from the shortcut menu.
NOTE

You need to select the Trail check box on the upper right corner of the Main Topology in advance.

Step 2 In the Split a VC4 Server Trail dialog box displayed, select the trail to be split and click Split. Step 3 In the Split a VC4 Server Trail dialog box displayed, enter the names of the split trails and click OK. Step 4 In the two Confirm dialog boxes displayed, click OK. In the Operation Result dialog box displayed, click Close. ----End

2.1.19 Service Authorization Management


If there are multiple service trails maintained by different operators, they may care about only the trails in their own responsibility but ignore the other services. Service authorization can filter the information not in concern of an operator, who then views and manages only the trails in the responsibility. In this manner, the management and maintenance efficiency is improved. Figure 2-13 shows four service trails. Trails 1-2 are maintained by operator A and trails 3-4 are maintained by operator B. By means of service authorization, operator A can maintain only trails 1-2 and cannot maintain trails 3-4 on the U2000. Similarly, operator B cannot maintain trails 1-2.

Issue 02 (2010-09-24)

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

2-71

2 End-to-End RTN Management

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

Figure 2-13 Service authorization management

NE1

Trail 1

Trail 2

NE2
Trail 3 Trail 4

NE4

NE3

You can authorize a service to an U2000 user in two modes: l l Directly authorize the service to an U2000 user. Specify a customer for the service and authorize the customer to an U2000 user.

Service authorization management must meet the following conditions: l l A license for service authorization management must be available. The U2000 user has the operation rights related to service authorization.

2.1.19.1 Specifying a Customer for a Service You can logically group services for management by specifying customers for them. 2.1.19.2 Authorizing a Customer to a U2000 User When you authorizing a customer to a U2000 user, you also authorize all the services specified for the customer to the U2000 user. 2.1.19.3 Authorizing a Trail to a U2000 User By authorizing a trail to a U2000 user, the U2000 user manages only the trail but ignores other trails. 2.1.19.4 Modifying Trail Authorization Information You can view, modify, and delete trail authorization information, if necessary.

2.1.19.1 Specifying a Customer for a Service


You can logically group services for management by specifying customers for them.

Prerequisite
l l You must be an NM user with "network operator" authority or higher. The U2000 user that performs such an operation must have the Right- and domain-based authorization (transport domain) right.
Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. Issue 02 (2010-09-24)

2-72

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

2 End-to-End RTN Management

The service and the customer to be specified for the service must exist.

Context
l l You can not specify customers for VC4 server trails. You can also specify a customer for a trail when creating the trail.

Procedure
Step 1 Choose Service > SDH Trail > Manage SDH Trail from the Main Menu. Step 2 In the Set Trail Browse Filter Criteria dialog box displayed, set the filter criteria and click Filter All. The trails are displayed in the list.
NOTE

l Click Filter All to refresh and display all the qualified trails. l Click Secondary Filter to filter the trails that are already displayed. l Click Incremental Filter to add the newly qualified trails to the list without refreshing the trails that are already displayed.

Step 3 Right-click the trail and choose Details from the shortcut menu. Step 4 In the displayed dialog box, click Customer and select a customer for the service from the dropdown list.
NOTE

The U2000 provides a fuzzy query function, with which you can quickly search for a specific customer out of many customers.

Step 5 Click OK. ----End

2.1.19.2 Authorizing a Customer to a U2000 User


When you authorizing a customer to a U2000 user, you also authorize all the services specified for the customer to the U2000 user.

Prerequisite
l l l You must be an NM user with "network administrator" authority or higher. The U2000 user that performs such an operation must have the Right- and domain-based authorization (transport domain) right. The U2000 user and the customer to be authorized to the U2000 user must exist.

Procedure
Step 1 Choose Service > Customer Management from the Main Menu. Step 2 Right-click the customer and choose Authorize to User from the shortcut menu. Step 3 In the displayed dialog box, select the U2000 user from Available Users in the pane on the left, and then click
Issue 02 (2010-09-24)

.
Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. 2-73

2 End-to-End RTN Management

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

Step 4 Click OK. ----End

2.1.19.3 Authorizing a Trail to a U2000 User


By authorizing a trail to a U2000 user, the U2000 user manages only the trail but ignores other trails.

Prerequisite
l l l l You must be an NM user with "network administrator" authority or higher. The U2000 user that performs such an operation must have the Right- and domain-based authorization (transport domain) right. The U2000 user to which the trail is to be authorized must exist and must have the rights of network maintainer, network operator, or network monitor. The trail to be authorized must exist.

Procedure
Step 1 Choose Service > SDH Trail > Manage SDH Trail from the Main Menu. Step 2 In the Set Trail Browse Filter Criteria dialog box displayed, set the filter criteria and click Filter All. The trails are displayed in the list.
NOTE

l Click Filter All to refresh and display all the qualified trails. l Click Secondary Filter to filter the trails that are already displayed. l Click Incremental Filter to add the newly qualified trails to the list without refreshing the trails that are already displayed.

Step 3 Right-click the trail and choose Confer Rights to User from the shortcut menu. Step 4 In the displayed dialog box, select the U2000 user from Available Users in the pane on the left, and then click Step 5 Click OK. ----End .

2.1.19.4 Modifying Trail Authorization Information


You can view, modify, and delete trail authorization information, if necessary.

Prerequisite
l l l
2-74

You must be an NM user with "network administrator" authority or higher. The U2000 user that performs such an operation must have the Right- and domain-based authorization (transport domain) right. A trail or customer must be authorized to a U2000 user.
Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. Issue 02 (2010-09-24)

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

2 End-to-End RTN Management

Procedure
Step 1 Choose Service > SDH Trail > Manage SDH Service Authority from the Main Menu. Step 2 Select the user from the User List pane in the displayed window. Step 3 In the pane on the right, view, modify, or delete the trails authorized to the user. Step 4 Click OK. ----End

2.1.20 Viewing SDH Trails


By viewing SDH trails, you can learn about the distribution and usage of the SDH trails in the network. 2.1.20.1 Viewing SDH Trail Details By viewing SDH trails, the network administrator is able to know the trail details, such as the working status, and source and sink ports. 2.1.20.2 Viewing the Use Information of a VC4 Server Trail By viewing the use information of VC4 server trails, you can learn the trail resources occupied by lower order services in the network. 2.1.20.3 Viewing Relevant Client Trails At a level higher than sever trails, client trails are used to carry services. By using the U2000, you can view the client trail information of a specified trail. 2.1.20.4 Viewing the Optical Power for the Trails You can query the optical power for trails. The U2000 provides a way to manage the optical power that is related to the NE layout, topology structure and routing. 2.1.20.5 Viewing the Status of the Fiber Break on an SDH Trail When an alarm is generated on an SDH trail due to the fiber break, the color of the fiber in the view is changed, for convenience of the primary fault location. 2.1.20.6 Viewing Fiber Information of a Trail During service planning or fault locating, you need to query or collect statistics on the information about fibers where a certain trail passes. The U2000 supports the ability to query the information about the fibers occupied by a trail.

2.1.20.1 Viewing SDH Trail Details


By viewing SDH trails, the network administrator is able to know the trail details, such as the working status, and source and sink ports.

Prerequisite
l l You must be an NM user with "network monitor" authority or higher. The SDH or PDH trail must be created.

Procedure
Step 1 Choose Service > SDH Trail > Manage SDH Trail from the Main Menu.
Issue 02 (2010-09-24) Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. 2-75

2 End-to-End RTN Management

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

Step 2 In the Set Trail Browse Filter Criteria dialog box displayed, set the filter criteria and click Filter All. The trails are displayed in the list.
NOTE

l Click Filter All to refresh and display all the qualified trails. l Click Secondary Filter to filter the trails that are already displayed. l Click Incremental Filter to add the newly qualified trails to the list without refreshing the trails that are already displayed.

Step 3 Optional: If you need to view the alarm or performance information of a trail, click Alarm or Performance to view the alarm or performance information of the trail. Step 4 Optional: If you need to view the client trail information of a trail, choose Browse Relevant Client Trails from the shortcut menu. Step 5 Optional: To view the details of the route of a certain trail, select the trail and then choose Report > Single Specifics. ----End

2.1.20.2 Viewing the Use Information of a VC4 Server Trail


By viewing the use information of VC4 server trails, you can learn the trail resources occupied by lower order services in the network.

Prerequisite
l l You must be an NM user with "network monitor" authority or higher. The VC4 server trail must be created.

Procedure
Step 1 Choose Service > SDH Trail > Manage SDH Trail from the main menu. Step 2 In the Set Trail Browse Filter Criteria dialog box, set the filter criteria and click Filter All. The trails are displayed in the list.
NOTE

l Click Filter All to refresh and display all the qualified trails. l Click Secondary Filter to filter the trails that are already displayed. l Click Incremental Filter to add newly qualified trails to the list without refreshing the trails that are already displayed.

Step 3 Optional: Select one or more VC4 server trails, right-click, and then choose Browse Relevant Client Trails from the shortcut menu. Then, you can view the client trails that the VC4 server trails carry. Step 4 Select one or more VC4 server trails, click Report and choose Server Layer Trail Use Information. Step 5 In the Server Layer Trail Use Information window, query the resource use information of the trails. Step 6 In the Server Layer Trail Use Information window, select a VC4 server trail. In the timeslot diagram that is displayed in the lower portion of the window, view the timeslots that are occupied by lower order services.
2-76 Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. Issue 02 (2010-09-24)

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management
NOTE

2 End-to-End RTN Management

A timeslot diagram can be displayed in the sequential mode or the interleaved mode. The display mode is consistent with the timeslot mode used when the trail is created.

----End

2.1.20.3 Viewing Relevant Client Trails


At a level higher than sever trails, client trails are used to carry services. By using the U2000, you can view the client trail information of a specified trail.

Prerequisite
l l You must be an NM user with "network monitor" authority or higher. The SDH trail must be created or searched out.

Context
In the network model specified in the ITU-T G.805, the transport network is classified into the circuit layer, path layer, and transmission media layer.That is, each layer manages its own overheads and each layer can be classified into sub-layers and the relationship between the adjacent layers is client and server. A connection of the client layer is carried by an adjacent server trail for transmission. For example, the link connection in a circuit layer network is provided by the path of a path layer network, while the link connection in a path layer network is provided by the section of the transmission media layer. The path layer is the server layer of the circuit layer, and the section layer is the server layer of the path layer. VC12/VC3 services are fixedly carried at the VC4 server layer. Therefore, VC12/VC3 trails are client trails of the VC4 server trails.

Procedure
Step 1 Choose Service > SDH Trail > Manage SDH Trail from the Main Menu. Step 2 In the Set Trail Browse Filter Criteria dialog box, set the filter criteria and click Filter All. The trails are displayed in the list.
NOTE

l Click Filter All to refresh and display all the qualified trails. l Click Secondary Filter to filter the trails that are already displayed. l Click Incremental Filter to add newly qualified trails to the list without refreshing the trails that are already displayed.

Step 3 Right-click a trail and choose Browse Relevant Client Trails from the shortcut menu. The corresponding client trails are displayed in the trail list. ----End

2.1.20.4 Viewing the Optical Power for the Trails


You can query the optical power for trails. The U2000 provides a way to manage the optical power that is related to the NE layout, topology structure and routing.
Issue 02 (2010-09-24) Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. 2-77

2 End-to-End RTN Management

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

Prerequisite
l l You must be an NM user with "network monitor" authority or higher. The SDH trails must be correctly created.

Procedure
Step 1 Choose Service > SDH Trail > Manage SDH Trail from the main menu. Step 2 In the Set Trail Browse Filter Criteria dialog box displayed, set the filter criteria and click Filter All. The trails are displayed in the list.
NOTE

l Click Filter All to refresh and display all the qualified trails. l Click Secondary Filter to filter the trails that are already displayed. l Click Incremental Filter to add the newly qualified trails to the list without refreshing the trails that are already displayed.

Step 3 Right-click a trail and choose Query Relevant Optical Power from the shortcut menu. Step 4 In the Optical Power Management window displayed, click the Table tab. Click Query to query the optical power information of ports from the NE. In the Operation Result dialog box displayed, click Close.
NOTE

In the View tab, move the cursor on a link. The U2000 shows the optical power information of all fibers in the link.

Step 5 Click the Graphic tab to query the graphic interface of the port optical power.
NOTE

l Green indicates that the current optical power is in the normal range. l Orange indicates that the current power exceeds the reference deviation and there is an exception. l Black "E" shape in the histogram indicates the allowable deviation range of the optical power.

----End

2.1.20.5 Viewing the Status of the Fiber Break on an SDH Trail


When an alarm is generated on an SDH trail due to the fiber break, the color of the fiber in the view is changed, for convenience of the primary fault location.

Prerequisite
You must be an NM user with "network monitor" authority or higher.

Procedure
Step 1 Choose Service > SDH Trail > Manage SDH Trail from the Main Menu. Step 2 In the Set Trail Browse Filter Criteria dialog box displayed, set the filter criteria and click Filter All. The trails are displayed in the list.
2-78 Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. Issue 02 (2010-09-24)

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management
NOTE

2 End-to-End RTN Management

l Click Filter All to refresh and display all the qualified trails. l Click Secondary Filter to filter the trails that are already displayed. l Click Incremental Filter to add the newly qualified trails to the list without refreshing the trails that are already displayed.

Step 3 In the trail list, select a trail. In the Transmission Media Layer Route view, the route where the fiber break occurs of the trail is displayed. Step 4 Optional: To refresh the view, right-click the blank area of the Transmission Media Layer Route view and choose Refresh Route from the shortcut menu. When the fiber break status is changed, the view is changed after the manual refresh. ----End

2.1.20.6 Viewing Fiber Information of a Trail


During service planning or fault locating, you need to query or collect statistics on the information about fibers where a certain trail passes. The U2000 supports the ability to query the information about the fibers occupied by a trail.

Prerequisite
l l You must be an NM user with "network monitor" authority or higher. The trail must be created.

Procedure
Step 1 Choose Service > SDH Trail > Manage SDH Trail from the Main Menu. Step 2 In the Set Trail Browse Filter Conditions dialog box displayed, set the filter criteria and click Filter All. The trails are displayed in the list.
NOTE

l Click Filter All to refresh and display all the qualified trails. l Click Secondary Filter to filter the trails that are already displayed. l Click Incremental Filter to add the newly qualified trails to the list without refreshing the trails that are already displayed.

Step 3 Select a trail, right-click, and then choose Browse Relevant Fibers from the shortcut menu. Step 4 In the Fiber/Cable Management window, view the information about the fibers where the trail passes. ----End

2.1.21 Maintaining SDH Trails


You can check and maintain SDH trails to find potential faults in the earliest time. 2.1.21.1 Locking or Unlocking an SDH Trail The U2000 can lock out some important trails. After lockout, you cannot delete, activate, or rename the locked SDH trails. Locking or unlocking an SDH trail does not affect services that are running.
Issue 02 (2010-09-24) Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. 2-79

2 End-to-End RTN Management

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

2.1.21.2 Activating or Deactivating an SDH Trail Activation is to deliver the data that is saved on the U2000 to NEs and the execution is performed. Deactivation is to delete the data from NEs, while the data on the U2000 remains. To change an SDH trail from the active to the inactive state, you need to deactivate the trail. Oppositely, to change an SDH trail from the inactive state to the active state, you need to activate the trail. 2.1.21.3 Setting a Loopback for a Trail Use this procedure to set a loopback for an SDH trail. The SDH trail loopback is a common fault location method used to test and maintain the SDH equipment. The SDH trail loopback is used to test whether the nodes between the source and loopback nodes (including the source and loopback nodes themselves) work properly, and is also used to test whether the nodes between the sink and loopback nodes (including the sink and loopback nodes themselves) work properly. 2.1.21.4 Performing the Protection Switching for a Single SNCP Trail On the U2000, you can perform or release the external switching operation for an SNCP trail. During the deployment commissioning, the external switching operation can be performed to test whether the SNCP switching is normal or whether the protection switching is equipped. During the fault maintenance, this operation can be performed to locate faults. 2.1.21.5 Performing the SNCP Trail Switching in Batches On the U2000, you can perform or release the external switching operation for SNCP trails in batches. During the deployment commissioning, the external switching operation can be performed to test whether the SNCP switching is normal or whether the protection switching is equipped. During the fault maintenance, this operation can be performed to locate faults. 2.1.21.6 Verifying Platinum Service Groups in Batches When the NE or fiber/cable pipe that a service passes through is changed, the service may fail to meet the requirements of the platinum service group. Therefore, you can manually verify the services in the group to learn about the status of the platinum group. 2.1.21.7 Converting SDH Discrete Services to Mono Nodal Trails SDH discrete cross-connections can be converted to mono nodal trails.

2.1.21.1 Locking or Unlocking an SDH Trail


The U2000 can lock out some important trails. After lockout, you cannot delete, activate, or rename the locked SDH trails. Locking or unlocking an SDH trail does not affect services that are running.

Prerequisite
l l You must be an NM user with "network operator" authority or higher. The SDH trail must be created.

Context
NOTE

l After you lock out a trail, when you configure the trail on a per-NE basis, you cannot activate, deactivate, delete, or modify the cross-connection used by the trail. In the Trail Management window, right-click a trail but some commands are grayed out in the shortcut menu. The commands are Delete, Delete from Network Layer, Activate, Deactivate, and Name. l After you lock out a VC4 server trail, you can still create a client trail on the server trail.

2-80

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

Issue 02 (2010-09-24)

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

2 End-to-End RTN Management

Procedure
Step 1 Choose Service > SDH Trail > Manage SDH Trail from the Main Menu. Step 2 In the Set Trail Browse Filter Criteria dialog box, set the filter criteria and click Filter All. The trails are displayed in the list.
NOTE

l Click Filter All to refresh and display all the qualified trails. l Click Secondary Filter to filter the trails that are already displayed. l Click Incremental Filter to add newly qualified trails to the list without refreshing the trails that are already displayed.

Step 3 Right-click a trail and choose Lock or Unlock from the shortcut menu. Step 4 In the Operation Result dialog box displayed, click Close. ----End

2.1.21.2 Activating or Deactivating an SDH Trail


Activation is to deliver the data that is saved on the U2000 to NEs and the execution is performed. Deactivation is to delete the data from NEs, while the data on the U2000 remains. To change an SDH trail from the active to the inactive state, you need to deactivate the trail. Oppositely, to change an SDH trail from the inactive state to the active state, you need to activate the trail.

Prerequisite
You must be an NM user with "network operator" authority or higher.

Context
l l If an inactive SDH trail is activated again, the attributes of services that the trail carries are consistent with the attributes of services that the trail carried before activation. If the lower order service that the VC4 server trail carries is active, you need deactivate the lower order service before you deactivate the VC4 server trail.

CAUTION
Deactivating an SDH trail interrupts services.

Procedure
Step 1 Choose Service > SDH Trail > Manage SDH Trail from the Main Menu. Step 2 In the Set Trail Browse Filter Criteria dialog box displayed, set the filter criteria and click Filter All. The trails are displayed in the list.

Issue 02 (2010-09-24)

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

2-81

2 End-to-End RTN Management


NOTE

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

l Click Filter All to refresh and display all the qualified trails. l Click Secondary Filter to filter the trails that are already displayed. l Click Incremental Filter to add the newly qualified trails to the list without refreshing the trails that are already displayed.

Step 3 Right-click an SDH trail that you want to activate or deactivate and choose Activate or Deactivate from the shortcut menu. In the Confirm and Reconfirm dialog boxes, click OK. Step 4 In the Operation Result dialog box, click Close. ----End

2.1.21.3 Setting a Loopback for a Trail


Use this procedure to set a loopback for an SDH trail. The SDH trail loopback is a common fault location method used to test and maintain the SDH equipment. The SDH trail loopback is used to test whether the nodes between the source and loopback nodes (including the source and loopback nodes themselves) work properly, and is also used to test whether the nodes between the sink and loopback nodes (including the sink and loopback nodes themselves) work properly.

Prerequisite
l l You must be an NM user with "network operator" authority or higher. Trails must be created.

Context
The SDH trail loopback includes "Loopback to Source" and "Loopback to Sink". l When "Loopback to Source" is used, the signal coming from the trail source is returned to the source over the trail. See Figure 2-14. "Loopback to Source" is used to test whether the nodes between the source and loopback nodes (including the source and loopback nodes themselves) work properly. Figure 2-14 Loopback to Source

When "Loopback to Sink" is used, the signal coming from the trail sink is returned to the sink over the trail. See Figure 2-15. "Loopback to Sink" is used to test whether the nodes between the sink node and the loopback node (including the sink node and the loopback node themselves) work properly.

2-82

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

Issue 02 (2010-09-24)

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

2 End-to-End RTN Management

Figure 2-15 Loopback to Sink

CAUTION
As a loopback interrupts services, it is only used for fault location and must be released after the fault is removed.

Procedure
Step 1 Choose Service > SDH Trail > Manage SDH Trail from the Main Menu. Step 2 In the Set Trail Browse Filter Criteria dialog box displayed, set the filter criteria and click Filter All. The trails are displayed in the list.
NOTE

l Click Filter All to refresh and display all the qualified trails. l Click Secondary Filter to filter the trails that are already displayed. l Click Incremental Filter to add the newly qualified trails to the list without refreshing the trails that are already displayed.

Step 3 Select a trail and click Maintenance and select Loopback. Step 4 In the Loopback dialog box displayed, click the tab according to the loopback location.
NOTE

You can choose to set the loopback status at the tributary board, VC4 path and optical or electrical port.

Step 5 Select a PDH interface, an SDH interface or a VC path. Double-click the Loopback Status to select the loopback mode.

Issue 02 (2010-09-24)

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

2-83

2 End-to-End RTN Management

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

Step 6 Optional: Double-click LoopRelease Time, and enter or select the releasing time of the loopback.
NOTE

When the time is up, the loopback is released automatically. This can prevent that you forget to release the loopback and the communication is affected for a long time.

Step 7 Click Apply. In the Confirm dialog box displayed, click Yes. In the Operation Result dialog box displayed, click Close. ----End

2.1.21.4 Performing the Protection Switching for a Single SNCP Trail


On the U2000, you can perform or release the external switching operation for an SNCP trail. During the deployment commissioning, the external switching operation can be performed to test whether the SNCP switching is normal or whether the protection switching is equipped. During the fault maintenance, this operation can be performed to locate faults.

Prerequisite
l l You must be an NM user with "network operator" authority or higher. The SNCP trail must be created.

Context
The external switching for SNCP trail includes: lockout, forced switching and manual switching.
2-84 Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. Issue 02 (2010-09-24)

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

2 End-to-End RTN Management

l l

In the event of lockout of switching, the switching request for the port is denied, but the reversion of switching is allowed. The forced switching has a higher priority than signal failure and signal degrade on the protection section. This switching is performed regardless of the protection channel state, unless the protection channel is satisfying a higher priority bridging request. The manual switching has a lower priority than signal failure and signal degrade on the protection section. The manual switching request is valid only when there are no signal failure or signal degrade on the protection section.

CAUTION
All switching may interrupt services.

Procedure
Step 1 Choose Service > SDH Trail > Manage SDH Trail from the Main Menu. Step 2 In the Set Trail Browse Filter Criteria dialog box displayed, set the filter criteria and click Filter All. The trails are displayed in the list.
NOTE

l Click Filter All to refresh and display all the qualified trails. l Click Secondary Filter to filter the trails that are already displayed. l Click Incremental Filter to add the newly qualified trails to the list without refreshing the trails that are already displayed.

Step 3 Select a trail and click Maintenance and choose SNC Service Control. Step 4 In the SNC Service Control dialog box displayed, select a trail, click Function and choose an option from the drop-down list. Step 5 In the Operation Result dialog box displayed, click Close. ----End

2.1.21.5 Performing the SNCP Trail Switching in Batches


On the U2000, you can perform or release the external switching operation for SNCP trails in batches. During the deployment commissioning, the external switching operation can be performed to test whether the SNCP switching is normal or whether the protection switching is equipped. During the fault maintenance, this operation can be performed to locate faults.

Prerequisite
l l You must be an NM user with "network operator" authority or higher. The SNCP trail must be created.

Context
The external switching for SNCP trail includes: lockout, forced switching and manual switching.
Issue 02 (2010-09-24) Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. 2-85

2 End-to-End RTN Management

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

l l

In the event of lockout of switching, the switching request for the port is denied, but the reversion of switching is allowed. Forced switching has a higher priority than signal failure and signal degrade, on the protection section. This switching is performed regardless of the protection channel state, unless the protection channel is satisfying a higher priority bridging request. Manual switching has a lower priority than signal failure and signal degrade, on the protection section. The manual switching request is valid only when there are no signal failure or signal degrade on the protection section.

CAUTION
All switching may interrupt services.

Procedure
Step 1 Choose Service > SDH Trail > Manage SDH Trail from the Main Menu. Step 2 In the Set Trail Browse Filter Criteria dialog box displayed, set the filter criteria and click Filter All. The trails are displayed in the list.
NOTE

l Click Filter All to refresh and display all the qualified trails. l Click Secondary Filter to filter the trails that are already displayed. l Click Incremental Filter to add the newly qualified trails to the list without refreshing the trails that are already displayed.

Step 3 Select a VC4 server trail that carries an SNCP service. Click Maintenance and choose SNC Service Batch Control. Step 4 In the SNC Trails dialog box displayed, select the trails to be switched. Click Function and choose an option from the drop-down list. The Confirm dialog box is displayed.

Step 5 In the Confirm dialog box, click OK. In the Operation Result dialog box displayed, click Close. ----End
2-86 Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. Issue 02 (2010-09-24)

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

2 End-to-End RTN Management

2.1.21.6 Verifying Platinum Service Groups in Batches


When the NE or fiber/cable pipe that a service passes through is changed, the service may fail to meet the requirements of the platinum service group. Therefore, you can manually verify the services in the group to learn about the status of the platinum group.

Prerequisite
l l l You must be an NM user with "network operator" authority or higher. The U2000 license that is used must support platinum services. The platinum service group must be created.

Context
For the requirements that the trails in a platinum service group must meet, see 2.1.2.9 Platinum Service Group.

Procedure
Step 1 Choose Service > SDH Trail > Manage SDH Trail from the Main Menu. Step 2 In the Set Trail Browse Filter Criteria dialog box displayed, set the filter criteria and click Filter All. The trails are displayed in the list.
NOTE

l Click Filter All to refresh and display all the qualified trails. l Click Secondary Filter to filter the trails that are already displayed. l Click Incremental Filter to add the newly qualified trails to the list without refreshing the trails that are already displayed.

Step 3 Right-click the trail to be verified and then choose Check Platinum Service Group from the shortcut menu. Step 4 In the Operation Result dialog box that is displayed, click Close.
NOTE

If the verification result shows that the platinum service group is downgraded, you can view the causes in the Operation Result dialog box that is displayed again.

----End

2.1.21.7 Converting SDH Discrete Services to Mono Nodal Trails


SDH discrete cross-connections can be converted to mono nodal trails.

Prerequisite
l l You must be an NM user with "network operator" authority or higher. A cross-connection with a fiber or radio connection at the source or sink cannot be converted to a mono nodal trail.

Issue 02 (2010-09-24)

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

2-87

2 End-to-End RTN Management

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

Context
l If you select only the positive cross-connection for conversion, the U2000 automatically searches for the reverse cross-connection and converts the cross-connection to a bidirectional mono nodal trail. If you select only the working cross-connection for conversion, the U2000 automatically searches for the protection cross-connection and then verifies and converts it.

Procedure
Step 1 Choose Service > SDH Trail > Manage SDH Discrete Service from the Main Menu. Step 2 In the Prompt dialog box displayed, click OK. Step 3 In the Set Discrete Service Browse Filter Criteria dialog box displayed, set the filter criteria and then click Filter.

Step 4 Right-click one or more discrete service and choose Convert to Mono Nodal Trail. Step 5 Optional: If the conversion is successful, you can click Browse Trail in the displayed dialog box to view the trail on the interface. ----End

2.1.22 Deleting SDH Trails


The deletion of needless SDH trails releases relevant network resources.

2-88

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

Issue 02 (2010-09-24)

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

2 End-to-End RTN Management

Prerequisite
l l l You must be an NM user with "network operator" authority or higher. Make sure that the SDH trail to be deleted is inactive. Make sure that the SDH trail to be deleted does not carry any other SDH trailor trunk link.

Context
NOTE

The procedure for deleting server trails and client trails are similar. The difference is that before deleting a server trail, its client trails must be deleted first. If the SDH trail to be deleted is already used by a trunk link trail, you need to delete the trunk link first.

Procedure
Step 1 Choose Service > SDH Trail > Manage SDH Trail from the Main Menu. Step 2 In the Set Trail Browse Filter Criteria dialog box displayed, set the filter criteria and click Filter All. The trails are displayed in the list.
NOTE

l Click Filter All to refresh and display all the qualified trails. l Click Secondary Filter to filter the trails that are already displayed. l Click Incremental Filter to add the newly qualified trails to the list without refreshing the trails that are already displayed.

Step 3 Right-click one or more SDH trails you want to delete and choose Delete from the shortcut menu.

Issue 02 (2010-09-24)

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

2-89

2 End-to-End RTN Management


NOTE

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

The two schemes for trail deletion are as follows: l Delete: This scheme deletes trail from the U2000 and relevant services from the NE. Be careful when using this scheme because it may affect the services. l Delete from Network Layer: This scheme deletes trails from the U2000 only. This command is not issued to the NE and thus does not affect services. After the deletion, you can perform a trail search to find the trails again according to the service information in the NE. If the trail you want to delete is activated, deactivate it before you delete it. If you attempt to delete the trail from the network layer, you need not to deactivate the trail in advance.

Step 4 In the Confirm and Reconfirm dialog boxes, click OK. Step 5 In the Operation Result dialog box, click Close. ----End

2.2 Managing Ethernet Trails


In the end-to-end configuration mode, you can quickly create Ethernet services, such as EPL, EVPL or EPLAN. During the end-to-end configuration, you only need to specify the source and sink for the service, and the U2000 automatically calculates the route and creates the service for each NE on the route. The end-to-end configuration mode is also called the trail management function.

Prerequisite
The trail management license must be provided for the U2000. 2.2.1 Basic Concepts You can learn certain basic concepts that can help you to use the end-to-end Ethernet management function. 2.2.2 Creating Ethernet Trails by Trail Search After a new network is set up or services are configured on a per-NE basis, you need to perform an Ethernet trail search so that you can manage configured services with the trail management function. 2.2.3 Configuring EPL Service You can use the trail function to configure EPL services. 2.2.4 Configuring an Unterminated EPL Service This section describes how to configure the unterminated EPL service by using the trail management function. 2.2.5 Configuring EVPL Services You can use the trail function to configure EVPL services. 2.2.6 Configuring EPLAN Service You can use the trail function to configure EPLAN services. 2.2.7 Configuring EVPL (QinQ) Service You can use the trail function to configure EVPL (QinQ) services. 2.2.8 Specifying a Customer for a Created Trail You can specify a customer for a created trail according to actual demands for the purpose of network maintenance.
2-90 Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. Issue 02 (2010-09-24)

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

2 End-to-End RTN Management

2.2.9 Checking the Connectivity of Ethernet Link You can perform Ethernet operation, administration and maintenance (OAM). 2.2.10 Viewing Ethernet Services The network maintainer or administrator must know about the occupied resources and service statuses in time. 2.2.11 Maintaining Ethernet Trails This section describes how to maintain Ethernet trails. 2.2.12 Deleting Ethernet Services You can delete the services that you do not need.

2.2.1 Basic Concepts


You can learn certain basic concepts that can help you to use the end-to-end Ethernet management function. 2.2.1.1 Ethernet End-to-End Management You can use a U2000 function at the network level to fast create and manage Ethernet trails and services in the end-to-end mode. Compared with configuration on a per-NE basis, the end-toend mode ensures faster and more convenient operation. 2.2.1.2 Ethernet Services The U2000 supports the following types of Ethernet services: 2.2.1.3 Relation Between SDH/Radio Trails and Ethernet Trails You must create trunk links before creating Ethernet trails. In addition, you must create SDH trails before creating trunk links. 2.2.1.4 Tag Attributes The tag attribute of an Ethernet port indicates how the port processes Ethernet packets.

2.2.1.1 Ethernet End-to-End Management


You can use a U2000 function at the network level to fast create and manage Ethernet trails and services in the end-to-end mode. Compared with configuration on a per-NE basis, the end-toend mode ensures faster and more convenient operation.

Definition
The U2000 network-layer management functions enable the U2000 to implement the Ethernet service end-to-end management. By using the Ethernet end-to-end management function, an authorized U2000 user can perform the following operations: l l l l l l Configure Ethernet end-to-end services. View details of an Ethernet trail. Quickly filter, search for and locate Ethernet trails. Manage and maintain Ethernet trails in a centralized manner. Manage alarms and performances based on Ethernet trails. Print Ethernet trail reports.

Issue 02 (2010-09-24)

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

2-91

2 End-to-End RTN Management

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

Purpose and Gain


In the Ethernet end-to-end management, a graphic wizard is provided for the operations and displays. This makes the operation much more direct. You can create the Ethernet trail in the manual, semi-automatic, or automatic mode. l l l Using the manual mode, a user needs to manually create a server trail, and then create an Ethernet trail on it. Using the semi-automatic mode, a user can specify an existing server trail to create an Ethernet trail. Using the automatic mode, a user only needs to specify the source node, sink node and ports for a trail. The U2000 automatically calculates and creates the trail and its server trail.

The Ethernet end-to-end management is one of the U2000 network-layer features. Considering the status of the difficulty in turning up Ethernet services, the way of end-to-end configuration greatly simplifies the process of configuring Ethernet services, and reduces the chances of misoperations that are likely to take place during the per-NE based configuration. l Without the end-to-end management function, configuring an Ethernet trail requires completely manual operations. You need to configure cross-connections and bindings on each NE, set attributes of many Ethernet ports and configure the cross-connections for transport paths. With the help of the Ethernet end-to-end management, to configure an Ethernet trail, you only need to specify the source and sink nodes. The system automatically creates the server trail and the trail you want, and at the same time, correctly sets the port attributes. In this way, the efficiency of turning up an Ethernet service is greatly improved.

Availability
l l Involved NE: The U2000 Ethernet end-to-end management function is applicable to all SDH and RTN NEs that support Ethernet services. License support: Ethernet end-to-end management is an optional feature of the U2000. It is controlled by license. Hence, the Ethernet end-to-end management function is available only after a license that supports this feature is obtained. Supporting version: The U2000 V100R001 and later versions support the Ethernet end-toend management feature.

Impact
l Impact on system performance: If the requirements for the U2000 system are met and if the U2000 runs normally, adding the Ethernet end-to-end management does not impose impacts on the system. Impact on other features: The Ethernet end-to-end feature depends on the single-NE Ethernet feature. The Ethernet end-to-end function can be normally used only when the U2000 single-NE Ethernet feature is normal.

Principle
1. The following describes the basic hierarchy of the Ethernet feature. Current Ethernet end-to-end is based on the Ethernet Over SDH (EOS) technology, that is, the Ethernet service is carried on SDH paths. As shown in Figure 2-16, the Ethernet endto-end, which is above the SDH end-to-end, is the at the client layer.
2-92 Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. Issue 02 (2010-09-24)

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

2 End-to-End RTN Management

Figure 2-16 Basic hierarchy of the Ethernet feature

2.

The following describes how an Ethernet service is configured. According to the source and sink of the Ethernet trail, the U2000 calculates the crossconnections to be delivered to each NE. When the U2000 creates an Ethernet trail on the U2000, it delivers the service to each NEs that the service passes. In this way, the Ethernet service is turned up.

Implementation
Ethernet end-to-end management is an optional function, available only after a license that supports this function is provided.

2.2.1.2 Ethernet Services


The U2000 supports the following types of Ethernet services:

EPL Services
The Ethernet private line (EPL) is of two types, which are as follows: l l Port Port + VLAN

EPL services of Port type can be transparently transmitted. See Figure 2-17. Figure 2-17 EPL services of the Port type

PORT2

NE1

NE2 PORT2

B'

PORT1

VCTRUNK2

VCTRUNK2

PORT1

TrunkLink2 A
VCTRUNK1

TrunkLink1

A'
VCTRUNK1

Issue 02 (2010-09-24)

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

2-93

2 End-to-End RTN Management

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

EPL services of Port + VLAN type can be converged to save port resources through several services that share a PORT port, or save VCTRUNK resources by sharing a VCTRUNK port. See Figure 2-18 and Figure 2-19. l Share a PORT port Figure 2-18 EPL services sharing a PORT port
NE1 NE2

PORT2 A"

VLAN22

PORT1 A

VLAN22
VCTRUNK2 VCTRUNK2

PORT1 VLAN11 A'

TrunkLink2
VCTRUNK1

TrunkLink1

VCTRUNK1

VLAN11

Share a VCTRUNK port Figure 2-19 EPL services sharing a VCTRUNK port
VLAN22 PORT2 B PORT1 A VCTRUNK1 NE1 NE2 PORT2 B' VLAN22

VLAN11

PORT1

VLAN11 A'

TrunkLink1

VCTRUNK1

For the RTN equipment, only the EPL services of the Port type are supported at present.

2.2.1.3 Relation Between SDH/Radio Trails and Ethernet Trails


You must create trunk links before creating Ethernet trails. In addition, you must create SDH trails before creating trunk links. The Figure 2-20 shows the relation between SDH trails, trunk link trails and Ethernet trails.

2-94

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

Issue 02 (2010-09-24)

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

2 End-to-End RTN Management

Figure 2-20 Relation Between SDH Trails and Ethernet Trails

The lower level bearer trail is called the server trail, and the upper level trail is called the client trail. A trunk link is the server trail of an Ethernet trail, and the Ethernet trail is the client trail of the trunk link. An SDH trail is the server trail of a trunk link, and oppositely the trunk link is the client trail of the SDH trail. You can query associated trails using the U2000. For example, when you are viewing a trunk link, you can view its associated server trail or client trail.

2.2.1.4 Tag Attributes


The tag attribute of an Ethernet port indicates how the port processes Ethernet packets. Ethernet packets are classified into tagged and untagged packets in 802.1q. A four-byte field is added to the Ethernet frame header of a tagged packet. The 802.1q-compliant field is used to identify the VLAN ID. An untagged packet does not have such field. An Ethernet port has the following three types, which are Tag aware, Access and Hybrid. See Table 2-5 for details on how an Ethernet board processes tagged and untagged packets at the ingress. Table 2-5 Processing policy at ingress Port Type Tag aware Access Hybrid Tagged Packet Transparently transmitted Discarded Transparently transmitted Untagged Packet Discarded Added with the default VLAN tag Added with the default VLAN tag

See Table 2-6 for details on how an Ethernet board processes tagged and untagged packets at the egress.
Issue 02 (2010-09-24) Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. 2-95

2 End-to-End RTN Management

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

Table 2-6 Processing policy at egress Port Type Tag aware Access Hybrid Tagged Packet Transparently transmitted The VLAN tag is removed The VLAN tag is removed if it is the same as the default tag for the port Transparently transmitted if the VLAN tag is different from the default tag for the port Untagged Packet -

As shown in Table 2-5 and Table 2-6, in an actual network, you need to set the port type for the Ethernet board of an NE according to the Tag attribute of the messages sent from the userside equipment. If the user-side equipment sends the Untag message, set the external port to Access and set the internal port to Tag aware. If the user-side equipment sends the Tag message, set the external port to Tag aware and set the internal port to Tag aware. For example, if the source equipment of a service does not support Tag messages but the sink equipment supports Tag messages, you need to set the external port of the Ethernet board that resides on the NE connected to the source to Access, and set the external port of the Ethernet board that resides on the NE connected to the sink to Tag aware. Set the internal ports of the Ethernet boards that resides on the NEs connected to the source and the sink to Tag aware.

2.2.2 Creating Ethernet Trails by Trail Search


After a new network is set up or services are configured on a per-NE basis, you need to perform an Ethernet trail search so that you can manage configured services with the trail management function. 2.2.2.1 Searching for Ethernet Trails After a new network is set up or services are configured station by station, you need to perform an Ethernet trail search so that you can manage configured services with the trail management function. 2.2.2.2 Viewing Ethernet Discrete Services If some cross-connections on an NE cannot form trails at the network layer and are isolated on the NE, these cross-connections are called discrete services.

2.2.2.1 Searching for Ethernet Trails


After a new network is set up or services are configured station by station, you need to perform an Ethernet trail search so that you can manage configured services with the trail management function.

Prerequisite
l
2-96

You must be an NM user with "network maintainer" authority or higher.


Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. Issue 02 (2010-09-24)

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

2 End-to-End RTN Management

l l l

The license for the Ethernet trail management function must be provided. The NE data must be uploaded to the U2000. Fiber connections between the NEs must be created correctly.

Context
l l The search only updates the trail information at the network layer on the U2000. The service operation or the configuration data of the NE is not affected by the search. By using this function, you can search out the unterminated Ethernet trails. The unterminated Ethernet trail refer to the Ethernet trail whose source or sink is in the current U2000 management domain, while the sink or source is in the management domain of another NMS. By using this function, you can search out one-source and one-sink trunk links and onesource and two-sink trunk links. The one-source and two-sink trunk links carry unterminated EPL trails that are configured with the SDH SNCP protection. If the server trail of an unterminated EPL trail is a trunk link with a single source and double sinks, a trunk link can be searched out.

Procedure
Step 1 Choose Service > MSTP Trail > Search for Ethernet Trail from the Main Menu. Step 2 Select the Ethernet trail search mode. l l l l l Delete the existing trails before searching: Select this to delete the current Ethernet trails without deleting virtual paths and static routes. You can then search for Ethernet trails again. Search for RPR: Select this to search the RPR based on the existing ones. The searched RPR may conflict with the existing ones. Search for Trunk Link: Select this to search the trunk link based on the existing ones. The searched trunk link may conflict with the existing ones. Search for Ethernet Trail: Select this to search the Ethernet Trail based on the existing ones. The searched Ethernet Trail may conflict with the existing ones. Search for unterminated trails: Select this to perform a search based on the existing Ethernet trails again. The unterminated Ethernet trails and unterminated trunk links may be searched out. Search By Subnet: Searches for trails that are formed by cross-connections of the selected subnets.

Step 3 Click Next to start the trail search. The time taken to return the search result depends on the number of services. You may have to wait for some time before the search is complete. Step 4 Click Next to view the search result. l If there are new trails, the Confirm window will displayed. Click OK to synchronize the trail information, or click Cancel and the trail information is not synchronized.
NOTE

If you click OK, trails are synchronized and, after synchronization, the trail management window is displayed. If you click Cancel, the trail management window is displayed directly.

If any conflicting trunk link , RPR or Ethernet trail is found when the search is complete, click Next. These conflicting trails are displayed. By default, the conflicting trunk links, RPR or Ethernet trails are set to be deleted. You can set whether to delete the conflicting trunk links according to actual situation. Click Next. The U2000 deletes the trails that are
Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. 2-97

Issue 02 (2010-09-24)

2 End-to-End RTN Management

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

set to be deleted at the network layer, and displays the trunk links, RPR and Ethernet trails that are searched out. By default, the management flag of all trunk links, RPR and Ethernet trails that the U2000 searches out are configured, which indicates that they are subject to the management of the network layer. You can delete the trunk link, RPR or Ethernet trail whose management flag is not configured according to actual requirements. l If conflicting trunk link, RPR or Ethernet trail is not found, when you click Next, the U2000 displays the trunk links, RPR and Ethernet trails that the U2000 searches out. By default, the management flag of all trunk links, RPR and Ethernet trails that the U2000 searches out are configured, which indicates that they are subject to the management of the network layer. You can delete the trunk link, RPR or Ethernet trail whose management flag is not configured according to actual requirements.
NOTE

The management flag indicates that the trail is included in the network trail management. By default, the trail is under management. If you exclude the trail from the network trail management, you can also manage cross-connections of single NEs during the service configuration on a per-NE basis.

Step 5 Click Next and the trails searched out without management flags are deleted from the network layer by the U2000. This operation does not affect the NE services or the NM data of single NEs. You can then view all discrete services in the network, including private line service, LAN service, binding relation and discrete RPR. Step 6 Click Finish. ----End

2.2.2.2 Viewing Ethernet Discrete Services


If some cross-connections on an NE cannot form trails at the network layer and are isolated on the NE, these cross-connections are called discrete services.

Prerequisite
You must be an NM user with "network monitor" authority or higher.

Procedure
Step 1 Choose Service > MSTP Trail > Manage Ethernet Discrete Service from the Main Menu. Step 2 In the Set Discrete Service Browse Filter Criteria dialog box, set the filtering criteria.
NOTE

l In the Filter area, click Add, NE and Board will display All, then double-click NE and Board to select the specific NEs and boards. l In the Service Status area, check Activate or Inactive check box.

Step 3 Click Filter to view the details of the discrete services. ----End

2.2.3 Configuring EPL Service


You can use the trail function to configure EPL services. 2.2.3.1 Creating a VC4 Server Trail
2-98 Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. Issue 02 (2010-09-24)

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

2 End-to-End RTN Management

A VC4 server trail is used to carry the VC12 and VC3 trails between the NEs. Before creating a VC12 or VC3 trail, you need to create a VC4 server trail between the NEs. 2.2.3.2 Creating a Trunk Link Before creating EPL, Unterminated EPL, EVPL and EPLAN trails, create a trunk link as the bearer trail. 2.2.3.3 Creating an EPL Trail In this user interface, you can create an EPL trail. 2.2.3.4 Verifying Ethernet Services After you configure Ethernet services, you need to verify whether service channels are available. 2.2.3.5 Sample Application: Configuring EPL Services This topic uses an example to describe how to plan the service parameters and complete the entire process of configuring the point-to-point EPL service by trail method.

2.2.3.1 Creating a VC4 Server Trail


A VC4 server trail is used to carry the VC12 and VC3 trails between the NEs. Before creating a VC12 or VC3 trail, you need to create a VC4 server trail between the NEs.

Prerequisite
l l You must be an NM user with "network operator" authority or higher. A protection subnet must be created for release 4.0 NEs, including the OptiX 155/622H (Metro 1000), the OptiX 155/622, the OptiX 2500+ (Metro 3000), and the OptiX Metro 3100 and so on. The license for the trail management function must be provided. The OptiX 10G (Metro 5000) NE must have the AMXS, EMXS or ETXC board where the low order cross-connection protection pairs are created in U2000. The OptiX OSN 9500 NE must have the GXCL or EXCL board where the lower order cross-connection protection pairs are created in U2000. The available resources must be sufficient.

l l l l

Context
l A VC4 server trail is used only to carry services between the source and sink NEs, and cannot be used by any intermediate NEs. Hence, for the convenience of bandwidth use, VC4 server trails are usually created between two adjacent NEs, instead of between two NEs that have intermediate NEs. Before deleting a VC4 server trail, you need to delete its lower order trail. A VC4 server trail is used to carry the VC12 and VC3 trails between the NEs. Hence, when you create higher order services such as VC4 or VC4-Xc services, you need not create the VC4 server trail.

Procedure
Step 1 Choose Service > SDH Trail > Create SDH Trail from the Main Menu. Step 2 Set the service direction to Bidirectional and level to VC4 Server Trail. Step 3 Set the Service Domain, Resource Usage Strategy and Protection Priority Strategy parameters.
Issue 02 (2010-09-24) Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. 2-99

2 End-to-End RTN Management


NOTE

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

Pay attention to the following points when setting the parameters: l Resource Usage Strategy defines the protection subnet resources or timeslots available during trail creation. The values are Protected Resource, Extra Resource and All Resource. l Protection Priority Strategy defines the protection subnet resources to be selected first during trail creation. The values are Trail Protection First, SNCP First and NP First.

Step 4 Double-click the source NE and the sink NE in turn. The automatically selected route is displayed between the NEs.

Step 5 Optional: Specify the explicit link of the service. l l Click a server trail between the NEs to specify the included route. Click the trail again or click Cancel Route Restriction to cancel the selection. Click the Explicit Link tab. Right-click the blank area and choose Add from the shortcut menu. In the Add Explicit Link window displayed, you can search for the existing server trails and set them as the explicit links of the trails to be created. Click the Explicit Node tab. Double-click an NE of the subnet to specify the explicit NE of the route. This NE is shown as the icon. Double-click the NE again to cancel the selection. Click the Explicit Node tab. Right-click the blank area in the tab and choose Add from the shortcut menu. In the Add Explicit Node window displayed, you can search for the nodes and set them as the explicit nodes of the trails to be created. Double-click another NE in this subnet to specify the excluded nodes for the trail. The selected NE is marked with a sign. (Double-click the NE again to cancel the selection.) Click the Excluded Node tab. Right-click the blank area and choose Add from the shortcut menu. In the Add Excluded Node window displayed, you can search for the nodes and set them as the explicit nodes of the trails to be created.

Step 6 Optional: Specify the explicit node. l

Step 7 Optional: Specify the excluded node. l l

Step 8 Optional: Click Set Route Timeslot. The Set Route Timeslot dialog box is displayed. Select the timeslot and click OK.

2-100

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

Issue 02 (2010-09-24)

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management
NOTE

2 End-to-End RTN Management

l If you do not assign the timeslot, the first available timeslot is selected automatically. l If multiple trails are selected, right-click them and choose Uniform Timeslot. U2000 consider the timeslot value of the trail in the first row as the datum value and modify the timeslot values of other trails to be consistent with the datum value. In this way, all trails use the same timeslot.

Step 9 Optional: Click the General Attributes tab and set the general attributes of the trail, such as the Name and Order No.. Step 10 Optional: If you do not want to activate the created trail when the configuration is issued to NEs, you can uncheck the Activate the trail check box.
NOTE

l If you activate a trail, the service configuration data of the trail is sent to the NE. l If you do not activate a trail, the service configuration data of the trail is stored at the NE layer on the U2000.

Step 11 Optional: If you want to create multiple trails with the same route, check the Copy after Creation check box. After the creation of the trail, a dialog box is displayed and you can copy the trail. Step 12 Click Apply. Step 13 Optional: If the creation is successful, click Browse Trail in the displayed dialog box. Then, you can view the trail on the interface. ----End

2.2.3.2 Creating a Trunk Link


Before creating EPL, Unterminated EPL, EVPL and EPLAN trails, create a trunk link as the bearer trail.

Prerequisite
l l You must be an NM user with "network operator" authority or higher. The Ethernet processing board and the corresponding interface board must be installed.

Procedure
Step 1 Choose Service > MSTP Trail > Create Trunk Link from the Main Menu. Step 2 Set the Bandwidth parameter.

Step 3 Optional: Check the Auto Create Server Trail check box.

Issue 02 (2010-09-24)

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

2-101

2 End-to-End RTN Management


NOTE

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

l If you do not create an SDH trail, check the Auto Create Server Trail check box so that U2000 can create an SDH trail when creating the trunk link. If an SDH trail is already created, you can uncheck the Auto Create Server Trail check box. l To create a one-source and two-sink trunk link, you must create an SDH trail manually instead of selecting the Auto Create Server Trail check box. For details of the operations, see 2.1.9 Creating an SDH Trail Manually. l If the trunk link to be created is a server trail of an unterminated EPL trail, the following requirements must be met. l The sink of the trunk link must be terminated on the EOD board. l The sink of the server trail of this trunk link must be terminated on the same EOD board. l If the trunk link has a single source and double sinks, the source and sink boards of the SDH trail that is created manually must be the same as those of the trunk link. Additionally, the sink boards must be same EOD board.

Step 4 Set the Source and Sink. Click Browse to select the appropriate VCTRUNK ports.
NOTE

Pay attention to the following points when setting the parameters: l To create a one-source and two-sink trunk link, you need to set two VCTRUNK ports for Sink. The two VCTRUNK ports that are displayed in the user interface are separated by . l If the Auto Create Server Trail check box is checked in Step 3, select Bound Timeslot in addition to the VCTRUNK port. Otherwise you need to select the VCTRUNK port only. l You need to keep the bandwidth of the source or sink VCTRUNK consistent with the bandwidth setting in Step 2. l You can set the port attributes as need. Click Port Attribute. In the Port Attributes dialog box displayed, you can view the port information. You can edit TAG, Port Type, Mapping Protocol, Enabling LCAS, Port Enabled and Entry Detection. Click Apply to complete the settings of the port attributes.

Step 5 Optional: In Available Trail of the Server Layer Trail tab, select an appropriate lower order path trail as the server trail of the trunk link tail.
NOTE

If Step 3 is executed, skip this step.

Step 6 Optional: Complete the information for this trunk link in the General Attributes tab, such as Name, Order NO..
NOTE

If you want to use the default values, skip this step.

Step 7 Optional: If you do not want to activate the created trail when the configuration is issued to NEs, you can uncheck the Activate the trail check box.
NOTE

l If you activate the trail, service configuration data is sent to the NE. l If you do not activate the trail, the service configuration data is saved only in the U2000.

Step 8 Click Apply. A prompt is displayed, indicating that the operation is successful. Step 9 Click Close. ----End
2-102 Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. Issue 02 (2010-09-24)

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

2 End-to-End RTN Management

2.2.3.3 Creating an EPL Trail


In this user interface, you can create an EPL trail.

Prerequisite
l l l You must be an NM user with "network operator" authority or higher. A trunk link must be created. The Ethernet processing card and the corresponding interface card must be installed.

Procedure
Step 1 Choose Service > MSTP Trail > Create EPL from the main menu. Step 2 Set the source and sink for EPL trail. Select Port Usage Strategy for the source and sink.
NOTE

The Port Usage Strategy parameter has the following values: l PORT: Use this strategy to configure transparent transmission of the EPL service. This strategy usually applies to point-to-point communication. The VLAN ID cannot be edited. l PORT+VLAN: Use this strategy to configure convergence of the EPL service. This strategy applies to point-to-point, point-to-multipoint communication, and communication among multiple points.

Step 3 Click Browse to select the appropriate PORT port. If the value of Port Usage Strategy is PORT +VLAN, the VLAN ID must be set.
NOTE

When you set Port Usage Strategy to PORT+VLAN, you can create multiple VLANs at a time. When setting VLAN IDs, note that the sign - indicates several consecutive VLAN IDs and the sign , separates two VLAN IDs. For example, 1-3,6,8-10 indicates the following VLAN IDs: 1,2,3,6,8,9,10.

Step 4 Set the trunk link. Select the route strategy for the trunk link, and perform the next operation accordingly. l l Strategy 1: Create a trunk link automatically. Set the bandwidth of the trunk link and click Next. Strategy 2: Create a trunk link manually. Click Next to create the trunk link. The default value of the trunk link route strategy is Using Existing Trunk Link. Select the created trunk link and click Next. Strategy 3: Use the existing trunk link. Specify the explicit node. Right-click the NE that you want to set as an explicit node and choose Set As Compulsory Node from the shortcut menu. In the Set As Compulsory Node window, specify the NE and cards.

CAUTION
When you specify multiple explicit nodes, you need to specify them in an order from the source to sink. In the left-hand Explicit Node pane, select a node, right-click, and add a new explicit node or delete the explicit node by using the shortcut menu.
Issue 02 (2010-09-24) Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. 2-103

2 End-to-End RTN Management

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

After explicit nodes are specified, click Next. Do not specify the explicit node. Select a proper trunk link route and click Next.
NOTE

Pay attention to the following points when setting the parameters: l The route strategy for the trunk link depends on the application in practice. Usually it is recommended that you create a trunk link first, and then create an Ethernet trail. Hence, Use Existing Trunk Link is the default value. l Create Trunk Link Manually and Create Trunk Link Automatically are often used for service expansion. In the former one, the source and sink of the trunk link need to be specified manually, but the timeslot allocation can be controlled manually. In the latter one, the source and sink of the trunk link can be specified automatically, but the timeslot allocation cannot be controlled manually.

Step 5 Set the port attributes. Set the TAG, Enabling LCAS, Mapping Protocol, Port Enabled and Entry Detection parameters in Port Attribute Setting.
NOTE

Enabling LCAS needs the support of cards.

Step 6 Optional: Complete the information for the EPL trail, such as Name and Order No..
NOTE

If you want to use the default values, skip this step.

Step 7 Optional: If you do not want to activate the created trail when the configuration is issued to NEs, you can clear the selection of the Activate the trail check box.
NOTE

l If you activate a trail, the service configuration data of the trail is sent to the NE. l If you do not activate a trail, the service configuration data of the trail is stored at the NE layer on the U2000.

Step 8 Click Finish. A prompt is displayed, indicating that the operation is successful. Step 9 Click Close. ----End

2.2.3.4 Verifying Ethernet Services


After you configure Ethernet services, you need to verify whether service channels are available.

Prerequisite
The Ethernet service must be created and activated.

Procedure
l For the boards (such as N1EMS4) that support Ethernet OAM, use the Ethernet OAM function to verify the Ethernet services. For details, refer to: 2.2.9.1 Ethernet OAM 2.2.9.2 Creating MPs 2.2.9.3 Performing a CC Check
2-104 Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. Issue 02 (2010-09-24)

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

2 End-to-End RTN Management

2.2.9.4 Performing an LB Check 2.2.9.5 Performing an LT Check 2.2.9.6 Performing a Ping Test 2.2.9.7 Performing Performance Detection l For the boards (such as N1EFS0) that do not support Ethernet OAM, use the ping command to verify the Ethernet services. 1. 2. At the source end and then the sink end of the service, use a crossover cable to connect the port on the Ethernet board and a computer. Set the IP addresses of the two computers and ensure they are in the same network segment.
NOTE

l Do not set the IP address to the 127.0.0.0 loopback address. l Before you verify the Port+VLAN services, set the port type of the external port of the Ethernet board that is connected to the computer to Access.

3. ----End

Use the ping command on one computer to ping the other computer. Run the command ping x.x.x.x -n 60. If no packet is lost, it indicates that the channel is available.

2.2.3.5 Sample Application: Configuring EPL Services


This topic uses an example to describe how to plan the service parameters and complete the entire process of configuring the point-to-point EPL service by trail method.

Prerequisite
l l You must be an NM user with "network operator" authority or higher. The license for SDH and Ethernet trail management must be provided.

Context
Project Network Design As shown in Figure 2-21, NE1 and NE2 adopt the OptiX RTN 600 NEs configured with the IDU 620. The new service requirements are as follows: l l l l The two branches of User A that are located at NE1 and NE2 need communicate with each other over Ethernet. A 10 Mbit/s bandwidth is required. The two branches of User B that are located at NE1 and NE2 need communicate with each other over Ethernet. A 20 Mbit/s bandwidth is required. The service of User A need be isolated from the service of User B. The Ethernet equipment of User A and User B provide 100 Mbit/s Ethernet electrical ports of which the working mode is auto-negotiation, and does not support VLAN.

Issue 02 (2010-09-24)

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

2-105

2 End-to-End RTN Management

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

Figure 2-21 Networking diagram


User A1 NE 1 NE2 User A2

User B1

User B2

NE Panel In the following example, NE1 and NE2 can use Ethernet transparent transmission boards to create point-to-point EPL services. Slot 8 on NE1/NE2 houses the EFT4 board. Figure 2-22 IDU board configuration
EXT IF1A FAN FAN
Slot 20

Slot7 Slot5 Slot3 Slot1

EMS EXT EXT EXT PH1 SCC SCC

Slot8 Slot6 Slot4 Slot2

EXT IF1A PXC PXC PXC PXC

Service Configuration Diagram Figure 2-23 Configuring Ethernet services

Timeslot Allocation Information l The EPL service of User A is as follows: Occupies VC-12 timeslots 17-21 of the first VC-4 on the radio link between NE1 and NE2. Uses VC-12 timeslots 1-5 in the second VC-4 of the EFT4 board in slot 8 of NE1 and VC-12 timeslots 1-5 in the second VC-4 of the EFT4 board in slot 8 of NE2 to add/drop services.
2-106 Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. Issue 02 (2010-09-24)

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

2 End-to-End RTN Management

The EPL service of User B is as follows: Occupies VC-12 timeslots 22-31 of the first VC-4 on the radio link between NE1 and NE2. Uses VC-12 timeslots 6-15 in the second VC-4 of the EFT4 board in slot 8 of NE1 and VC-12 timeslots 6-15 in the second VC-4 of the EFT4 board in slot 8 of NE2 to add/ drop services.

Figure 2-24 Timeslot allocation of Ethernet services

Process 1. 2. 3. 4. Creating a Link Server Trail Creating a Trunk Link Creating an EPL Trail Verifying Ethernet Services

The following procedure describes how to configure EPL services based on the network that is previously configured.

Procedure
Step 1 Creating a Link Server Trail 1. 2. 3. Choose Service > SDH Trail > Create SDH Trail from the Main Menu. Set the service direction to Bidirectional and set the service level to Link Server Trail. Set Resource Usage Strategy and Protection Priority Strategy. Set the parameters as follows: l Resource Usage Strategy: Protected Resource l Protection Priority Strategy: Trail Protection First 4. Double-click the source NE and the sink NE in turn. The automatically selected route is displayed between the NEs. Set the parameters as follows: In the right-hand pane, double-click to select the source NE NE1 and the sink NE NE5. Double-click again can cancel the selection. Alternatively, click Browse to select an NE. The sign appears on the source NE and the sign appears on the sink NE.
Issue 02 (2010-09-24) Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. 2-107

2 End-to-End RTN Management

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

5.

Click Set Route Timeslot. The Set Route Timeslot dialog box is displayed. Select the timeslot and click OK. Parameter settings: Timeslot: 1

6.

Click the General Attributes tab and set the general attributes of the trail, such as the Name and Order No.. Set the parameters as follows: Name: NE1-NE2-Link Server Trail-0001 The Trail View where you create a link server trail is as follows:

7.

Click Apply. In the Operation Result dialog box displayed, click Close.

Step 2 Creating a Trunk Link


NOTE

You must create one trunk link from A1 (NE1) to A2 (NE2) and one trunk link from B1 (NE1) to B2 (NE2).

1. 2.

Choose Service > MSTP Trail > Create Trunk Link from the Main Menu. Set the Bandwidth parameter. Set the parameters as follows: Bandwidth: 5 X VC12.

3. 4.

Check the Auto Create Server Trail check box. Set the Source and Sink. Click Browse to select the appropriate VCTRUNK ports. l Set parameters for a trunk link from A1 (NE1) to A2 (NE2) as follows: The source of the trunk link: Source: NE1-8-EMS-VCTRUNK1 Bound Timeslot: NE1-8-EMS-1(SDH-1)-VC4-1-VC12(6-10) The sink of the trunk link: Sink: NE2-8-EMS-VCTRUNK1

2-108

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

Issue 02 (2010-09-24)

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

2 End-to-End RTN Management

Bound Timeslot: NE2-8-EMS-1(SDH-1)-VC4-1-VC12(6-10) l Set parameters for a trunk link from B1 (NE1) to B2 (NE2) as follows: The source of the trunk link: Source: NE1-8-EMS-VCTRUNK2 Bound Timeslot: NE1-8-EMS-1(SDH-1)-VC4-1-VC12(11-20) The sink of the trunk link: Sink: NE2-8-EMS-VCTRUNK2 Bound Timeslot: NE2-8-EMS-1(SDH-1)-VC4-1-VC12(11-20) 5. Complete the information for this trunk link in the General Attributes tab, such as Name, Order NO.. Set the parameters as follows: l The trail name of the trunk link from A1 (NE1) to A2 (NE2): Trunk_Link-0001. l The trail name of the trunk link from B1 (NE1) to B2 (NE2): Trunk_Link-0002. 6. If you do not want to activate the created trail when the configuration is issued to NEs, you can uncheck the Activate the trail check box. The Trail View where you create a trunk link is as follows:

7.

Click Apply.

Step 3 Creating an EPL Trail


NOTE

You must create one EPL trail from A1 (NE1) to A2 (NE2) and one EPL trail from B1 (NE1) to B2 (NE2).

1. 2.

Choose Service > MSTP Trail > Create EPL from the main menu. Set the source and sink for EPL trail. Select Port Usage Strategy for the source and sink. Set the parameters as follows: Port Usage Strategy: Port+VLAN

3.

Click Browse to select the appropriate PORT port. If the value of Port Usage Strategy is PORT+VLAN, the VLAN ID must be set.
Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. 2-109

Issue 02 (2010-09-24)

2 End-to-End RTN Management

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

l Set parameters for an EPL trail from A1(NE1) to A2 (NE2) as follows: Source Port: NE1-8-EMS-PORT3. Source VLAN ID: 3. Sink Port: NE2-8-EMS-PORT3. Sink VLAN ID: 3. l Set parameters for an EPL trail from B1 (NE1) to B2 (NE2) as follows: Source Port: NE1-8-EMS-PORT4. Source VLAN ID: 4. Sink Port: NE2-8-EMS-PORT4. Sink VLAN ID: 4. 4. Set the trunk link. Select the route strategy for the trunk link, and perform the next operation accordingly. l Set parameters for an EPL trail from A1 (NE1) to A2 (NE2) as follows: Trunk Link Route Strategy: Use Existing Trunk Link Trunk link: Trunk_Link-0001 l Set parameters for an EPL trail from B1 (NE1) to B2 (NE2) as follows: Trunk Link Route Strategy: Use Existing Trunk Link Trunk link: Trunk_Link-0002 5. Set the port attributes. Set the TAG, Enabling LCAS, Mapping Protocol, Port Enabled and Entry Detection parameters in Port Attribute Setting. Parameter settings: l Set port attributes for NE1. TAG: Tag Aware Port Enabled: Enabled l Set port attributes for NE5. TAG: Access Port Enabled: Enabled 6. 7. 8. Complete the information for the EPL trail, such as Name and Order No.. If you do not want to activate the created trail when the configuration is issued to NEs, you can clear the selection of the Activate the trail check box. Click Finish. A prompt is displayed, indicating that the operation is successful.

Step 4 Verifying Ethernet Services 1. 2. At the source end and then the sink end of the service, use a crossover cable to connect the port on the Ethernet board and a computer. Set the IP addresses of the two computers and ensure they are in the same network segment.
NOTE

l Do not set the IP address to the 127.0.0.0 loopback address. l Before you verify the Port+VLAN services, set the port type of the external port of the Ethernet board that is connected to the computer to Access.

2-110

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

Issue 02 (2010-09-24)

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

2 End-to-End RTN Management

3.

Use the ping command on one computer to ping the other computer. Run the command ping x.x.x.x -n 60. If no packet is lost, it indicates that the channel is available.

----End

2.2.4 Configuring an Unterminated EPL Service


This section describes how to configure the unterminated EPL service by using the trail management function.

Context
As shown in Figure 2-25, the server trail for an unterminated EPL service can be a terminated trunk link or an unterminated trunk link. The sink of the terminated trunk link must be located on an EOD card. Figure 2-25 Server trail for an unterminated EPL service
Unterminated EPL trail

Unterminated trunk link

One-source and one-sink trunk link

One-source and multi-sink trunk link

SDH trail from an SDH trail from an Ethernet card to Ethernet card to an multiple SDH line cards SDH line card

SDH trail from an Ethernet card to one EOD line card

SDH trail from an Ethernet card tomultiple EOD line cards

A->B: A is the server trail of B. That is, B is the client trail of A.

NOTE

Currently, the NMS supports the functions of searching, creating, and managing one-source and multi-sink trunk links.

2.2.4.1 Creating a VC4 Server Trail A VC4 server trail is used to carry the VC12 and VC3 trails between the NEs. Before creating a VC12 or VC3 trail, you need to create a VC4 server trail between the NEs. 2.2.4.2 Creating an Unterminated Trunk Link Before creating an unterminated EPL service, you need to create a server trail for the unterminated EPL service. An unterminated trunk link is the server trail of the unterminated EPL service. There are four types of paths for the unterminated trunk link: VC12 virtual concatenation, VC3 virtual concatenation, VC4 virtual concatenation, and VC4 adjacent concatenation. 2.2.4.3 Creating a Trunk Link Before creating EPL, Unterminated EPL, EVPL and EPLAN trails, create a trunk link as the bearer trail.
Issue 02 (2010-09-24) Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. 2-111

2 End-to-End RTN Management

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

2.2.4.4 Creating an Unterminated EPL Trail When the planned sink of an EPL service is not located on a Huawei network, you need to create an unterminated EPL trail. 2.2.4.5 Verifying Ethernet Services After you configure Ethernet services, you need to verify whether service channels are available.

2.2.4.1 Creating a VC4 Server Trail


A VC4 server trail is used to carry the VC12 and VC3 trails between the NEs. Before creating a VC12 or VC3 trail, you need to create a VC4 server trail between the NEs.

Prerequisite
l l You must be an NM user with "network operator" authority or higher. A protection subnet must be created for release 4.0 NEs, including the OptiX 155/622H (Metro 1000), the OptiX 155/622, the OptiX 2500+ (Metro 3000), and the OptiX Metro 3100 and so on. The license for the trail management function must be provided. The OptiX 10G (Metro 5000) NE must have the AMXS, EMXS or ETXC board where the low order cross-connection protection pairs are created in U2000. The OptiX OSN 9500 NE must have the GXCL or EXCL board where the lower order cross-connection protection pairs are created in U2000. The available resources must be sufficient.

l l l l

Context
l A VC4 server trail is used only to carry services between the source and sink NEs, and cannot be used by any intermediate NEs. Hence, for the convenience of bandwidth use, VC4 server trails are usually created between two adjacent NEs, instead of between two NEs that have intermediate NEs. Before deleting a VC4 server trail, you need to delete its lower order trail. A VC4 server trail is used to carry the VC12 and VC3 trails between the NEs. Hence, when you create higher order services such as VC4 or VC4-Xc services, you need not create the VC4 server trail.

Procedure
Step 1 Choose Service > SDH Trail > Create SDH Trail from the Main Menu. Step 2 Set the service direction to Bidirectional and level to VC4 Server Trail. Step 3 Set the Service Domain, Resource Usage Strategy and Protection Priority Strategy parameters.
NOTE

Pay attention to the following points when setting the parameters: l Resource Usage Strategy defines the protection subnet resources or timeslots available during trail creation. The values are Protected Resource, Extra Resource and All Resource. l Protection Priority Strategy defines the protection subnet resources to be selected first during trail creation. The values are Trail Protection First, SNCP First and NP First.

Step 4 Double-click the source NE and the sink NE in turn. The automatically selected route is displayed between the NEs.
2-112 Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. Issue 02 (2010-09-24)

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

2 End-to-End RTN Management

Step 5 Optional: Specify the explicit link of the service. l l Click a server trail between the NEs to specify the included route. Click the trail again or click Cancel Route Restriction to cancel the selection. Click the Explicit Link tab. Right-click the blank area and choose Add from the shortcut menu. In the Add Explicit Link window displayed, you can search for the existing server trails and set them as the explicit links of the trails to be created. Click the Explicit Node tab. Double-click an NE of the subnet to specify the explicit NE of the route. This NE is shown as the icon. Double-click the NE again to cancel the selection. Click the Explicit Node tab. Right-click the blank area in the tab and choose Add from the shortcut menu. In the Add Explicit Node window displayed, you can search for the nodes and set them as the explicit nodes of the trails to be created. Double-click another NE in this subnet to specify the excluded nodes for the trail. The selected NE is marked with a sign. (Double-click the NE again to cancel the selection.) Click the Excluded Node tab. Right-click the blank area and choose Add from the shortcut menu. In the Add Excluded Node window displayed, you can search for the nodes and set them as the explicit nodes of the trails to be created.

Step 6 Optional: Specify the explicit node. l

Step 7 Optional: Specify the excluded node. l l

Step 8 Optional: Click Set Route Timeslot. The Set Route Timeslot dialog box is displayed. Select the timeslot and click OK.
NOTE

l If you do not assign the timeslot, the first available timeslot is selected automatically. l If multiple trails are selected, right-click them and choose Uniform Timeslot. U2000 consider the timeslot value of the trail in the first row as the datum value and modify the timeslot values of other trails to be consistent with the datum value. In this way, all trails use the same timeslot.

Step 9 Optional: Click the General Attributes tab and set the general attributes of the trail, such as the Name and Order No.. Step 10 Optional: If you do not want to activate the created trail when the configuration is issued to NEs, you can uncheck the Activate the trail check box.

Issue 02 (2010-09-24)

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

2-113

2 End-to-End RTN Management


NOTE

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

l If you activate a trail, the service configuration data of the trail is sent to the NE. l If you do not activate a trail, the service configuration data of the trail is stored at the NE layer on the U2000.

Step 11 Optional: If you want to create multiple trails with the same route, check the Copy after Creation check box. After the creation of the trail, a dialog box is displayed and you can copy the trail. Step 12 Click Apply. Step 13 Optional: If the creation is successful, click Browse Trail in the displayed dialog box. Then, you can view the trail on the interface. ----End

2.2.4.2 Creating an Unterminated Trunk Link


Before creating an unterminated EPL service, you need to create a server trail for the unterminated EPL service. An unterminated trunk link is the server trail of the unterminated EPL service. There are four types of paths for the unterminated trunk link: VC12 virtual concatenation, VC3 virtual concatenation, VC4 virtual concatenation, and VC4 adjacent concatenation.

Prerequisite
l l You must be an NM user with "network operator" authority or higher. The SDH trail at the corresponding level must be created. The source is the port of a data card and the sinks are the ports of N SDH line cards. N can be 1 or 2.

Procedure
Step 1 Choose Service > MSTP Trail > Create Unterminated Trunk Link from the Main Menu. Step 2 In the Bandwidth area, select the number and the types of the paths. Step 3 In the topology, double-click the terminated NE, or click Browse. The Select Board PortSource dialog box is displayed. Select boards and ports. Step 4 Click OK. The source information is displayed in the Source group box. Step 5 In the Existing Server Trail area, select a server trail. Step 6 Optional: Click Port Attribute. In the Port Attributes dialog box displayed, double-click the cells of each attribute to set the attributes. Use the default values unless otherwise requested. Step 7 Enter the information related to the Ethernet trails, such as Name, Order No..
NOTE

If the default values are used, you can skip this step.

Step 8 Optional: If you do not want to activate the created trail when the configuration is issued to NEs, you can uncheck the Activate the trail check box.
2-114 Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. Issue 02 (2010-09-24)

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management
NOTE

2 End-to-End RTN Management

l In the case of the active trail, the service configuration data is issued to the NE side. l In the case of the inactive trail, the service configuration data is saved at the U2000 side.

Step 9 Click Apply. The Operation Result dialog box is displayed. Click Close. ----End

2.2.4.3 Creating a Trunk Link


Before creating EPL, Unterminated EPL, EVPL and EPLAN trails, create a trunk link as the bearer trail.

Prerequisite
l l You must be an NM user with "network operator" authority or higher. The Ethernet processing board and the corresponding interface board must be installed.

Procedure
Step 1 Choose Service > MSTP Trail > Create Trunk Link from the Main Menu. Step 2 Set the Bandwidth parameter.

Step 3 Optional: Check the Auto Create Server Trail check box.
NOTE

l If you do not create an SDH trail, check the Auto Create Server Trail check box so that U2000 can create an SDH trail when creating the trunk link. If an SDH trail is already created, you can uncheck the Auto Create Server Trail check box. l To create a one-source and two-sink trunk link, you must create an SDH trail manually instead of selecting the Auto Create Server Trail check box. For details of the operations, see 2.1.9 Creating an SDH Trail Manually. l If the trunk link to be created is a server trail of an unterminated EPL trail, the following requirements must be met. l The sink of the trunk link must be terminated on the EOD board. l The sink of the server trail of this trunk link must be terminated on the same EOD board. l If the trunk link has a single source and double sinks, the source and sink boards of the SDH trail that is created manually must be the same as those of the trunk link. Additionally, the sink boards must be same EOD board.

Step 4 Set the Source and Sink. Click Browse to select the appropriate VCTRUNK ports.

Issue 02 (2010-09-24)

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

2-115

2 End-to-End RTN Management


NOTE

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

Pay attention to the following points when setting the parameters: l To create a one-source and two-sink trunk link, you need to set two VCTRUNK ports for Sink. The two VCTRUNK ports that are displayed in the user interface are separated by . l If the Auto Create Server Trail check box is checked in Step 3, select Bound Timeslot in addition to the VCTRUNK port. Otherwise you need to select the VCTRUNK port only. l You need to keep the bandwidth of the source or sink VCTRUNK consistent with the bandwidth setting in Step 2. l You can set the port attributes as need. Click Port Attribute. In the Port Attributes dialog box displayed, you can view the port information. You can edit TAG, Port Type, Mapping Protocol, Enabling LCAS, Port Enabled and Entry Detection. Click Apply to complete the settings of the port attributes.

Step 5 Optional: In Available Trail of the Server Layer Trail tab, select an appropriate lower order path trail as the server trail of the trunk link tail.
NOTE

If Step 3 is executed, skip this step.

Step 6 Optional: Complete the information for this trunk link in the General Attributes tab, such as Name, Order NO..
NOTE

If you want to use the default values, skip this step.

Step 7 Optional: If you do not want to activate the created trail when the configuration is issued to NEs, you can uncheck the Activate the trail check box.
NOTE

l If you activate the trail, service configuration data is sent to the NE. l If you do not activate the trail, the service configuration data is saved only in the U2000.

Step 8 Click Apply. A prompt is displayed, indicating that the operation is successful. Step 9 Click Close. ----End

2.2.4.4 Creating an Unterminated EPL Trail


When the planned sink of an EPL service is not located on a Huawei network, you need to create an unterminated EPL trail.

Prerequisite
l l You must be an NM user with "network operator" authority or higher. There must be the unterminated trunk links to carry the unterminated EPL service to be created. If the unterminated trunk link does not exist, see 2.2.4.2 Creating an Unterminated Trunk Link.

Context
NOTE

The server trail of an unterminated EPL service can be a terminated trunk link whose sink must be located on an EOD card.

2-116

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

Issue 02 (2010-09-24)

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

2 End-to-End RTN Management

Procedure
Step 1 Choose Service > MSTP Trail > Create Unterminated EPL from the Main Menu. Step 2 Select Port Usage Strategy for the source.
NOTE

Port Usage Strategy includes the following two types: l Port: configure an EPL service that is transmitted transparently. This strategy is applicable to the pointto-point communication usually. You cannot edit VLAN ID. l Port+VLAN: configure the Ethernet services that are converged. This strategy is applicable to the point-to-point, point-to-multipoint and inter-multipoint communication.

Step 3 Select the source of the unterminated service. In the topology, double-click the source NE, or click Browse. The Select Board Port-Source dialog box is displayed. Select boards and ports. Step 4 Click OK. In the Existing Server Trail area, select the server trail available. Step 5 Click Next to set other attributes. Step 6 Optional: In the Port Attribute Setting group box, double-click the cells to set the port attributes as required. Step 7 Enter the information related to the Ethernet trails, such as Name, Order No..
NOTE

If the default values are used, you can skip this step.

Step 8 Optional: If you do not want to activate the created trail when the configuration is issued to NEs, you can uncheck the Activate the trail check box.
NOTE

l In the case of the active trail, the service configuration data is issued to the NE side. l In the case of the inactive trail, the service configuration data is saved at the U2000 side.

Step 9 Click Finish and the Operation Result dialog box is displayed. Click Close. ----End

2.2.4.5 Verifying Ethernet Services


After you configure Ethernet services, you need to verify whether service channels are available.

Prerequisite
The Ethernet service must be created and activated.

Procedure
l For the boards (such as N1EMS4) that support Ethernet OAM, use the Ethernet OAM function to verify the Ethernet services. For details, refer to: 2.2.9.1 Ethernet OAM 2.2.9.2 Creating MPs 2.2.9.3 Performing a CC Check 2.2.9.4 Performing an LB Check
Issue 02 (2010-09-24) Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. 2-117

2 End-to-End RTN Management

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

2.2.9.5 Performing an LT Check 2.2.9.6 Performing a Ping Test 2.2.9.7 Performing Performance Detection l For the boards (such as N1EFS0) that do not support Ethernet OAM, use the ping command to verify the Ethernet services. 1. 2. At the source end and then the sink end of the service, use a crossover cable to connect the port on the Ethernet board and a computer. Set the IP addresses of the two computers and ensure they are in the same network segment.
NOTE

l Do not set the IP address to the 127.0.0.0 loopback address. l Before you verify the Port+VLAN services, set the port type of the external port of the Ethernet board that is connected to the computer to Access.

3. ----End

Use the ping command on one computer to ping the other computer. Run the command ping x.x.x.x -n 60. If no packet is lost, it indicates that the channel is available.

2.2.5 Configuring EVPL Services


You can use the trail function to configure EVPL services. 2.2.5.1 Creating a VC4 Server Trail A VC4 server trail is used to carry the VC12 and VC3 trails between the NEs. Before creating a VC12 or VC3 trail, you need to create a VC4 server trail between the NEs. 2.2.5.2 Creating a Trunk Link Before creating EPL, Unterminated EPL, EVPL and EPLAN trails, create a trunk link as the bearer trail. 2.2.5.3 Creating an EVPL Trail You can create an EVPL trail. 2.2.5.4 Verifying Ethernet Services After you configure Ethernet services, you need to verify whether service channels are available.

2.2.5.1 Creating a VC4 Server Trail


A VC4 server trail is used to carry the VC12 and VC3 trails between the NEs. Before creating a VC12 or VC3 trail, you need to create a VC4 server trail between the NEs.

Prerequisite
l l You must be an NM user with "network operator" authority or higher. A protection subnet must be created for release 4.0 NEs, including the OptiX 155/622H (Metro 1000), the OptiX 155/622, the OptiX 2500+ (Metro 3000), and the OptiX Metro 3100 and so on. The license for the trail management function must be provided. The OptiX 10G (Metro 5000) NE must have the AMXS, EMXS or ETXC board where the low order cross-connection protection pairs are created in U2000.
Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. Issue 02 (2010-09-24)

l l

2-118

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

2 End-to-End RTN Management

l l

The OptiX OSN 9500 NE must have the GXCL or EXCL board where the lower order cross-connection protection pairs are created in U2000. The available resources must be sufficient.

Context
l A VC4 server trail is used only to carry services between the source and sink NEs, and cannot be used by any intermediate NEs. Hence, for the convenience of bandwidth use, VC4 server trails are usually created between two adjacent NEs, instead of between two NEs that have intermediate NEs. Before deleting a VC4 server trail, you need to delete its lower order trail. A VC4 server trail is used to carry the VC12 and VC3 trails between the NEs. Hence, when you create higher order services such as VC4 or VC4-Xc services, you need not create the VC4 server trail.

Procedure
Step 1 Choose Service > SDH Trail > Create SDH Trail from the Main Menu. Step 2 Set the service direction to Bidirectional and level to VC4 Server Trail. Step 3 Set the Service Domain, Resource Usage Strategy and Protection Priority Strategy parameters.
NOTE

Pay attention to the following points when setting the parameters: l Resource Usage Strategy defines the protection subnet resources or timeslots available during trail creation. The values are Protected Resource, Extra Resource and All Resource. l Protection Priority Strategy defines the protection subnet resources to be selected first during trail creation. The values are Trail Protection First, SNCP First and NP First.

Step 4 Double-click the source NE and the sink NE in turn. The automatically selected route is displayed between the NEs.

Step 5 Optional: Specify the explicit link of the service. l l Click a server trail between the NEs to specify the included route. Click the trail again or click Cancel Route Restriction to cancel the selection. Click the Explicit Link tab. Right-click the blank area and choose Add from the shortcut menu. In the Add Explicit Link window displayed, you can search for the existing server trails and set them as the explicit links of the trails to be created.
Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. 2-119

Issue 02 (2010-09-24)

2 End-to-End RTN Management

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

Step 6 Optional: Specify the explicit node. l Click the Explicit Node tab. Double-click an NE of the subnet to specify the explicit NE of the route. This NE is shown as the icon. Double-click the NE again to cancel the selection. Click the Explicit Node tab. Right-click the blank area in the tab and choose Add from the shortcut menu. In the Add Explicit Node window displayed, you can search for the nodes and set them as the explicit nodes of the trails to be created. Double-click another NE in this subnet to specify the excluded nodes for the trail. The selected NE is marked with a sign. (Double-click the NE again to cancel the selection.) Click the Excluded Node tab. Right-click the blank area and choose Add from the shortcut menu. In the Add Excluded Node window displayed, you can search for the nodes and set them as the explicit nodes of the trails to be created.

Step 7 Optional: Specify the excluded node. l l

Step 8 Optional: Click Set Route Timeslot. The Set Route Timeslot dialog box is displayed. Select the timeslot and click OK.
NOTE

l If you do not assign the timeslot, the first available timeslot is selected automatically. l If multiple trails are selected, right-click them and choose Uniform Timeslot. U2000 consider the timeslot value of the trail in the first row as the datum value and modify the timeslot values of other trails to be consistent with the datum value. In this way, all trails use the same timeslot.

Step 9 Optional: Click the General Attributes tab and set the general attributes of the trail, such as the Name and Order No.. Step 10 Optional: If you do not want to activate the created trail when the configuration is issued to NEs, you can uncheck the Activate the trail check box.
NOTE

l If you activate a trail, the service configuration data of the trail is sent to the NE. l If you do not activate a trail, the service configuration data of the trail is stored at the NE layer on the U2000.

Step 11 Optional: If you want to create multiple trails with the same route, check the Copy after Creation check box. After the creation of the trail, a dialog box is displayed and you can copy the trail. Step 12 Click Apply. Step 13 Optional: If the creation is successful, click Browse Trail in the displayed dialog box. Then, you can view the trail on the interface. ----End

2.2.5.2 Creating a Trunk Link


Before creating EPL, Unterminated EPL, EVPL and EPLAN trails, create a trunk link as the bearer trail.

Prerequisite
l l
2-120

You must be an NM user with "network operator" authority or higher. The Ethernet processing board and the corresponding interface board must be installed.
Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. Issue 02 (2010-09-24)

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

2 End-to-End RTN Management

Procedure
Step 1 Choose Service > MSTP Trail > Create Trunk Link from the Main Menu. Step 2 Set the Bandwidth parameter.

Step 3 Optional: Check the Auto Create Server Trail check box.
NOTE

l If you do not create an SDH trail, check the Auto Create Server Trail check box so that U2000 can create an SDH trail when creating the trunk link. If an SDH trail is already created, you can uncheck the Auto Create Server Trail check box. l To create a one-source and two-sink trunk link, you must create an SDH trail manually instead of selecting the Auto Create Server Trail check box. For details of the operations, see 2.1.9 Creating an SDH Trail Manually. l If the trunk link to be created is a server trail of an unterminated EPL trail, the following requirements must be met. l The sink of the trunk link must be terminated on the EOD board. l The sink of the server trail of this trunk link must be terminated on the same EOD board. l If the trunk link has a single source and double sinks, the source and sink boards of the SDH trail that is created manually must be the same as those of the trunk link. Additionally, the sink boards must be same EOD board.

Step 4 Set the Source and Sink. Click Browse to select the appropriate VCTRUNK ports.
NOTE

Pay attention to the following points when setting the parameters: l To create a one-source and two-sink trunk link, you need to set two VCTRUNK ports for Sink. The two VCTRUNK ports that are displayed in the user interface are separated by . l If the Auto Create Server Trail check box is checked in Step 3, select Bound Timeslot in addition to the VCTRUNK port. Otherwise you need to select the VCTRUNK port only. l You need to keep the bandwidth of the source or sink VCTRUNK consistent with the bandwidth setting in Step 2. l You can set the port attributes as need. Click Port Attribute. In the Port Attributes dialog box displayed, you can view the port information. You can edit TAG, Port Type, Mapping Protocol, Enabling LCAS, Port Enabled and Entry Detection. Click Apply to complete the settings of the port attributes.

Step 5 Optional: In Available Trail of the Server Layer Trail tab, select an appropriate lower order path trail as the server trail of the trunk link tail.
NOTE

If Step 3 is executed, skip this step.

Step 6 Optional: Complete the information for this trunk link in the General Attributes tab, such as Name, Order NO..
NOTE

If you want to use the default values, skip this step.

Step 7 Optional: If you do not want to activate the created trail when the configuration is issued to NEs, you can uncheck the Activate the trail check box.
Issue 02 (2010-09-24) Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. 2-121

2 End-to-End RTN Management


NOTE

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

l If you activate the trail, service configuration data is sent to the NE. l If you do not activate the trail, the service configuration data is saved only in the U2000.

Step 8 Click Apply. A prompt is displayed, indicating that the operation is successful. Step 9 Click Close. ----End

2.2.5.3 Creating an EVPL Trail


You can create an EVPL trail.

Prerequisite
l l l You must be an NM user with "network operator" authority or higher.. A trunk link must be created. The Ethernet processing board and the corresponding interface board must be installed.

Procedure
Step 1 Choose Service > MSTP Trail > Create EVPL from the Main Menu. Step 2 Set the EVPL source and sink. Select Port Usage Strategy for the source and sink.
NOTE

The Port Usage Strategy parameter has the following three values: l PORT: Use this strategy to configure transparent transmission of the EVPL service. This strategy usually applies to point-to-point communication. The VLAN ID cannot be edited. l PORT+VLAN: Use this strategy to configure convergence of the EVPL service. This strategy applies to point-to-point, point-to-multipoint communication, and communication among multiple points. l PORT+MPLS: Configure port-shared EPL services that are distinguished by MPLS labels.

Step 3 Click Browse to select the appropriate PORT port. If the value of Port Usage Strategy is PORT +VLAN, the VLAN ID must be set. If the value of Port Usage Strategy is PORT+MPLS, the tunnel flag must be set.
NOTE

When you set Port Usage Strategy to PORT+VLAN, you can create multiple VLANs at a time. When setting VLAN IDs, note that the sign - indicates several consecutive VLAN IDs and the sign , separates two VLAN IDs. For example, 1-3,6,8-10 indicates the following VLAN IDs: 1,2,3,6,8,9,10.

Step 4 Set the trunk link. Select the route strategy for the trunk link, and perform the next operation. l l Strategy 1: Create the trunk link automatically. Set the bandwidth of the trunk link and click Next. Strategy 2: Create a trunk link manually. Click Next to create the trunk link. The default value of the trunk link route strategy is Using Existing Trunk Link. Select the created trunk link and click Next. Strategy 3: Use the existing trunk link. Select an existing trunk link trail and click Next.

2-122

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

Issue 02 (2010-09-24)

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management
NOTE

2 End-to-End RTN Management

Pay attention to the following points when setting the parameters: l The route strategy for the trunk link depends on the application in practice. Usually it is recommended that you create a trunk link first, and then create an Ethernet trail. Hence, Use Existing Trunk Link is the default value. l Create Trunk Link Manually and Create Trunk Link Automatically are often used for service expansion. In the former one, the source and sink of the trunk link need to be specified manually, but the timeslot allocation can be controlled manually. In the latter one, the source and sink of the trunk link can be specified automatically, but the timeslot allocation cannot be controlled manually.

Step 5 Set the port attributes. Set the TAG, Port Type, Encapsulation Format, Enabling LCAS, Mapping Protocol, Port Enabled and Entry Detection parameters in Port Attribute Setting.

Step 6 Optional: Complete the information for this EVPL trail, such as Name and Order No..
NOTE

If you want to use the default values, skip this step.

Step 7 Optional: If you do not want to activate the created trail when the configuration is issued to NEs, you can uncheck the Activate the trail check box.
NOTE

l If you activate a trail, the service configuration data of the trail is sent to the NE. l If you do not activate a trail, the service configuration data of the trail is stored at the NE layer on the U2000.

Step 8 Click Finish. A prompt is displayed, indicating that the operation is successful. ----End

2.2.5.4 Verifying Ethernet Services


After you configure Ethernet services, you need to verify whether service channels are available.

Prerequisite
The Ethernet service must be created and activated.

Procedure
l For the boards (such as N1EMS4) that support Ethernet OAM, use the Ethernet OAM function to verify the Ethernet services. For details, refer to: 2.2.9.1 Ethernet OAM 2.2.9.2 Creating MPs 2.2.9.3 Performing a CC Check
Issue 02 (2010-09-24) Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. 2-123

2 End-to-End RTN Management

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

2.2.9.4 Performing an LB Check 2.2.9.5 Performing an LT Check 2.2.9.6 Performing a Ping Test 2.2.9.7 Performing Performance Detection l For the boards (such as N1EFS0) that do not support Ethernet OAM, use the ping command to verify the Ethernet services. 1. 2. At the source end and then the sink end of the service, use a crossover cable to connect the port on the Ethernet board and a computer. Set the IP addresses of the two computers and ensure they are in the same network segment.
NOTE

l Do not set the IP address to the 127.0.0.0 loopback address. l Before you verify the Port+VLAN services, set the port type of the external port of the Ethernet board that is connected to the computer to Access.

3. ----End

Use the ping command on one computer to ping the other computer. Run the command ping x.x.x.x -n 60. If no packet is lost, it indicates that the channel is available.

2.2.6 Configuring EPLAN Service


You can use the trail function to configure EPLAN services. 2.2.6.1 Creating a VC4 Server Trail A VC4 server trail is used to carry the VC12 and VC3 trails between the NEs. Before creating a VC12 or VC3 trail, you need to create a VC4 server trail between the NEs. 2.2.6.2 Creating a Trunk Link Before creating EPL, Unterminated EPL, EVPL and EPLAN trails, create a trunk link as the bearer trail. 2.2.6.3 Creating an EPLAN Trail You can create an EPLAN trail. 2.2.6.4 Adjusting VB Mount Ports in an EPLAN By adjusting the VB mount ports for each EPLAN node, you can reallocate Ethernet service ports, so that the accessed Ethernet services can be changed without changing the structure of the whole EPLAN. 2.2.6.5 Verifying Ethernet Services After you configure Ethernet services, you need to verify whether service channels are available.

2.2.6.1 Creating a VC4 Server Trail


A VC4 server trail is used to carry the VC12 and VC3 trails between the NEs. Before creating a VC12 or VC3 trail, you need to create a VC4 server trail between the NEs.

Prerequisite
l
2-124

You must be an NM user with "network operator" authority or higher.


Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. Issue 02 (2010-09-24)

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

2 End-to-End RTN Management

A protection subnet must be created for release 4.0 NEs, including the OptiX 155/622H (Metro 1000), the OptiX 155/622, the OptiX 2500+ (Metro 3000), and the OptiX Metro 3100 and so on. The license for the trail management function must be provided. The OptiX 10G (Metro 5000) NE must have the AMXS, EMXS or ETXC board where the low order cross-connection protection pairs are created in U2000. The OptiX OSN 9500 NE must have the GXCL or EXCL board where the lower order cross-connection protection pairs are created in U2000. The available resources must be sufficient.

l l l l

Context
l A VC4 server trail is used only to carry services between the source and sink NEs, and cannot be used by any intermediate NEs. Hence, for the convenience of bandwidth use, VC4 server trails are usually created between two adjacent NEs, instead of between two NEs that have intermediate NEs. Before deleting a VC4 server trail, you need to delete its lower order trail. A VC4 server trail is used to carry the VC12 and VC3 trails between the NEs. Hence, when you create higher order services such as VC4 or VC4-Xc services, you need not create the VC4 server trail.

Procedure
Step 1 Choose Service > SDH Trail > Create SDH Trail from the Main Menu. Step 2 Set the service direction to Bidirectional and level to VC4 Server Trail. Step 3 Set the Service Domain, Resource Usage Strategy and Protection Priority Strategy parameters.
NOTE

Pay attention to the following points when setting the parameters: l Resource Usage Strategy defines the protection subnet resources or timeslots available during trail creation. The values are Protected Resource, Extra Resource and All Resource. l Protection Priority Strategy defines the protection subnet resources to be selected first during trail creation. The values are Trail Protection First, SNCP First and NP First.

Step 4 Double-click the source NE and the sink NE in turn. The automatically selected route is displayed between the NEs.

Issue 02 (2010-09-24)

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

2-125

2 End-to-End RTN Management

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

Step 5 Optional: Specify the explicit link of the service. l l Click a server trail between the NEs to specify the included route. Click the trail again or click Cancel Route Restriction to cancel the selection. Click the Explicit Link tab. Right-click the blank area and choose Add from the shortcut menu. In the Add Explicit Link window displayed, you can search for the existing server trails and set them as the explicit links of the trails to be created.

Step 6 Optional: Specify the explicit node. l Click the Explicit Node tab. Double-click an NE of the subnet to specify the explicit NE of the route. This NE is shown as the icon. Double-click the NE again to cancel the selection. Click the Explicit Node tab. Right-click the blank area in the tab and choose Add from the shortcut menu. In the Add Explicit Node window displayed, you can search for the nodes and set them as the explicit nodes of the trails to be created.

Step 7 Optional: Specify the excluded node. l l Double-click another NE in this subnet to specify the excluded nodes for the trail. The selected NE is marked with a sign. (Double-click the NE again to cancel the selection.) Click the Excluded Node tab. Right-click the blank area and choose Add from the shortcut menu. In the Add Excluded Node window displayed, you can search for the nodes and set them as the explicit nodes of the trails to be created.

Step 8 Optional: Click Set Route Timeslot. The Set Route Timeslot dialog box is displayed. Select the timeslot and click OK.
NOTE

l If you do not assign the timeslot, the first available timeslot is selected automatically. l If multiple trails are selected, right-click them and choose Uniform Timeslot. U2000 consider the timeslot value of the trail in the first row as the datum value and modify the timeslot values of other trails to be consistent with the datum value. In this way, all trails use the same timeslot.

Step 9 Optional: Click the General Attributes tab and set the general attributes of the trail, such as the Name and Order No.. Step 10 Optional: If you do not want to activate the created trail when the configuration is issued to NEs, you can uncheck the Activate the trail check box.
NOTE

l If you activate a trail, the service configuration data of the trail is sent to the NE. l If you do not activate a trail, the service configuration data of the trail is stored at the NE layer on the U2000.

Step 11 Optional: If you want to create multiple trails with the same route, check the Copy after Creation check box. After the creation of the trail, a dialog box is displayed and you can copy the trail. Step 12 Click Apply. Step 13 Optional: If the creation is successful, click Browse Trail in the displayed dialog box. Then, you can view the trail on the interface. ----End

2-126

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

Issue 02 (2010-09-24)

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

2 End-to-End RTN Management

2.2.6.2 Creating a Trunk Link


Before creating EPL, Unterminated EPL, EVPL and EPLAN trails, create a trunk link as the bearer trail.

Prerequisite
l l You must be an NM user with "network operator" authority or higher. The Ethernet processing board and the corresponding interface board must be installed.

Procedure
Step 1 Choose Service > MSTP Trail > Create Trunk Link from the Main Menu. Step 2 Set the Bandwidth parameter.

Step 3 Optional: Check the Auto Create Server Trail check box.
NOTE

l If you do not create an SDH trail, check the Auto Create Server Trail check box so that U2000 can create an SDH trail when creating the trunk link. If an SDH trail is already created, you can uncheck the Auto Create Server Trail check box. l To create a one-source and two-sink trunk link, you must create an SDH trail manually instead of selecting the Auto Create Server Trail check box. For details of the operations, see 2.1.9 Creating an SDH Trail Manually. l If the trunk link to be created is a server trail of an unterminated EPL trail, the following requirements must be met. l The sink of the trunk link must be terminated on the EOD board. l The sink of the server trail of this trunk link must be terminated on the same EOD board. l If the trunk link has a single source and double sinks, the source and sink boards of the SDH trail that is created manually must be the same as those of the trunk link. Additionally, the sink boards must be same EOD board.

Step 4 Set the Source and Sink. Click Browse to select the appropriate VCTRUNK ports.
NOTE

Pay attention to the following points when setting the parameters: l To create a one-source and two-sink trunk link, you need to set two VCTRUNK ports for Sink. The two VCTRUNK ports that are displayed in the user interface are separated by . l If the Auto Create Server Trail check box is checked in Step 3, select Bound Timeslot in addition to the VCTRUNK port. Otherwise you need to select the VCTRUNK port only. l You need to keep the bandwidth of the source or sink VCTRUNK consistent with the bandwidth setting in Step 2. l You can set the port attributes as need. Click Port Attribute. In the Port Attributes dialog box displayed, you can view the port information. You can edit TAG, Port Type, Mapping Protocol, Enabling LCAS, Port Enabled and Entry Detection. Click Apply to complete the settings of the port attributes.

Step 5 Optional: In Available Trail of the Server Layer Trail tab, select an appropriate lower order path trail as the server trail of the trunk link tail.
Issue 02 (2010-09-24) Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. 2-127

2 End-to-End RTN Management


NOTE

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

If Step 3 is executed, skip this step.

Step 6 Optional: Complete the information for this trunk link in the General Attributes tab, such as Name, Order NO..
NOTE

If you want to use the default values, skip this step.

Step 7 Optional: If you do not want to activate the created trail when the configuration is issued to NEs, you can uncheck the Activate the trail check box.
NOTE

l If you activate the trail, service configuration data is sent to the NE. l If you do not activate the trail, the service configuration data is saved only in the U2000.

Step 8 Click Apply. A prompt is displayed, indicating that the operation is successful. Step 9 Click Close. ----End

2.2.6.3 Creating an EPLAN Trail


You can create an EPLAN trail.

Prerequisite
l l l l You must be an NM user with "network operator" authority or higher.. A trunk link must be created. Before adding a VB node to an EPLAN trail, you must create a trunk link between a port of the new node and a port of the EPLAN trail. The Ethernet processing board and the corresponding interface board must be installed.

Context
The U2000 does not use an existing VB even if this VB is not used by another trail and is the same as the VB to be created, that is, the mounted ports are the same. Besides the EPLAN service described 2.2.1.2 Ethernet Services, you can also create the EPLAN service as shown in Figure 2-26. The VB1 and VB2 that are located on the two Ethernet boards on NE3 are added to the trail at a time. The two VBs are connected by using the mono nodal trunk link, which is not provided in the figure.

2-128

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

Issue 02 (2010-09-24)

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

2 End-to-End RTN Management

Figure 2-26 EPLAN between different boards on an NE


A3 A4

PORT1

NE3 VB1 VB2

PORT2

VCTRUNK1

VCTRUNK2 VB1 VCTRUNK1 PORT1 A1 NE1 VCTRUNK1 VB1 NE2 PORT1 A2

Procedure
Step 1 Choose Service > MSTP Trail > Create EPLAN from the Main Menu. Step 2 Double-click an NE in the topology. The Select Board Port dialog box is displayed. Step 3 Select a board in Slot Layout. Select appropriate ports in Available Timeslots/Port and click the double-right-arrow button. Click OK.

Issue 02 (2010-09-24)

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

2-129

2 End-to-End RTN Management


NOTE

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

To create the service as shown in Figure 2-26, you need to select the board and port where the VB1 is located on NE3, right-click, and then choose Select Board Port from the shortcut menu. In the dialog box displayed, select the board and port where the VB2 is located on NE3.

Step 4 Repeat Steps 2 and 3 to select ports on other NEs. Step 5 Set the trunk link. Select the route strategy for the trunk link, and perform the next operation. l Strategy 1: Create a trunk link manually. Click Next to create the trunk link. After it is created, click Next. The default value of the trunk link route strategy is Using Existing Trunk Link. Select the created trunk link and click Next. Strategy 2: Use the existing trunk link. Select an existing trunk link and click Next.
NOTE

Pay attention to the following points when setting the parameters: l The route strategy for the trunk link depends on the application in practice. It is recommended that you create the trunk link trail first, and then create the Ethernet trail. Hence, Use Existing Trunk Link is the default value. l Create Trunk Link Manually is often used for service expansion. l To create the service as shown in Figure 2-26, you need to create a trunk link whose source and sink are the ports of VB1 and VB2 on NE3.

Step 6 Set port attributes for all ports on the Ethernet trail, such as TAG, Mapping Protocol, Port Enabled, Enabling LCAS and Entry Detection.

Step 7 Create VLAN. Click Add in VLAN Configuration. The VLAN Configuration for Ethernet Trail dialog box is displayed.
NOTE

The VLAN can only be created on the port where the Bridge Switch Mode is set to IVL/Ingress Filter Enable(VB).

Step 8 Enter VLAN ID. Select appropriate mounted ports in the Available Mounted Ports pane, and click .

Step 9 Click OK or Apply. Repeat Steps 7 through 9 to create more VLANs. Step 10 Click Next. Enter the information related to the EPLAN trail, such as Name and Order No..
NOTE

If the default values are used, you can skip this step.

Step 11 Optional: If you do not want to activate the created trail when the configuration is issued to NEs, you can uncheck the Activate the trail check box.
NOTE

l If you activate a trail, the service configuration data of the trail is sent to the NE. l If you do not activate a trail, the service configuration data of the trail is stored at the NE layer on the U2000.

2-130

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

Issue 02 (2010-09-24)

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

2 End-to-End RTN Management

Step 12 Click Finish. A prompt appears is displayed, indicating that the operation is successful. ----End

2.2.6.4 Adjusting VB Mount Ports in an EPLAN


By adjusting the VB mount ports for each EPLAN node, you can reallocate Ethernet service ports, so that the accessed Ethernet services can be changed without changing the structure of the whole EPLAN.

Prerequisite
l l You must be an NM user with "network operator" authority or higher. The EPLAN trail must be created.

Context

CAUTION
To delete a port mounted to the VB, make sure that it does not belong to any VLAN filtering table. Otherwise, the deletion fails.

Procedure
l Adding a VB Mount Port 1. 2. 3. Choose Service > MSTP Trail > Manage Ethernet Trail from the Main Menu. Select filter criteria. After the filtering is complete, select a trail in the Ethernet trail list and click the Node tab. Right-click an appropriate node in the node list and choose Configure VB attached port from the shortcut menu. The VB Configuration for Ethernet Trail dialog box is displayed.

4.

Select an appropriate port from the Available Mounted Ports pane and click Click OK.
Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

Issue 02 (2010-09-24)

2-131

2 End-to-End RTN Management

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

5. l

Repeat Steps 1 to step 4 to add VB mount ports for other nodes as required.
NOTE

Deleting a VB Mount Port


To delete a mounted port, make sure that it is not a forwarding port of any VLAN filtering table.

1.

In the NE Explorer, select the Ethernet board used for the EPLAN, and choose Configuration > Ethernet Service > Ethernet LAN Service from the Function Tree. Click the VLAN Filtering tab. Check whether the port is included in any VLAN filtering table. If the port is included, select the VLAN and click Modify to delete the port from the VLAN filtering table. Choose Trail > Ethernet Trail Management. Select the EPLAN trail from the Ethernet trail list and then click the Node tab. Right-click an appropriate node in the node list and choose Configure VB attached port from the shortcut menu. The VB Configuration for Ethernet Trail dialog box is displayed.

2. 3. 4.

5. 6. ----End

Select an appropriate port from the Selected Mounted Ports pane and click Click OK. Repeat Steps 1 through 6 to delete the mounted ports for other nodes.

2.2.6.5 Verifying Ethernet Services


After you configure Ethernet services, you need to verify whether service channels are available.

Prerequisite
The Ethernet service must be created and activated.

Procedure
l For the boards (such as N1EMS4) that support Ethernet OAM, use the Ethernet OAM function to verify the Ethernet services. For details, refer to: 2.2.9.1 Ethernet OAM
2-132 Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. Issue 02 (2010-09-24)

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

2 End-to-End RTN Management

2.2.9.2 Creating MPs 2.2.9.3 Performing a CC Check 2.2.9.4 Performing an LB Check 2.2.9.5 Performing an LT Check 2.2.9.6 Performing a Ping Test 2.2.9.7 Performing Performance Detection l For the boards (such as N1EFS0) that do not support Ethernet OAM, use the ping command to verify the Ethernet services. 1. 2. At the source end and then the sink end of the service, use a crossover cable to connect the port on the Ethernet board and a computer. Set the IP addresses of the two computers and ensure they are in the same network segment.
NOTE

l Do not set the IP address to the 127.0.0.0 loopback address. l Before you verify the Port+VLAN services, set the port type of the external port of the Ethernet board that is connected to the computer to Access.

3. ----End

Use the ping command on one computer to ping the other computer. Run the command ping x.x.x.x -n 60. If no packet is lost, it indicates that the channel is available.

2.2.7 Configuring EVPL (QinQ) Service


You can use the trail function to configure EVPL (QinQ) services. 2.2.7.1 Creating a VC4 Server Trail A VC4 server trail is used to carry the VC12 and VC3 trails between the NEs. Before creating a VC12 or VC3 trail, you need to create a VC4 server trail between the NEs. 2.2.7.2 Creating a Trunk Link Before creating EPL, Unterminated EPL, EVPL and EPLAN trails, create a trunk link as the bearer trail. 2.2.7.3 Creating an EVPL (QinQ) Trail You can create an EVPL (QinQ) trail. 2.2.7.4 Verifying Ethernet Services After you configure Ethernet services, you need to verify whether service channels are available.

2.2.7.1 Creating a VC4 Server Trail


A VC4 server trail is used to carry the VC12 and VC3 trails between the NEs. Before creating a VC12 or VC3 trail, you need to create a VC4 server trail between the NEs.

Prerequisite
l l You must be an NM user with "network operator" authority or higher. A protection subnet must be created for release 4.0 NEs, including the OptiX 155/622H (Metro 1000), the OptiX 155/622, the OptiX 2500+ (Metro 3000), and the OptiX Metro 3100 and so on.
Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. 2-133

Issue 02 (2010-09-24)

2 End-to-End RTN Management

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

l l l l

The license for the trail management function must be provided. The OptiX 10G (Metro 5000) NE must have the AMXS, EMXS or ETXC board where the low order cross-connection protection pairs are created in U2000. The OptiX OSN 9500 NE must have the GXCL or EXCL board where the lower order cross-connection protection pairs are created in U2000. The available resources must be sufficient.

Context
l A VC4 server trail is used only to carry services between the source and sink NEs, and cannot be used by any intermediate NEs. Hence, for the convenience of bandwidth use, VC4 server trails are usually created between two adjacent NEs, instead of between two NEs that have intermediate NEs. Before deleting a VC4 server trail, you need to delete its lower order trail. A VC4 server trail is used to carry the VC12 and VC3 trails between the NEs. Hence, when you create higher order services such as VC4 or VC4-Xc services, you need not create the VC4 server trail.

Procedure
Step 1 Choose Service > SDH Trail > Create SDH Trail from the Main Menu. Step 2 Set the service direction to Bidirectional and level to VC4 Server Trail. Step 3 Set the Service Domain, Resource Usage Strategy and Protection Priority Strategy parameters.
NOTE

Pay attention to the following points when setting the parameters: l Resource Usage Strategy defines the protection subnet resources or timeslots available during trail creation. The values are Protected Resource, Extra Resource and All Resource. l Protection Priority Strategy defines the protection subnet resources to be selected first during trail creation. The values are Trail Protection First, SNCP First and NP First.

Step 4 Double-click the source NE and the sink NE in turn. The automatically selected route is displayed between the NEs.

Step 5 Optional: Specify the explicit link of the service. l Click a server trail between the NEs to specify the included route. Click the trail again or click Cancel Route Restriction to cancel the selection.
Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. Issue 02 (2010-09-24)

2-134

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

2 End-to-End RTN Management

Click the Explicit Link tab. Right-click the blank area and choose Add from the shortcut menu. In the Add Explicit Link window displayed, you can search for the existing server trails and set them as the explicit links of the trails to be created.

Step 6 Optional: Specify the explicit node. l Click the Explicit Node tab. Double-click an NE of the subnet to specify the explicit NE of the route. This NE is shown as the icon. Double-click the NE again to cancel the selection. Click the Explicit Node tab. Right-click the blank area in the tab and choose Add from the shortcut menu. In the Add Explicit Node window displayed, you can search for the nodes and set them as the explicit nodes of the trails to be created.

Step 7 Optional: Specify the excluded node. l l Double-click another NE in this subnet to specify the excluded nodes for the trail. The selected NE is marked with a sign. (Double-click the NE again to cancel the selection.) Click the Excluded Node tab. Right-click the blank area and choose Add from the shortcut menu. In the Add Excluded Node window displayed, you can search for the nodes and set them as the explicit nodes of the trails to be created.

Step 8 Optional: Click Set Route Timeslot. The Set Route Timeslot dialog box is displayed. Select the timeslot and click OK.
NOTE

l If you do not assign the timeslot, the first available timeslot is selected automatically. l If multiple trails are selected, right-click them and choose Uniform Timeslot. U2000 consider the timeslot value of the trail in the first row as the datum value and modify the timeslot values of other trails to be consistent with the datum value. In this way, all trails use the same timeslot.

Step 9 Optional: Click the General Attributes tab and set the general attributes of the trail, such as the Name and Order No.. Step 10 Optional: If you do not want to activate the created trail when the configuration is issued to NEs, you can uncheck the Activate the trail check box.
NOTE

l If you activate a trail, the service configuration data of the trail is sent to the NE. l If you do not activate a trail, the service configuration data of the trail is stored at the NE layer on the U2000.

Step 11 Optional: If you want to create multiple trails with the same route, check the Copy after Creation check box. After the creation of the trail, a dialog box is displayed and you can copy the trail. Step 12 Click Apply. Step 13 Optional: If the creation is successful, click Browse Trail in the displayed dialog box. Then, you can view the trail on the interface. ----End

2.2.7.2 Creating a Trunk Link


Before creating EPL, Unterminated EPL, EVPL and EPLAN trails, create a trunk link as the bearer trail.
Issue 02 (2010-09-24) Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. 2-135

2 End-to-End RTN Management

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

Prerequisite
l l You must be an NM user with "network operator" authority or higher. The Ethernet processing board and the corresponding interface board must be installed.

Procedure
Step 1 Choose Service > MSTP Trail > Create Trunk Link from the Main Menu. Step 2 Set the Bandwidth parameter.

Step 3 Optional: Check the Auto Create Server Trail check box.
NOTE

l If you do not create an SDH trail, check the Auto Create Server Trail check box so that U2000 can create an SDH trail when creating the trunk link. If an SDH trail is already created, you can uncheck the Auto Create Server Trail check box. l To create a one-source and two-sink trunk link, you must create an SDH trail manually instead of selecting the Auto Create Server Trail check box. For details of the operations, see 2.1.9 Creating an SDH Trail Manually. l If the trunk link to be created is a server trail of an unterminated EPL trail, the following requirements must be met. l The sink of the trunk link must be terminated on the EOD board. l The sink of the server trail of this trunk link must be terminated on the same EOD board. l If the trunk link has a single source and double sinks, the source and sink boards of the SDH trail that is created manually must be the same as those of the trunk link. Additionally, the sink boards must be same EOD board.

Step 4 Set the Source and Sink. Click Browse to select the appropriate VCTRUNK ports.
NOTE

Pay attention to the following points when setting the parameters: l To create a one-source and two-sink trunk link, you need to set two VCTRUNK ports for Sink. The two VCTRUNK ports that are displayed in the user interface are separated by . l If the Auto Create Server Trail check box is checked in Step 3, select Bound Timeslot in addition to the VCTRUNK port. Otherwise you need to select the VCTRUNK port only. l You need to keep the bandwidth of the source or sink VCTRUNK consistent with the bandwidth setting in Step 2. l You can set the port attributes as need. Click Port Attribute. In the Port Attributes dialog box displayed, you can view the port information. You can edit TAG, Port Type, Mapping Protocol, Enabling LCAS, Port Enabled and Entry Detection. Click Apply to complete the settings of the port attributes.

Step 5 Optional: In Available Trail of the Server Layer Trail tab, select an appropriate lower order path trail as the server trail of the trunk link tail.
NOTE

If Step 3 is executed, skip this step.

Step 6 Optional: Complete the information for this trunk link in the General Attributes tab, such as Name, Order NO..
2-136 Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. Issue 02 (2010-09-24)

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management
NOTE

2 End-to-End RTN Management

If you want to use the default values, skip this step.

Step 7 Optional: If you do not want to activate the created trail when the configuration is issued to NEs, you can uncheck the Activate the trail check box.
NOTE

l If you activate the trail, service configuration data is sent to the NE. l If you do not activate the trail, the service configuration data is saved only in the U2000.

Step 8 Click Apply. A prompt is displayed, indicating that the operation is successful. Step 9 Click Close. ----End

2.2.7.3 Creating an EVPL (QinQ) Trail


You can create an EVPL (QinQ) trail.

Prerequisite
l l l You must be an NM user with "network operator" authority or higher. A trunk link must be created. The Ethernet processing board and the corresponding interface board must be installed.

Procedure
Step 1 Choose Service > MSTP Trail > Create EVPL(QinQ) from the Main Menu. Step 2 Set the direction of the trail. Step 3 Select Port Usage Strategy for the source and sink.
NOTE

The Port Usage Strategy parameter has the following two values: l PORT: Use this strategy to configure transparent transmission of the EVPL service. This strategy usually applies to point-to-point communication. l PORT+VLAN: Use this strategy to configure convergence of the EVPL service. This strategy applies to point-to-point, point-to-multipoint communication, and communication among multiple points.

Step 4 Select the Operation Type for the source and sink. Step 5 Click Browse to select the appropriate port. Step 6 Set S-VLAN and C-VLAN tag depending on the selected operation type. Step 7 Set the trunk link. Select the route strategy for the trunk link, and then perform the next operation. l l Strategy 1: Create the trunk link automatically. Set the bandwidth of the trunk link and click Next. Strategy 2: Create a trunk link manually. Click Next to create the trunk link. The default value of the trunk link route strategy is Using Existing Trunk Link. Select the created trunk link and click Next. Strategy 3: Use the existing trunk link. Select an existing trunk link trail and click Next.
Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. 2-137

l
Issue 02 (2010-09-24)

2 End-to-End RTN Management


NOTE

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

Pay attention to the following points when setting the parameters: l The route strategy for the trunk link depends on the application in practice. Usually it is recommended that you create a trunk link first, and then create an Ethernet trail. Hence, Use Existing Trunk Link is the default value. l Create Trunk Link Manually and Create Trunk Link Automatically are often used for service expansion. In the former one, the source and sink of the trunk link need to be specified manually, but the timeslot allocation can be controlled manually. In the latter one, the source and sink of the trunk link can be specified automatically, but the timeslot allocation cannot be controlled manually.

Step 8 Set the port attributes. Set the TAG, Port Type, Mapping Protocol, Port Enable, Enabling LCAS and Entry Detection parameters in Port Attribute Setting.

Step 9 Optional: Complete the information for this EVPL(QinQ) trail, such as Name and Order No..
NOTE

If you want to use the default values, skip this step.

Step 10 Optional: If you do not want to activate the created trail when the configuration is issued to NEs, you can uncheck the Activate the trail check box.
NOTE

l If you activate a trail, the service configuration data of the trail is sent to the NE. l If you do not activate a trail, the service configuration data of the trail is stored at the NE layer on the U2000.

Step 11 Click Finish. A prompt appears telling you that the operation was successful. ----End

2.2.7.4 Verifying Ethernet Services


After you configure Ethernet services, you need to verify whether service channels are available.

Prerequisite
The Ethernet service must be created and activated.

Procedure
l For the boards (such as N1EMS4) that support Ethernet OAM, use the Ethernet OAM function to verify the Ethernet services. For details, refer to: 2.2.9.1 Ethernet OAM 2.2.9.2 Creating MPs 2.2.9.3 Performing a CC Check
2-138 Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. Issue 02 (2010-09-24)

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

2 End-to-End RTN Management

2.2.9.4 Performing an LB Check 2.2.9.5 Performing an LT Check 2.2.9.6 Performing a Ping Test 2.2.9.7 Performing Performance Detection l For the boards (such as N1EFS0) that do not support Ethernet OAM, use the ping command to verify the Ethernet services. 1. 2. At the source end and then the sink end of the service, use a crossover cable to connect the port on the Ethernet board and a computer. Set the IP addresses of the two computers and ensure they are in the same network segment.
NOTE

l Do not set the IP address to the 127.0.0.0 loopback address. l Before you verify the Port+VLAN services, set the port type of the external port of the Ethernet board that is connected to the computer to Access.

3. ----End

Use the ping command on one computer to ping the other computer. Run the command ping x.x.x.x -n 60. If no packet is lost, it indicates that the channel is available.

2.2.8 Specifying a Customer for a Created Trail


You can specify a customer for a created trail according to actual demands for the purpose of network maintenance.

Prerequisite
l l l You must be an NM user with "network operator" authority or higher. The trail must be created. The customer must be created.

Procedure
Step 1 Choose Service > MSTP Trail > Manage Ethernet Trail from the main menu. Step 2 In the Set Trail Browse Filter Criteria dialog box, set the filter criteria and click Filter All. The trails are displayed in the list.
NOTE

l Click Filter All to refresh and display all the qualified trails. l Click Secondary Filter to filter the trails that are already displayed. l Click Incremental Filter to add newly qualified trails to the list without refreshing the trails that are already displayed.

Step 3 In the trail list, right-click a trail and choose Details. Step 4 In the Details dialog box, select a proper customer from the Customer drop-down list. Click OK. ----End
Issue 02 (2010-09-24) Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. 2-139

2 End-to-End RTN Management

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

2.2.9 Checking the Connectivity of Ethernet Link


You can perform Ethernet operation, administration and maintenance (OAM). 2.2.9.1 Ethernet OAM You can maintain Ethernet Layer 2 by using the Ethernet OAM feature. 2.2.9.2 Creating MPs You must create maintenance points (MPs) before executing the Ethernet OAM operations. 2.2.9.3 Performing a CC Check You can perform a consecutive check (CC) on Ethernet services to check the connectivity of services for locating and handling faults. 2.2.9.4 Performing an LB Check You can perform a loopback (LB) check on Ethernet services without interrupting services to check the connectivity of the services for locating and handling faults. 2.2.9.5 Performing an LT Check You can perform a link trace (LT) check on Ethernet services to check the MIP information in the link for locating and handling faults. 2.2.9.6 Performing a Ping Test You can perform a ping test to check if the opposite end is reachable. 2.2.9.7 Performing Performance Detection You can perform performance detection, to check if a link between two nodes is normal.

2.2.9.1 Ethernet OAM


You can maintain Ethernet Layer 2 by using the Ethernet OAM feature. With the growth of Ethernet services, more Ethernet services are applied in MAN and WAN networks. Thus, there is an increased focus on the maintainability of Ethernet services. Currently, the ways to maintain Ethernet Layer-2 are limited. Thus, the ways of operating, managing and maintaining the Ethernet services through a transport network are limited. The Ethernet OAM contains IEEE 802.1ag ETHOAM and IEEE 802.3ah ETHOAM. The IEEE 802.1ag ETHOAM is used to realize networkwide end-to-end Ethernet OAM function and IEEE 802.3ah ETHOAM is used to realize the OAM function in the last one kilometer at the access side of a transmission network.

IEEE 802.1ag ETHOAM


Ethernet OAM implements the automatic fault detection, fault location and fault isolation through continuity check (CC), in-service loopback (LB), link trace (LT), Ping Test and Performance Detection operations. In this way, OAM capability of Ethernet services is improved. The operation objects of Ethernet OAM are the maintenance points, which include maintenance end points (MEPs) and maintenance intermediate points (MIPs). The Ethernet OAM is implemented when an MEP initiates fault detection. When the MP detects a fault, it reports alarms. These alarms are correctly synchronized to the Ethernet trails, which are related to the MPs.
2-140 Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. Issue 02 (2010-09-24)

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

2 End-to-End RTN Management

IEEE 802.3ah ETHOAM


Ethernet OAM function uses discovery to check whether the opposite equipment supports the 802.3ah OAM function. Ethernet OAM function uses error frame monitor to check link performance condition. Ethernet OAM function uses remote alarm support for link event to check remote failures.

2.2.9.2 Creating MPs


You must create maintenance points (MPs) before executing the Ethernet OAM operations.

Prerequisite
l l You must be an NM user with "network operator" authority or higher. The Ethernet trail must be created and activated.

Context
The MPs include maintenance end points (MEPs) and maintenance intermediate points (MIPs). All the OAM functions must be initiated by the MEPs. The MIP does not send any OAM frames, but responds to: l l LT frames LB frames where the destination node is the MIP itself

An MP cannot be created automatically in the following situations: l l l An unidirectional Ethernet trail is selected. The PORT port at the source or sink of the selected bidirectional Ethernet trail does not support the creation of OAM nodes. The bidirectional Ethernet trail that is selected is the Layer 2 switching service based on PORT+C-VLAN+S-VLAN.

The following Ethernet services supports the automatic creation of MPs. l l l EPL EVPL EVPL(QinQ)

The following Ethernet services does not support the automatic creation of MPs. But you can perform the manual configuration. l l l EPLAN RPR EVPL RPR EVPLAN

Procedure
Step 1 Choose Service > MSTP Trail > Manage Ethernet Trail from the Main Menu. Select a bidirectional Ethernet trail and click Ethernet Service OAM. Step 2 Click New and the Create MP dialog box is displayed. Complete the information.
Issue 02 (2010-09-24) Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. 2-141

2 End-to-End RTN Management


NOTE

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

l VLAN ID: Leave this field blank for PORT services. For PORT+VLAN services, set the VLAN ID of the services to be monitored. l Direction: This indicates the direction of transmitting and receiving the OAM data from the MP to the maintenance area. If the data is from the board, the MP direction is SDH. If the data is from the outside of the board, the MP direction is IP. The MIPs can be only bidirectional.

Step 3 Optional: Click Advanced. In the dialog box displayed, set the corresponding parameters and click OK. Step 4 Click OK. A prompt appears telling you that the operation was successful. Click Close to finish the operation. ----End

2.2.9.3 Performing a CC Check


You can perform a consecutive check (CC) on Ethernet services to check the connectivity of services for locating and handling faults.

Prerequisite
l l You must be an NM user with "network operator" authority or higher. The MEP maintenance point must be created.

Context
During the CC check, the source MEP constructs and transmits CC frames periodically. The destination MEP receives the CC frames and starts the CC check. If the destination MEP does not receive the CC frames from the source within a specified period of time (for example, 3.5 times the transmit period), the MEP automatically reports the CCLOS alarm.

Procedure
Step 1 Choose Service > MSTP Trail > Manage Ethernet Trail from the Main Menu. Select a bidirectional Ethernet trail and click Ethernet Service OAM. Step 2 Select the node that you want to monitor, click OAM Operation and select Activate CC. A prompt appears telling you that the operation was successful. Click Close.
NOTE

Before you perform the check, set an appropriate CCM Sending Period as required.

----End

2.2.9.4 Performing an LB Check


You can perform a loopback (LB) check on Ethernet services without interrupting services to check the connectivity of the services for locating and handling faults.
2-142 Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. Issue 02 (2010-09-24)

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

2 End-to-End RTN Management

Prerequisite
l l You must be an NM user with "network operator" authority or higher. The MEP maintenance point must be created.

Context
During the LB check, the source MEP constructs and transmits the LBM frames and starts the timer. If the destination MP receives the LBM frames, it sends the LBR frames back to the source MEP. This indicates that the loopback is successful. If the source MEP timer times out, it indicates that the loopback fails.

Procedure
Step 1 Choose Service > MSTP Trail > Manage Ethernet Trail from the Main Menu. Select a bidirectional Ethernet trail and click Ethernet Service OAM. Step 2 Select the node that you want to monitor, click OAM Operation and select Start LB. The LB Test dialog box is displayed. Step 3 Enter the LB test source maintenance point ID and sink maintenance point ID. Step 4 Click Start LB and the check result is displayed.
NOTE

Before you perform the check, set an appropriate LB Timeout as required.

----End

2.2.9.5 Performing an LT Check


You can perform a link trace (LT) check on Ethernet services to check the MIP information in the link for locating and handling faults.

Prerequisite
l l You must be an NM user with "network operator" authority or higher. The MEP maintenance point must be created.

Context
During the LT check, the source MEP constructs and transmits LTM frames and starts the timer. All the MPs that receive the LTM frames send the LTR frame response. According to the LTR frame response, you can verify all the MIPs that pass from the source MEP to the destination MEP.
Issue 02 (2010-09-24) Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. 2-143

2 End-to-End RTN Management

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

Procedure
Step 1 Choose Service > MSTP Trail > Manage Ethernet Trail from the Main Menu. Select a bidirectional Ethernet trail and click Ethernet Service OAM. Step 2 Select the node that you want to monitor, click OAM Operation and select Start LT. The LT Test dialog box is displayed. Step 3 Enter the LT test source maintenance point ID and sink maintenance point ID. Step 4 Click Start LT and the check result is displayed.
NOTE

Before you perform the check, set an appropriate LT Timeout as required.

----End

2.2.9.6 Performing a Ping Test


You can perform a ping test to check if the opposite end is reachable.

Prerequisite
l l You must be an NM user with "network operator" authority or higher. The OAM maintenance node of a service must be created for an Ethernet board. The type of the maintenance node is MEP.

Context
Performing a ping test does not affect the service.

Procedure
Step 1 Choose Service > MSTP Trail > Manage Ethernet Trail from the Main Menu. Select a bidirectional Ethernet trail and click Ethernet Service OAM. Step 2 Optional: Click Query to query OAM information from the NE. Step 3 Select a node, click OAM Operation and select Start Ping. The Ping Test window is displayed. Step 4 Set Send Mode. l If you select Burst Mode, you need to set Packet Length, Timeout, and Ping Attempts. l If you select Continue Mode, you need to set Packet Length, and Timeout. Step 5 In the IP Address Configuration area, set Destination IP Address and Local IP Address. Step 6 Click Start Ping and view the returned result in the Detail pane. ----End
2-144 Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. Issue 02 (2010-09-24)

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

2 End-to-End RTN Management

2.2.9.7 Performing Performance Detection


You can perform performance detection, to check if a link between two nodes is normal.

Prerequisite
l l You must be an NM user with "network operator" authority or higher. The OAM maintenance node of a service must be created for an Ethernet board. The type of the maintenance node is MEP.

Context
Performing performance detection does not affect the service.

Procedure
Step 1 Choose Service > MSTP Trail > Manage Ethernet Trail from the Main Menu. Select a bidirectional Ethernet trail and click Ethernet Service OAM. Step 2 Optional: Click Query to query OAM information from the NE. Step 3 Select a node, click OAM Operation and select Performance Detect. The Performance Detect window is displayed. Step 4 Set Send Mode. l If you select Burst Mode, you need to set Packet Length, Timeout, and Detect Attempts. l If you select Continue Mode, you need to set Packet Length, and Timeout. Step 5 In the Maintenance Point area, set Source MP ID and Destination MP ID. Step 6 Click Start Detect and view the returned result in the Detail pane. ----End

2.2.10 Viewing Ethernet Services


The network maintainer or administrator must know about the occupied resources and service statuses in time.

Context
The bearer trails for Ethernet trails are trunk links, and the bearer trails for trunk links are SDH trails. To view the information of Ethernet trails, you can use the following methods: 2.2.10.1 Viewing Trunk Links You can view the trunk link information. 2.2.10.2 Analyzing the Trunk Link Fault This section describes how to query relevant information about the trunk link status. 2.2.10.3 Viewing Relevant Trails of a Trunk Link The trunk link trail is located between its client layer Ethernet trail and server layer SDH trail. When you view the trunk link, you can also view its relevant server and client trails. This facilitates management and maintenance. 2.2.10.4 Viewing Ethernet Trails
Issue 02 (2010-09-24) Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. 2-145

2 End-to-End RTN Management

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

By viewing Ethernet trails, you can know the trail details such as the route and occupied resources. 2.2.10.5 Viewing the Server Trail of an Ethernet Trail The server trail of an Ethernet trail is the trunk link. When you view the Ethernet trail, you can also view its trunk link. 2.2.10.6 Analyzing the Ethernet Trail Fault You can query the status of an Ethernet trail. 2.2.10.7 Viewing the Connectivity of Ethernet Services Networkwide The U2000 periodically checks the connectivity of the trails that receive alarm notifications and displays the result. You can learn about the connectivity of services networkwide by viewing the check result and thus adopt different handling policies. For example, the alarm that causes service interruption is handled with priority.

2.2.10.1 Viewing Trunk Links


You can view the trunk link information.

Prerequisite
l l You must be an NM user with "network monitor" authority or higher. The trunk link is created.

Procedure
Step 1 Choose Service > MSTP Trail > Manage Trunk Link from the Main Menu. Step 2 In the Filter dialog box displayed, select the filter criteria. The desired trails are displayed in the trail list.
NOTE

l If you need to filter all trails on the U2000, click Filter All. l Based on the existing trails, to add trails that meet the new criteria, click Incremental Filter. l Based on the existing trails, to filter the trails again according to the new criteria, click Secondary Filter.

Step 3 Click a link and view the trail attributes in the trunk link list. l If you want to view the details of a trail, right-click the trail in the list and choose Details from the shortcut menu. The Details window is displayed. View the information and then click OK. If you want to view the SDH trail used by the trunk link, click the trunk link in the list and click the Channel Member tab. If you want to view the source or sink port attributes of a trail, click the trail in the list and click the Port Attributes tab.

l l

----End

2.2.10.2 Analyzing the Trunk Link Fault


This section describes how to query relevant information about the trunk link status.
2-146 Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. Issue 02 (2010-09-24)

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

2 End-to-End RTN Management

Prerequisite
l l l You must be an NM user with "network monitor" authority or higher. Trunk links must be created and in the active state. Trunk links must be already terminated.

Procedure
Step 1 Choose Service > MSTP Trail > Manage Trunk Link from the Main Menu. Step 2 In the Filter dialog box displayed, select the filter criteria. Then, the desired trails are displayed in the trail list.
NOTE

l To filter all the trails on the U2000, click Filter All. l To add trails that meet the new criteria based on the existing trails, click Incremental Filter. l To filter the trails again according to the new criteria based on the existing trails, click Secondary Filter.

Step 3 Select a trunk link in the trail list, right-click, and then choose Analyse Trail Status. Step 4 In the displayed window, view Trail Status. ----End

2.2.10.3 Viewing Relevant Trails of a Trunk Link


The trunk link trail is located between its client layer Ethernet trail and server layer SDH trail. When you view the trunk link, you can also view its relevant server and client trails. This facilitates management and maintenance.

Prerequisite
l l You must be an NM user with "network monitor" authority or higher. The trunk link must be created.

Procedure
Step 1 Choose Service > MSTP Trail > Manage Trunk Link from the Main Menu. Step 2 In the Filter dialog box displayed, select the filter criteria. The desired trails are displayed in the trail list.
NOTE

l If you need to filter all trails on the U2000, click Filter All. l Based on the existing trails, to add trails that meet the new criteria, click Incremental Filter. l Based on the existing trails, to filter the trails again according to the new criteria, click Secondary Filter.

Step 3 If you want to view server layer trail, right-click a trunk link in the list and choose Browse Relevant Server Trails from the shortcut menu. The SDH Trail Management interface is displayed, showing the server trail of the trunk link trail.
Issue 02 (2010-09-24) Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. 2-147

2 End-to-End RTN Management


NOTE

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

To go back from the server trail to the trunk link, right-click the server trail, and choose Browse Relevant Client Trails.

----End

2.2.10.4 Viewing Ethernet Trails


By viewing Ethernet trails, you can know the trail details such as the route and occupied resources.

Prerequisite
l l You must be an NM user with "network monitor" authority or higher. The Ethernet trail must be created.

Procedure
Step 1 Choose Service > MSTP Trail > Manage Ethernet Trail from the Main Menu. Step 2 In the Filter dialog box displayed, select the filter criteria. The desired trails are displayed in the trail list.
NOTE

l If you need to filter all trails on the U2000, click Filter All. l Based on the existing trails, to add trails that meet the new criteria, click Incremental Filter. l Based on the existing trails, to filter the trails again according to the new criteria, click Secondary Filter.

Step 3 View the basic attributes of the Ethernet trail in the Ethernet trail list. Step 4 If you want to view the route information of each NE on an EPL or EVPL trail, right-click a trail in the trail list and choose Details from the shortcut menu. The Details dialog box is displayed. Click the Route Information or Attributes tab. View the information and then click OK.
NOTE

The route information is automatically generated by the system. When configuring the Ethernet trail, the U2000 sets up the corresponding route on each NE according to the sink and source ports of the Ethernet trail and those of the trunk link trail.

Step 5 If you want to view the node and port information on an Ethernet trail, click a trail in the trail list and click the Node tab. In the node list, you can view the PORT and VCTRUNK ports used by each NE. Click Port Attributes and the Ethernet Trail Port Attribute window is displayed. You can view the attributes of all ports used by the trail. Step 6 If you want to view the trunk link trail used by an Ethernet trail, click the trail in the trail list and click the Trunk Link tab. Step 7 If you want to view the VLAN filtering table of an EPLAN, click the trail in the trail list and click the VLAN tab. ----End

2.2.10.5 Viewing the Server Trail of an Ethernet Trail


The server trail of an Ethernet trail is the trunk link. When you view the Ethernet trail, you can also view its trunk link.
2-148 Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. Issue 02 (2010-09-24)

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

2 End-to-End RTN Management

Prerequisite
l l You must be an NM user with "network monitor" authority or higher. The Ethernet trail must be created.

Procedure
Step 1 Choose Service > MSTP Trail > Manage Ethernet Trail from the Main Menu. Step 2 In the Filter dialog box displayed, select the filter criteria. The desired trails are displayed in the trail list.
NOTE

l If you need to filter all trails on the U2000, click Filter All. l Based on the existing trails, to add trails that meet the new criteria, click Incremental Filter. l Based on the existing trails, to filter the trails again according to the new criteria, click Secondary Filter.

Step 3 Right-click a trail in the Ethernet trail list and choose Browse Relevant Server Trails from the shortcut menu. The Trunk Link Management interface is displayed, and shows the trunk link that the Ethernet trail uses.
NOTE

To go back from the trunk link to the Ethernet trail, right-click the trunk link and choose Browse client trail from the shortcut menu.

----End

2.2.10.6 Analyzing the Ethernet Trail Fault


You can query the status of an Ethernet trail.

Prerequisite
l l l You must be an NM user with "network monitor" authority or higher. The Ethernet trail must be created and activated. Unterminated EPL trails are not supported.

Procedure
Step 1 Choose Service > MSTP Trail > Manage Ethernet Trail from the Main Menu. Step 2 In the filter dialog box, specify the filter criteria. The desired trails are displayed in the trail list.
NOTE

l To filter all trails on the U2000, click Filter All. l Based on the existing trails, to add trails that meet the new criteria, click Incremental Filter. l Based on the existing trails, to filter the trails again according to the new criteria, click Secondary Filter.

Step 3 In the list, select an Ethernet trail, right-click, and choose Analyse Trail Status from the shortcut menu.
Issue 02 (2010-09-24) Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. 2-149

2 End-to-End RTN Management

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

Step 4 In the displayed window, view Trail Status. ----End

2.2.10.7 Viewing the Connectivity of Ethernet Services Networkwide


The U2000 periodically checks the connectivity of the trails that receive alarm notifications and displays the result. You can learn about the connectivity of services networkwide by viewing the check result and thus adopt different handling policies. For example, the alarm that causes service interruption is handled with priority.

Prerequisite
You must be an NM user with "network operator" authority or higher.

Context
In the case of the trails that reports the alarms, certain services of the trails are interrupted while other services of the trails are not interrupted. The services that are interrupted cannot be identified when you view alarms. You can only handle those alarms one by one. The alarm that causes service interruption, however, is not handled in time. After the service interruption is detected, the U2000 automatically generates a service-level alarm that is displayed in the Browse Current Alarm window.

Procedure
Step 1 Choose Fault > Service Monitoring > Real-Time Faulty MSTP Ethernet Trail Management from the Main Menu. Step 2 In the Set Trail Browse Filter Conditions dialog box displayed, set the filter criteria and click Filter All. The trails are displayed in the list. Step 3 View Connection Status. The connectivity of the service is refreshed in real time. ----End

2.2.11 Maintaining Ethernet Trails


This section describes how to maintain Ethernet trails. 2.2.11.1 Adjusting the Ethernet Trail Bandwidth By adjusting the bandwidth of a trunk link, you can adjust the bandwidth of the Ethernet trail that the trunk link carries. 2.2.11.2 Activating or Deactivating Ethernet Services To change the state of an Ethernet service from active to inactive state, you need to deactivate the Ethernet service. Oppositely, to change an Ethernet service from the inactive to the active state, you need to activate the trail.

2.2.11.1 Adjusting the Ethernet Trail Bandwidth


By adjusting the bandwidth of a trunk link, you can adjust the bandwidth of the Ethernet trail that the trunk link carries.
2-150 Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. Issue 02 (2010-09-24)

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

2 End-to-End RTN Management

Prerequisite
l l l You must be an NM user with "network maintainer" authority or higher. The trunk link must be created. The LCAS function of the trunk link must be enabled.

Context
After Ethernet services run for a period, a larger transmission bandwidth is required because of an increase of traffics. A simple and reliable way for the expansion is to add path members to the trunk link that carries the Ethernet trail. This operation does not interrupt existing services or does not require any changes to the source and sink ports of the Ethernet trail. On the other hand, if the traffic load is overestimated when Ethernet services are initially provided, you can delete extra path members to avoid wasting bandwidth and save costs.

Procedure
Step 1 Choose Service > MSTP Trail > Manage Trunk Link from the Main Menu. Step 2 In the Set Trunk Link Browse Filter Criteria dialog box displayed, select the filter criteria. The desired trails are displayed in the trail list.
NOTE

l If you need to filter all trails on the U2000, click Filter All. l Based on the existing trails, to add trails that meet the new criteria, click Incremental Filter. l Based on the existing trails, to filter the trails again according to the new criteria, click Secondary Filter.

Step 3 Select the trunk link from the list. Step 4 To increase the bandwidth of the trunk link, click the Channel Member tab. Click Add and the Add Channel Member dialog box is displayed. Select an appropriate channel member and click OK.
NOTE

l There must be server trails available when you need to increase the trunk link bandwidth. l The channel member to be added must have the same rate as the original ones.

Step 5 To reduce the bandwidth of the trunk link, click the Channel Member tab. Select an appropriate channel member and click Delete. ----End

2.2.11.2 Activating or Deactivating Ethernet Services


To change the state of an Ethernet service from active to inactive state, you need to deactivate the Ethernet service. Oppositely, to change an Ethernet service from the inactive to the active state, you need to activate the trail.

Prerequisite
You must be an NM user with "network operator" authority or higher.
Issue 02 (2010-09-24) Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. 2-151

2 End-to-End RTN Management

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

Context
If you activate the inactive Ethernet service again, the attributes of the service over the trail are consistent with those before the activation.

CAUTION
Deactivating Ethernet services may interrupt services. Exercise caution when you perform this operation.

Procedure
Step 1 Choose Service > MSTP Trail > Manage Ethernet Trail from the Main Menu. Step 2 In the Set Trail Browse Filter Criteria dialog box displayed, set the filter criteria and click Filter All. The trails are displayed in the list.
NOTE

l Filter All refreshes and displays all trails that meet the filter criteria. l Secondary Filter performs filtering on the trails that are already displayed according to the filter criteria. l Incremental Filter does not refresh the trail information that is already displayed. This function displays the updated filter result below the existing trail information.

Step 3 Right-click the Ethernet service that you want to activate or deactivate and choose Activate or Deactivate from the shortcut menu. In the Confirm dialog boxes, click OK.
NOTE

During the deactivation, the Reconfirm dialog box is displayed. Click OK.

Step 4 In the Operation Result dialog box, click Close. ----End

2.2.12 Deleting Ethernet Services


You can delete the services that you do not need.

Context
Ethernet services must be deleted in the following order: 2.2.12.1 Deleting Ethernet Trails Only when the Ethernet trail is deleted, the trunk link or SDH trail that carries the Ethernet trail can be deleted. 2.2.12.2 Deleting Trunk Links You can delete trunk links.

2.2.12.1 Deleting Ethernet Trails


Only when the Ethernet trail is deleted, the trunk link or SDH trail that carries the Ethernet trail can be deleted.
2-152 Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. Issue 02 (2010-09-24)

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

2 End-to-End RTN Management

Prerequisite
l l You must be an NM user with "network operator" authority or higher. The Ethernet trail to be deleted must be in the inactive state.

Procedure
Step 1 Choose Service > MSTP Trail > Manage Ethernet Trail from the Main Menu. Step 2 In the Set Trail Browse Filter Criteria dialog box displayed, select the filter criteria. The desired trails are displayed in the trail list.
NOTE

l If you need to filter all trails on the U2000, click Filter All. l Based on the existing trails, to add trails that meet the new criteria, click Incremental Filter. l Based on the existing trails, to filter the trails again according to the new criteria, click Secondary Filter.

Step 3 Right-click the Ethernet trail that you want to delete and select Delete from the shortcut menu. The Confirm dialog box is displayed. Step 4 Click OK and the Reconfirm dialog box is displayed. Step 5 Click OK and the Operation Result dialog box is displayed. Step 6 Click Close. ----End

2.2.12.2 Deleting Trunk Links


You can delete trunk links.

Prerequisite
l l l You must be an NM user with "network operator" authority or higher. The trunk link to be deleted must not carry any Ethernet trail. The trunk link to be deleted must be in the inactive state.

Context
If the trunk link you want to delete is already used for an Ethernet trail, you need to delete the Ethernet trail first. For details, refer to Deleting Ethernet Trails.

Procedure
Step 1 Choose Service > MSTP Trail > Manage Trunk Link from the Main Menu. Step 2 In the Set Trail Browse Filter Criteria dialog box displayed, select the filter criteria. The desired trails are displayed in the trail list.

Issue 02 (2010-09-24)

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

2-153

2 End-to-End RTN Management


NOTE

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

l If you need to filter all trails on the U2000, click Filter All. l Based on the existing trails, to add trails that meet the new criteria, click Incremental Filter. l Based on the existing trails, to filter the trails again according to the new criteria, click Secondary Filter.

Step 3 Select one or more trunk link trails that you want to delete, right-click and choose Delete from the shortcut menu. The Delete Trunk Link dialog box is displayed.
NOTE

l The server trail refers to an SDH trail used by the trunk link. l To delete the server trail of a trunk link, ensure that the server trail is in the inactive state.

Step 4 Click Yes, and the Confirm dialog box is displayed. Step 5 Click OK, and the Operation Result dialog box is displayed. Step 6 Click Close. ----End

2.3 Managing Alarms of an SDH Trail


By using the end-to-end trail management function of the U2000, you can manage alarms generated on SDH trails at the network layer. 2.3.1 Viewing Current Alarms of an SDH Trail By viewing the current alarms of an SDH trail, you can know the running status of the services carried on this trail. This helps during the network maintenance when you need to update the alarm information and take proper measures on time. When you view the current alarms of an SDH trail, you can perform other operations for these alarms at the same time. For example, synchronize, refresh, check, acknowledge and filter alarms. 2.3.2 Viewing History Alarms of an SDH Trail By viewing history alarms of an SDH trail, you can learn history faults of the trail for reference of operation and maintenance. 2.3.3 Setting Alarm Reversion for an SDH Trail During a new deployment, certain alarms that are reasonable but meaningless occur. For example, when you configure an SDH trail but not connect cables, the corresponding LOS alarm is generated. After the alarm reversion is set, the alarm is not displayed. This does not affect the network monitoring that is performed by maintainers. 2.3.4 Inserting an Alarm on an SDH Trail In the case of an SDH trail of VC4 level, during maintenance, you can manually insert an MSAIS or MS-RDI alarm at the source end of the trail. If the sink end of the trail can correctly receive the alarm, it indicates that the trail works normally. 2.3.5 Managing Networkwide SDH Alarm Trails in Real Time The U2000 can manage the networkwide SDH alarm trails in real time. It manages all the SDH trails that have current alarms. If an alarm ends, the related trail is automatically removed from the user interface. 2.3.6 Analyzing SDH alarm correlation After a fault occurs, the NE may report a lot of alarms. By analyzing the alarm correlation, you can quickly locate the fault to the root alarm.
2-154 Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. Issue 02 (2010-09-24)

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

2 End-to-End RTN Management

2.3.7 Browsing Relevant WDM Trails On an SDH-WDM hybrid network, an SDH trail may be associated with other WDM trails. By browsing relevant WDM trails, you can quickly query the associated WDM trails.

2.3.1 Viewing Current Alarms of an SDH Trail


By viewing the current alarms of an SDH trail, you can know the running status of the services carried on this trail. This helps during the network maintenance when you need to update the alarm information and take proper measures on time. When you view the current alarms of an SDH trail, you can perform other operations for these alarms at the same time. For example, synchronize, refresh, check, acknowledge and filter alarms.

Prerequisite
l To view the alarms, You must be an NM user with "network monitor" authority or higher. To acknowledge, check, synchronize and delete alarms, You must be an NM user with "network operator" authority or higher. The SDH trail must be created.

Procedure
Step 1 Choose Service > SDH Trail > Manage SDH Trail from the Main Menu.
TIP

Right-click the trail on the Main Topology and choose Browse Current Alarm.

Step 2 In the Set Trail Browse Filter Criteria dialog box displayed, select or enter parameters and set filter criteria. Click Filter All.
NOTE

l Click Filter All to refresh and display all the qualified trails. l Click Secondary Filter to filter the trails that are already displayed. l Click Incremental Filter to add newly qualified trails to the list without refreshing the trails that are already displayed.

Step 3 Optional: Select a trail on which there are alarms. Then, right-click in the Transmission Media Layer Route window and then choose Display Alarm. If the NEs have alarms, each of the NE icons is indicated with a specific alarm color. When you hold the cursor on any one of the NE icons, alarm information of the NE is displayed. Step 4 Select one or more trails. Click the Alarm and select Current Alarm.
NOTE

Click an alarm. The details of the alarm and the recommended handling are displayed in the pane below.

Step 5 Optional: To display the latest alarms, check the Display latest alarms check box. Step 6 Optional: To check the alarms, select one or more alarms. Right-click alarms and choose Check Alarms.
NOTE

When you check the alarm, you are comparing one or more uncleared alarms on the U2000 with those on the NE. If the alarm exists as a current alarm in the NE, it means that the alarm information remains unchanged on the U2000. If the alarm does not exist in the NE, the alarm is cleared on the U2000.

Step 7 Optional: To acknowledge the alarms, select one or more alarms and click Acknowledge. In the Confirm dialog box displayed, click Yes.
Issue 02 (2010-09-24) Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. 2-155

2 End-to-End RTN Management


NOTE

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

Acknowledged and cleared alarms automatically change to history alarms.

Step 8 Optional: To clear the alarms, select one or more alarms and click Clear. In the Confirm dialog box displayed, click Yes.
NOTE

l If you select the alarm that is in the Unacknowledged & Uncleared state, click the button to change the status to Unacknowledged & Cleared. l you select the alarm that is in the Acknowledged & Uncleared state, click the button to move the alarm to the alarm log database.

Step 9 Optional: To view the trails, customers, and protection subnets that are affected by an alarm, you can select one alarm, right-click, and choose the required menu item, for example, Protection Subnet. ----End

2.3.2 Viewing History Alarms of an SDH Trail


By viewing history alarms of an SDH trail, you can learn history faults of the trail for reference of operation and maintenance.

Prerequisite
l l You must be an NM user with "network monitor" authority or higher. The SDH trail must be created.

Procedure
Step 1 Choose Service > SDH Trail > Manage SDH Trail from the Main Menu. Step 2 In the Set Trail Browse Filter Criteria dialog box displayed, set the filter criteria and click Filter All. The trails are displayed in the list.
NOTE

l Click Filter All to refresh and display all the qualified trails. l Click Secondary Filter to filter the trails that are already displayed. l Click Incremental Filter to add newly qualified trails to the list without refreshing the trails that are already displayed.

Step 3 Select a trail. Click Alarm and choose History Alarm. Step 4 In the History Alarms-[Custom] window, view history alarms of the specified SDH trail. ----End

2.3.3 Setting Alarm Reversion for an SDH Trail


During a new deployment, certain alarms that are reasonable but meaningless occur. For example, when you configure an SDH trail but not connect cables, the corresponding LOS alarm is generated. After the alarm reversion is set, the alarm is not displayed. This does not affect the network monitoring that is performed by maintainers.
2-156 Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. Issue 02 (2010-09-24)

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

2 End-to-End RTN Management

Prerequisite
l l l You must be an NM user with "network operator" authority or higher. The trail must be activated. Reversion Mode of the NE where the alarm is generated must be set to Automatic Reversion or Manual Reversion.

Context
If you set alarm reversion for a trail, all alarms of this trail which support the function are reverted. You cannot set alarm reversion for a single alarm of the trail. Currently, you can set the alarm reversion for the following alarms: R_LOS, MUT_LOS, T_ALOS, ETH_LOS, P_LOS, and DDN_ALOS.

Procedure
Step 1 Choose Service > SDH Trail > Manage SDH Trail from the Main Menu. Step 2 In the Set Trail Browse Filter Criteria dialog box, set the filter criteria and click Filter All. The trails are displayed in the list.
NOTE

l Click Filter All to refresh and display all the qualified trails. l Click Secondary Filter to filter the trails that are already displayed. l Click Incremental Filter to add newly qualified trails to the list without refreshing the trails that are already displayed.

Step 3 Select one or more trails, click Alarm and select Alarm Reversion from the drop-down list.
NOTE

Alarm reversion is not applicable to the VC4 server trail.

Step 4 In the Alarm Reversion dialog box displayed, set Reversion Status of the trail to Enabled. Step 5 Click Apply. In the Operation Result dialog box displayed, click Close. ----End

2.3.4 Inserting an Alarm on an SDH Trail


In the case of an SDH trail of VC4 level, during maintenance, you can manually insert an MSAIS or MS-RDI alarm at the source end of the trail. If the sink end of the trail can correctly receive the alarm, it indicates that the trail works normally.

Prerequisite
You must be an NM user with "network operator" authority or higher.

Procedure
Step 1 Choose Service > SDH Trail > Manage SDH Trail from the Main Menu. Step 2 In the Set Trail Browse Filter Criteria dialog box displayed, set the filter criteria and click Filter All. The trails are displayed in the list.
Issue 02 (2010-09-24) Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. 2-157

2 End-to-End RTN Management


NOTE

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

l Click Filter All to refresh and display all the qualified trails. l Click Secondary Filter to filter the trails that are already displayed. l Click Incremental Filter to add newly qualified trails to the list without refreshing the trails that are already displayed.

Step 3 Select a VC4 trail or VC4 server trail. Click Maintenance and choose Alarm Insertion from the drop-down menu. Step 4 In the Alarm Insertion dialog box displayed, set the value of AIS Alarm Insertion or RDI Alarm Insertion to Insert. Step 5 Click Apply. In the Operation Result dialog box displayed, click Close. ----End

2.3.5 Managing Networkwide SDH Alarm Trails in Real Time


The U2000 can manage the networkwide SDH alarm trails in real time. It manages all the SDH trails that have current alarms. If an alarm ends, the related trail is automatically removed from the user interface.

Prerequisite
You must be an NM user with "network monitor" authority or higher.

Procedure
Step 1 Choose Fault > Service Monitoring > Real-Time Faulty SDH Trail Management from the Main Menu. Step 2 In the Set Trail Browse Filter Criteria dialog box, set the filter criteria and click Filter All. The trails are displayed in the list. Step 3 Optional: To manage the trail alarms, select a trail, click Alarm, select Current Alarm or History Alarm from the drop-down list, and manage the alarms in the corresponding window. Step 4 Optional: To manage the trail performance, select a trail, click Performance, select Query Performance or Performance Parameter from the drop-down list, and manage the performance in the corresponding window. ----End

2.3.6 Analyzing SDH alarm correlation


After a fault occurs, the NE may report a lot of alarms. By analyzing the alarm correlation, you can quickly locate the fault to the root alarm.

Prerequisite
You must be an NM user with "network monitor" authority or higher.

Procedure
Step 1 Choose Fault > Correlation Analysis > Trail Alarm Correlation Rules from the Main Menu.
2-158 Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. Issue 02 (2010-09-24)

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

2 End-to-End RTN Management

Step 2 Click Create in the Alarm Correlation Rules dialog box, a rule of alarm correlation is created.
NOTE

You can also modify the existed alarm correlation rules.

Step 3 Set the Alarm1, Alarm2, Conditions and Action of the new rule.
NOTE

When you select Enable Automatic Correlation Analysis, dynamic analysis of the root alarm is adopted. When you deselect Enable Automatic Correlation Analysis, static analysis of the root alarm is adopted.

Step 4 Click Apply. Step 5 In the Operation Result dialog box displayed, click Close. Step 6 Click Close in the Alarm Correlation Rules dialog box. Step 7 Choose Fault > Browse Alarm List from the Main Menu. Step 8 In the Filter dialog box that is displayed, set the filtering criteria, and click OK. Step 9 Optional: If use the dynamically analyzing trail root alarms, right-click a root alarm and choose correlative alarms from the shortcut menu to display the correlative alarms suppressed by this root alarm. Step 10 Optional: If use the static analyzing trail root alarms, choose Fault > Correlation Analysis > Analyze Trail Alarm Correlation from the Main Menu. 1. 2. Click OK in the Correlation Analysis for Current Alarm dialog box. Click OK in the Confirm dialog box, the root alarm informations are displays in the Browse Root Alarm.

----End

2.3.7 Browsing Relevant WDM Trails


On an SDH-WDM hybrid network, an SDH trail may be associated with other WDM trails. By browsing relevant WDM trails, you can quickly query the associated WDM trails.

Prerequisite
You must be an NM user with "network monitor" authority or higher.

Procedure
Step 1 Choose Service > SDH Trail > Manage SDH Trail from the Main Menu. Step 2 In the Set Trail Browse Filter Criteria dialog box displayed, set the filter criteria and click Filter All. The trails are displayed in the list.
NOTE

l Click Filter All to refresh and display all the qualified trails. l Click Secondary Filter to filter the trails that are already displayed. l Click Incremental Filter to add newly qualified trails to the list without refreshing the trails that are already displayed.

Issue 02 (2010-09-24)

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

2-159

2 End-to-End RTN Management

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

Step 3 Right-click the trail and choose Browse Relevant WDM Trail from the shortcut menu to view the WDM trails relevant to the trail. ----End

2.4 Managing the Performance of SDH Trails


You can use the network layer function of the U2000 to perform end-to-end performance management on SDH trails. 2.4.1 Viewing Current Performance Data of an SDH Trail To know whether services in an SDH trail are normal, view the current performance data. 2.4.2 Viewing History Performance Data of an SDH Trail To know whether services in an SDH trail are normal, view the history performance data. 2.4.3 Viewing UAT of SDH Trails You can view performance UAT of SDH trails to know the UAT events of the SDH trails. 2.4.4 Viewing Performance Threshold-Crossing Records of SDH Trails You can view performance threshold-crossing record of SDH trails to know the performance threshold-crossing events of the SDH trails. 2.4.5 Setting Performance Monitoring Parameters of an SDH Trail Performance monitoring keeps a detailed record of the performance of services over a trail, helping the maintenance engineer to monitor and analyze the states of services. 2.4.6 Setting SDH Trail Performance Threshold In this user interface, you can set performance thresholds based on a trail. Specifically, you can set the corresponding performance thresholds for the performance events and performance types on the source and sink of a trail.

2.4.1 Viewing Current Performance Data of an SDH Trail


To know whether services in an SDH trail are normal, view the current performance data.

Prerequisite
l l You must be an NM user with "network monitor" authority or higher. The SDH trail must be created.

Procedure
Step 1 Choose Service > SDH Trail > Manage SDH Trail from the Main Menu. Step 2 In the Set Trail Browse Filter Criteria dialog box, set the filter criteria and click Filter All.
NOTE

l Click Filter All to refresh and display all the qualified trails. l Click Secondary Filter to filter the trails that are already displayed. l Click Incremental Filter to add newly qualified trails to the list without refreshing the trails that are already displayed.

Step 3 Select one or more trails. Click the Performance and select Query Performance.
2-160 Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. Issue 02 (2010-09-24)

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

2 End-to-End RTN Management

Step 4 Click the 15-Minute Current Performance or 24-Hour Current Performance tab and view the current performance of the trail. Step 5 Optional: To browse the performance events on the NEs that the trail traverses, select the Display all monitored objects check box.
NOTE

If this check box is selected, the performance events of the source, sink, and intermediate nodes that a trail traverse are displayed. If this check box is cleared, the performance events of only the source and sink nodes of a trail are displayed.

Step 6 Optional: Click Filter. In the Filter dialog box, set the filter criteria and click OK. The qualified performance events are displayed. ----End

2.4.2 Viewing History Performance Data of an SDH Trail


To know whether services in an SDH trail are normal, view the history performance data.

Prerequisite
l l You must be an NM user with "network monitor" authority or higher. The SDH trail must be created.

Procedure
Step 1 Choose Service > SDH Trail > Manage SDH Trail from the Main Menu. Step 2 In the Set Trail Browse Filter Criteria dialog box, set the filter criteria and click Filter All.
NOTE

l Click Filter All to refresh and display all the qualified trails. l Click Secondary Filter to filter the trails that are already displayed. l Click Incremental Filter to add newly qualified trails to the list without refreshing the trails that are already displayed.

Step 3 Select one or more trails. Click the Performance button and select Query Performance. Step 4 Click the 15-Minute History Performance or 24-Hour History Performance tab and view the history performance of the trail. Step 5 Optional: To browse the performance events on the NEs that the trail traverses, select the Display all monitored objects check box.
NOTE

If this check box is selected, the performance events of the source, sink, and intermediate nodes that a trail traverse are displayed. If this check box is cleared, the performance events of only the source and sink nodes of a trail are displayed.

Step 6 Optional: Click Filter. In the Filter dialog box, set the filter criteria and click OK. The qualified performance events are displayed. Step 7 Optional: Click Graph. In the displayed window, select Performance Event and Monitor Object. Click
Issue 02 (2010-09-24)

and then click Show to view the graphic display.


Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. 2-161

2 End-to-End RTN Management


NOTE

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

l By displaying data in a graph, you can clearly learn the performance change trend in a certain period. l Applies to the performance events related to the optical power only.

----End

2.4.3 Viewing UAT of SDH Trails


You can view performance UAT of SDH trails to know the UAT events of the SDH trails.

Prerequisite
l l You must be an NM user with "network monitor" authority or higher. The SDH trail must be created.

Procedure
Step 1 Choose Service > SDH Trail > Manage SDH Trail from the main menu. Step 2 The Set Trail Browse Filter Criteria dialog box is displayed. Set the filter criteria and view the desired trails in the trail list. l l l If you need to filter all the trails, click Filter All. If you need to add to the list more trails that match the requirement, click Incremental Filter. If you need to filter the trails in the list, click Secondary Filter.

Step 3 Select one or several trails, click Performance, choose Browse Performance. Step 4 click UAT tab to view the UAT events of the SDH trails. Step 5 Optional: To browse the performance events on the NEs that the trail traverses, select the Display all monitored objects check box.
NOTE

If this check box is selected, the performance events of the source, sink, and intermediate nodes that a trail traverse are displayed. If this check box is cleared, the performance events of only the source and sink nodes of a trail are displayed.

Step 6 Optional: Click Filter. In the Filter dialog box, set the filter criteria and click OK. The qualified performance events are displayed. ----End

2.4.4 Viewing Performance Threshold-Crossing Records of SDH Trails


You can view performance threshold-crossing record of SDH trails to know the performance threshold-crossing events of the SDH trails.

Prerequisite
l l
2-162

You must be an NM user with "network monitor" authority or higher. The SDH trail must be created.
Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. Issue 02 (2010-09-24)

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

2 End-to-End RTN Management

Procedure
Step 1 Choose Service > SDH Trail > Manage SDH Trail from the main menu. Step 2 The Set Trail Browse Filter Criteria dialog box is displayed. Set the filter criteria and view the desired trails in the trail list. l l l If you need to filter all the trails, click Filter All. If you need to add to the list more trails that match the requirement, click Incremental Filter. If you need to filter the trails in the list, click Secondary Filter.

Step 3 Select one or several trails, click Performance, choose Browse Performance. Step 4 Click performance threshold-crossing record tab to view the performance threshold-crossing events of the SDH trails. Step 5 Optional: To browse the performance events on the NEs that the trail traverses, select the Display all monitored objects check box.
NOTE

If this check box is selected, the performance events of the source, sink, and intermediate nodes that a trail traverse are displayed. If this check box is cleared, the performance events of only the source and sink nodes of a trail are displayed.

Step 6 Optional: Click Filter. In the Filter dialog box, set the filter criteria and click OK. The qualified performance events are displayed. ----End

2.4.5 Setting Performance Monitoring Parameters of an SDH Trail


Performance monitoring keeps a detailed record of the performance of services over a trail, helping the maintenance engineer to monitor and analyze the states of services.

Prerequisite
You must be an NM user with "network operator" authority or higher.

Procedure
Step 1 Choose Service > SDH Trail > Manage SDH Trail from the Main Menu. Step 2 In the Set Trail Browse Filter Criteria dialog box, set the filter criteria and click Filter All.
NOTE

l Click Filter All to refresh and display all the qualified trails. l Click Secondary Filter to filter the trails that are already displayed. l Click Incremental Filter to add newly qualified trails to the list without refreshing the trails that are already displayed.

Step 3 Select a trail. Click Performance and choose Performance Parameter from the drop-down menu. Step 4 In the Performance Parameter dialog box displayed, select an object, and set the monitoring status and auto reporting status.
Issue 02 (2010-09-24) Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. 2-163

2 End-to-End RTN Management

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

Step 5 Click Apply. In the Operation Result dialog box displayed, click Close. ----End

2.4.6 Setting SDH Trail Performance Threshold


In this user interface, you can set performance thresholds based on a trail. Specifically, you can set the corresponding performance thresholds for the performance events and performance types on the source and sink of a trail.

Prerequisite
l l You must be an NM user with "network monitor" authority or higher. The trail must be created.

Procedure
Step 1 Choose Service > SDH Trail > Manage SDH Trail from the main menu. Step 2 In the Set Trail Browse Filter Criteria dialog box, set the filter criteria and click Filter All.
NOTE

l Click Filter All to refresh and display all the qualified trails. l Click Secondary Filter to filter the trails that are already displayed. l Click Incremental Filter to add newly qualified trails to the list without refreshing the trails that are already displayed.

Step 3 Select one or more trails. Click Performance and choose Performance Threshold from the drop-down menu. Step 4 In the Performance Threshold window, double-click Threshold Value to change the performance threshold value. Step 5 Click Apply, in the Operation Result window, click Close. Step 6 Click Cancel to exit the Performance Threshold window. ----End

2.5 Managing Ethernet Trail Alarms


You can use the U2000 function of the end-to-end trail management to manage the alarms generated on Ethernet trails at the network layer. 2.5.1 Viewing Current Alarms of a Trunk Link By viewing current alarms of a trunk link, you can query the running status of services that the current trail carries. During the network maintenance, you need to update alarm information and properly handle the alarms in time. When viewing the current alarms of the trunk link, you can also synchronize, refresh, check, acknowledge and filter the alarms. 2.5.2 Viewing History Alarms of a Trunk Link By viewing history alarms of a specified trunk link, you can learn history faults of the trail for reference of operation and maintenance. 2.5.3 Viewing Current Alarms of an Ethernet Trail
2-164 Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. Issue 02 (2010-09-24)

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

2 End-to-End RTN Management

By viewing current alarms of an Ethernet trail, you can query the running status of services that the current trail carries. During the network maintenance, you need to update alarm information and properly handle the alarms in time. When viewing the current alarms of the Ethernet trail, you can also synchronize, refresh, check, acknowledge and filter the alarms. 2.5.4 Viewing History Alarms of an Ethernet Trail By viewing history alarms of an Ethernet trail, you can learn history faults of the trail for reference of the operation and maintenance. 2.5.5 Managing Networkwide ETH Alarm Trails in Real Time The U2000 can manage the networkwide ETH alarm trails in real time. It manages all the ETH trails that have current alarms. If an alarm ends, the related trail is automatically removed from the user interface.

2.5.1 Viewing Current Alarms of a Trunk Link


By viewing current alarms of a trunk link, you can query the running status of services that the current trail carries. During the network maintenance, you need to update alarm information and properly handle the alarms in time. When viewing the current alarms of the trunk link, you can also synchronize, refresh, check, acknowledge and filter the alarms.

Prerequisite
l l The trunk link must be created. To view alarms, You must be an NM user with "network monitor" authority or higher. To acknowledge, check, synchronize and delete alarms, You must be an NM user with "network operator" authority or higher.

Procedure
Step 1 Choose Service > MSTP Trail > Manage Trunk Link from the Main Menu. Step 2 In the Set Trunk Link Browse Filter Criteria window, select or enter parameters and set filter criteria. Click Filter All.
NOTE

l Filter All refreshes and displays all trails that meet the filter criteria. l Secondary Filter performs filtering on the trails that are already displayed according to the filter criteria. l Incremental Filter does not refresh the trail information that is already displayed. This function displays the updated filter result below the existing trail information.

Step 3 Select one or more trails. Click Alarm and select Current Alarm from the drop-down list. The window that is displayed shows the current alarms of all severity levels. Step 4 Optional: Select one or more alarms and choose Check from the shortcut menu to check the selected alarms.
NOTE

Checking alarms is to compare one or more uncleared alarms on the U2000 with those on the NE. If an alarm exists as a current alarm on the NE, the alarm information remains unchanged on the U2000. If the alarm does not exist on the NE, the alarm is cleared on the U2000.

Step 5 Optional: Select an alarm. The detailed information and handling suggestions of the alarm are displayed in the panes below.
Issue 02 (2010-09-24) Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. 2-165

2 End-to-End RTN Management

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

Step 6 Optional: Select one or more alarms and click Acknowledge. The Acknowledge Alarms dialog box is displayed. Click Yes. The Ack User, Ack Time and Ack Status fields display the corresponding values of the selected alarms.
NOTE

Acknowledged and cleared alarms change to history alarms automatically.

----End

2.5.2 Viewing History Alarms of a Trunk Link


By viewing history alarms of a specified trunk link, you can learn history faults of the trail for reference of operation and maintenance.

Prerequisite
l l The trunk link must be created. You must be an NM user with "network monitor" authority or higher.

Procedure
Step 1 Choose Service > MSTP Trail > Manage Trunk Link from the Main Menu. Step 2 In the Set Trunk Link Browse Filter Criteria window, select or enter parameters and set filter criteria. Click Filter All.
NOTE

l Filter All refreshes and displays all trails that meet the filter criteria. l Secondary Filter performs filtering on the trails that are already displayed according to the filter criteria. l Incremental Filter does not refresh the trail information that is already displayed. This function displays the updated filter result below the existing trail information.

Step 3 Select one or more trails. Click Alarm and select History Alarm from the drop-down list. In the window displayed, view the details of the history alarms of the specified trail. ----End

2.5.3 Viewing Current Alarms of an Ethernet Trail


By viewing current alarms of an Ethernet trail, you can query the running status of services that the current trail carries. During the network maintenance, you need to update alarm information and properly handle the alarms in time. When viewing the current alarms of the Ethernet trail, you can also synchronize, refresh, check, acknowledge and filter the alarms.

Prerequisite
l l The Ethernet trail must be created. To view alarms, You must be an NM user with "network monitor" authority or higher. To acknowledge, check, synchronize and delete alarms, You must be an NM user with "network operator" authority or higher.

2-166

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

Issue 02 (2010-09-24)

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

2 End-to-End RTN Management

Procedure
Step 1 Choose Service > MSTP Trail > Manage Ethernet Trail from the Main Menu. Step 2 In the Set Trail Browse Filter Criteria window, select or enter parameters and set filter criteria. Click Filter All.
NOTE

l Filter All refreshes and displays all trails that meet the filter criteria. l Secondary Filter performs filtering on the trails that are already displayed according to the filter criteria. l Incremental Filter does not refresh the trail information that is already displayed. This function displays the updated filter result below the existing trail information.

Step 3 Select one or more trails. Click Alarm and select Current Alarm from the drop-down list. The window that is displayed shows the current alarms of all severity levels. Step 4 Optional: Select one or more alarms and choose Check from the shortcut menu to check the selected alarms.
NOTE

Checking alarms is to compare one or more uncleared alarms on the U2000 with those on the NE. If an alarm exists as a current alarm on the NE, the alarm information remains unchanged on the U2000. If the alarm does not exist on the NE, the alarm is cleared on the U2000.

Step 5 Optional: Select an alarm. The detailed information and handling suggestions of the alarm are displayed in the panes below. Step 6 Optional: Select one or more alarms and click Acknowledge. The Acknowledge Alarms dialog box is displayed. Click Yes. The Ack User, Ack Time and Ack Status fields display the corresponding values of the selected alarms.
NOTE

Acknowledged and cleared alarms change to history alarms automatically.

----End

2.5.4 Viewing History Alarms of an Ethernet Trail


By viewing history alarms of an Ethernet trail, you can learn history faults of the trail for reference of the operation and maintenance.

Prerequisite
l l The Ethernet trail must be created. You must be an NM user with "network monitor" authority or higher.

Procedure
Step 1 Choose Service > MSTP Trail > Manage Ethernet Trail from the Main Menu. Step 2 In the Set Trail Browse Filter Criteria window, select or enter parameters and set filter criteria. Click Filter All.

Issue 02 (2010-09-24)

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

2-167

2 End-to-End RTN Management


NOTE

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

l Filter All refreshes and displays all trails that meet the filter criteria. l Secondary Filter performs filtering on the trails that are already displayed according to the filter criteria. l Incremental Filter does not refresh the trail information that is already displayed. This function displays the updated filter result below the existing trail information.

Step 3 Select one or more trails. Click Alarm and select History Alarm from the drop-down list. In the window displayed, view the details of the history alarms of the specified trail. ----End

2.5.5 Managing Networkwide ETH Alarm Trails in Real Time


The U2000 can manage the networkwide ETH alarm trails in real time. It manages all the ETH trails that have current alarms. If an alarm ends, the related trail is automatically removed from the user interface.

Prerequisite
You must be an NM user with "network monitor" authority or higher.

Procedure
Step 1 Choose Fault > Service Monitoring > Real-Time Faulty MSTP Ethernet Trail Management from the Main Menu. Step 2 In the Set Trail Browse Filter Criteria dialog box, set the filter criteria and click Filter All. The trails are displayed in the list. Step 3 Optional: To manage the trail alarms, select a trail, click Alarm, select Current Alarm or History Alarm from the drop-down list, and manage the alarms in the corresponding window. Step 4 Optional: To manage the trail performance, select a trail, click Performance, manage the performance in the corresponding window. ----End

2.6 Browsing the Performance of an Ethernet Trail


By browsing the performance of the Ethernet trail, you can learn about the running status of the services in the existing trail.

Prerequisite
You must be an NM user with "network operator" authority or higher.

Procedure
Step 1 On the Main Menu, choose Service > MSTP Trail > Manage Ethernet Trail to display the Set Trail Browse Filter Criteria dialog box. Step 2 Select the filter conditions in the dialog box, and then click Filter All.
2-168 Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. Issue 02 (2010-09-24)

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management
NOTE

2 End-to-End RTN Management

l Click Filter All to refresh all the trails that meet the specified conditions. l Click Secondary Filter to filter the displayed trails based on the filter conditions. l Click Incremental Filter not to refresh the displayed trails. Instead, the new result is added to the end of the displayed trails.

Step 3 Select one or more trails. Click Performance, select Current Performance or History Performance from the drop-down list. For detailed operations, see chapter "Performance Management". ----End

Issue 02 (2010-09-24)

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

2-169

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

3 End-to-End RTN IP Management

3
Prerequisite

End-to-End RTN IP Management

About This Chapter


In the end-to-end configuration mode, you can quickly configure RTN IP services. The end-toend configuration mode is also called the trail management function.

The trail management license must be provided. 3.1 Process of Configuring RTN IP Services This topic describes the process of configuring RTN IP services in terms of network deployment, service discovery, service deployment, and service assurance. 3.2 Automatically Searching RTN IP Services This topic describes how to automatically search IP services. With this function, you can recover the services existing on the current network to the end to end management module of the NMS for monitoring. In this manner, you can ensure the normal running of these services. 3.3 Managing Tunnel By using the tunnel technology, you can create private data transmission channels on a PSN network to transparently transmit packets. 3.4 Configuring a Service Template By using a service template, you can create services more quickly and easily. You can customize a service template according to actual O&M requirements. 3.5 Viewing a Service Resource This topic describes how to view the usage of a service resource. 3.6 Managing PWE3 Services This section describes how to configure PWE3 services. 3.7 Modifying Configurations This topic describes how to modify service configurations, which includes modifying and deleting service configurations.

Issue 02 (2010-09-24)

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

3-1

3 End-to-End RTN IP Management

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

3.1 Process of Configuring RTN IP Services


This topic describes the process of configuring RTN IP services in terms of network deployment, service discovery, service deployment, and service assurance. Figure 3-1 shows the process of configuring RTN IP services. Figure 3-1 Process of configuring RTN IP services
Network deployment Service discovery Service deployment Service assurance

Add equipment to the NMS Upload/Synchronize data

Discover tunnels

View service resources Create a service through a template Create a service with defined parameters

View the service topology Monitor alarms in centralized mode Monitor performance services

Service monitoring

Discover single services Discover composite services

Predeployment

Configure interface

Configure basic routes Configure control plane

Deploy the service

Monitor service alarms Locate faults with the test and check

Fault location

Optional Configure tunnels

Mandatory

Network deployment: is the prerequisite for the service deployment and includes adding equipment to the NMS, upload/synchronize data, and configuring basic routes, configuring control plane, and tunnels. Service discovery: discovers the existing services on the NMS for unified management and includes the discovery of tunnels, single services, and composite services. Service deployment Viewing service resources: Before deployment services, you can view the service resources to check the available service resources. Predeploying services: Predeploying services refers to creating services on the NMS. After services are predeployed, the configuration data of the services are not deployed to equipment. To create services, you can either manually enter the parameters of the services or use a template to create the services in batches. Service deployment: deploys the configuration data of services to equipment.

l l

Service assurance: includes service monitoring and fault location. Service monitoring includes service alarm monitoring and service performance monitoring. By monitoring service alarms, you can view affected services, and then locate the failure point through the test diagnosis tool.
Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. Issue 02 (2010-09-24)

3-2

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

3 End-to-End RTN IP Management

Service monitoring: monitors the alarms and performance of services and views the service topology. The service topology provides rich service operation accesses. According to the topology color, you can discover alarms according to the topology color and view the related alarms in the topology view. Fault location: By monitoring service alarms, you can view affected services, and then locate the failure point through the test and check.

3.2 Automatically Searching RTN IP Services


This topic describes how to automatically search IP services. With this function, you can recover the services existing on the current network to the end to end management module of the NMS for monitoring. In this manner, you can ensure the normal running of these services.

Prerequisite
Data synchronization must be complete on the related equipment.

Procedure
Step 1 Choose Service > Search for IP Service from the main menu. Step 2 On the Discovery Policy tab page, set the discovery policy. 1. Specify the equipment range for automatically searching IP services. l Click the All option button to discover all the NEs on the entire network. l Click the Select NE option button, and then click Add. In the dialog box that is displayed, select one or more NEs, and then click OK to discover the specified NEs. 2. 3. In the Discover Service navigation tree, select the check box to the left of the related service to specify the type of the services to be searched. On the lower-right part, click each service tab to configure the customer policy and discovery policy. Customer association policies are classified into the following types: l Set Customer: The searched services are automatically associated with the specified customer. l Do Not Set Customer: The automatically searched services are not associated with any customer. 4. After the configuration, click Start. Step 3 Click the Discovery Result tab. A progress bar is displayed indicating the progress of automatically discovering services. You can view the automatically searched services on the Add Service, Modify Service, and Discrete Service tab pages, as shown in the following figure. After selecting a record and clicking Jump Service, you can access the service management user interface for this service.

Issue 02 (2010-09-24)

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

3-3

3 End-to-End RTN IP Management

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

----End

3.3 Managing Tunnel


By using the tunnel technology, you can create private data transmission channels on a PSN network to transparently transmit packets. 3.3.1 Introduction to the Tunnel Different tunnel technologies are used in different scenarios and use different protocols to transparently transmit data packets. 3.3.2 Tunnel Configuration Flow This section describes the operation tasks for configuring the Tunnel, and relations among these tasks. When configuring and managing the Tunnel, follow the configuration flow. 3.3.3 Configuring a Tunnel This topic describes how to configure a tunnel, such as creating a tunnel, deploying a tunnel, viewing discrete tunnels, and deleting a tunnel. 3.3.4 Monitoring a Tunnel This topic describes how to monitor a tunnel to facilitate tunnel services management. 3.3.5 Configuration Example (Static CR Tunnel) This topic describes a networking diagram and the corresponding example of configuring a static CR tunnel on the network. 3.3.6 Configuration Example (RSVP TE Tunnel) This topic describes a networking diagram and the corresponding example of configuring a static RSVP TE tunnel on the network.
3-4 Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. Issue 02 (2010-09-24)

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

3 End-to-End RTN IP Management

3.3.1 Introduction to the Tunnel


Different tunnel technologies are used in different scenarios and use different protocols to transparently transmit data packets. 3.3.1.1 Introduction to the Tunnel OptiX equipment supports the MPLS tunnel, which is a tunneling technology using the MPLSprotocol-based encapsulation, and the IP tunnel, which is a tunneling technology using the IPprotocol-based encapsulation. 3.3.1.2 Standards and Protocols Compliance of the Tunnel This topic describes the standards Compliance and the two protocols that the tunneling technology uses. They are the MPLS-LDP protocol and the MPLS-RSVP protocol. 3.3.1.3 Basic Concepts of the Tunnel Multi-protocol label switching (MPLS) is a tunnel technology and enables a routing and switching platform that integrates the switching and forwarding technologies of labels and network-layer routing technologies. In the MPLS architecture, the control plane is connectionless and uses the powerful and flexible routing function of the IP network to meet the network requirements of new application; the data plane is connection-oriented and uses short and fixed-length labels to encapsulate packets for implementation of fast forwarding. This topic describes basic concepts of the tunnel. 3.3.1.4 Working Principles This topic describes how to create a tunnel and the working principles of a tunnel. 3.3.1.5 Tunnel Protection Group Automatic protection switching (APS) of the MPLS tunnel is a network protection mechanism. The protection MPLS tunnel protects the services transmitted in the working MPLS tunnel. When the working MPLS tunnel is faulty, the services are switched to the protection MPLS tunnel. In this way, the services transmitted in the working tunnel are protected. OptiX RTN equipment supports the 1+1 and 1:1 APS protection of the MPLS tunnel. 3.3.1.6 Application of the Tunnel As the carrier of PWs in the network, the MPLS Tunnel provides the service tunnel to transmit service packets. The MPLS Tunnel can carry various services, such as CES services, ATM/IMA services, Ethernet service and protocol packets. The MPLS Tunnel is mainly used for transparent transmission of point-to-point data service packets.

3.3.1.1 Introduction to the Tunnel


OptiX equipment supports the MPLS tunnel, which is a tunneling technology using the MPLSprotocol-based encapsulation, and the IP tunnel, which is a tunneling technology using the IPprotocol-based encapsulation.

MPLS Tunnel
As a transmission technology, the multi-protocol label switching (MPLS) can realize transparent transmission of data packets among users. The MPLS tunnel is the tunnel defined in the MPLS protocol. Independent from the service, the MPLS tunnel realizes the end-to-end transmission and carries the PWs related to the service. Figure 3-2 shows how the MPLS tunnel is used as the service transmission channel.

Issue 02 (2010-09-24)

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

3-5

3 End-to-End RTN IP Management

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

Figure 3-2 MPLS tunnel on the MPLS network

IMA E1 FE ATM STM-1

Ingress node

Transit node MPLS tunnel

Egress node

IMA E1 FE ATM STM-1

PW

The MPLS tunnel only provides an end-to-end channel, and does not care which service is encapsulated in the PW it carries. Data packets are first encapsulated in the PW, which is stuck with an MPLS label and sent to the MPLS tunnel for transmission. At the sink end, data packets are recovered and retain the original service features. In the tunnel, the intermediate nodes are called Transit nodes. Hence, a tunnel contains the Ingress node, Egress node and Transit nodes. Based on signaling types, MPLS tunnels can be classified into three types, that is, the static CR tunnel, RSVP TE tunnel, and LDP tunnel. These three types of tunnels are different and the details are as follows: l l Static CR tunnel: You need to specify the nodes that a static CR tunnel traverses. In addition, you can also specify the bandwidth and QoS of the tunnel. RSVP TE tunnel: You need to specify only the ingress and egress nodes for an RSVP TE tunnel. The MPLS protocol automatically calculates a route for the tunnel. In addition, you can specify constraint nodes to plan a specific route for the tunnel. You can configure FRR protection and the QoS function for an RSVP TE tunnel. Therefore, an RSVP tunnel is more flexible and safer than a static CR tunnel. LDP: You only need to specify the ingress and egress nodes for an LDP tunnel. Then, the LDP protocol sets up a route for the tunnel. An LDP tunnel functions on the network that supports the MPLS domain and thus is more flexible.

IP Tunnel
If ATM or CES emulation service that travels through an IP network is required, the RTN equipment can use the IP tunnel to carry the service. Figure 3-3 shows the protocol stack model of the ATM service. In the case of the IP tunnel, the situation is similar to that where "IP header" replaces the MPLS external label (MPLS tunnel label) to establish a tunnel in the IP network. An ATM emulation service can be provided between NE A and NE B, even though the IP network between NE A and NE B does not support the MPLS.

3-6

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

Issue 02 (2010-09-24)

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

3 End-to-End RTN IP Management

Figure 3-3 ATM PWE3 over IP tunnel

3.3.1.2 Standards and Protocols Compliance of the Tunnel


This topic describes the standards Compliance and the two protocols that the tunneling technology uses. They are the MPLS-LDP protocol and the MPLS-RSVP protocol.

MPLS-RSVP Protocol
Multi-protocol label switch resource reservation protocol (MPLS-RSVP) supports the distribution of MPLS labels. In addition, when transmitting the label binding message, it carries the resource reservation information, used as a signaling protocol to create, delete or modify the tunnel in the MPLS network. Basic Concepts of the MPLS-RSVP The MPLS-RSVP is a notification mechanism of the resource reservation in the network, which realizes the bandwidth reservation on the control plane. As a label distribution protocol, it is used to set up the LSP in the MPLS network. For details of the MPLS-RSVP extension, refer to RFC3209. Resource Reservation Style The LSP set up by using the MPLS-RSVP is of a certain reservation style. When the RSVP session is set up, the receive end determines which reservation style to be used, and thus determines which LSP to be used. l Fixed-filter (FF) style: When this style is used, resources are reserved for each transmit end individually. Thus, transmit ends in the same session cannot share the resources with each other. Shared-explicit (SE) style: When this style is used, resources are reserved for all transmit ends in the same session. Thus, transmit ends can share the resources.
NOTE

Currently, OptiX equipment supports only the SE resource reservation style.

MPLS-RSVP Message Type The MPLS-RSVP uses the following message types: l Path message: The transmit end sends this type of message in the transmission direction of data packets. In addition, the path state is saved on all the nodes along the trail.
Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. 3-7

Issue 02 (2010-09-24)

3 End-to-End RTN IP Management

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

Resv message: The receive end sends this type of message in the reverse transmission direction of data packets. In addition, the resource reservation is requested, and the reservation state is created and maintained on all the nodes along the trail.

Parameters of the MPLS-RSVP State Timer The parameters of the MPLS-RSVP state timer include the refreshing period of the Path or Resv message, multiple of the path state block (PSB) timeout and reservation state block (RSB) timeout. In the case of the creation of the LSP, the transmit end adds the LABEL_REQUEST object to the Path message. When the receive end receives the Path message with the LABEL_REQUEST object, it distributes one label and adds the label to the LABEL object of the Resv message. The LABEL_REQUEST object is saved in the PSB of the upstream node, and the LABEL object is saved in the RSB of the downstream node. When the message indicating that the number of message refreshing times exceeds the multiple of the PSB or RSB timeout is not continuously received, the corresponding state in the PSB or RSB is deleted. Assume that there is a resource reservation request, which does not pass the access control on some nodes. In some cases, this request is not supposed to be immediately deleted, but it cannot stop other requests from using its reserved resources. In this case, the node enters the blockade state, and the blockade state block (BSB) is generated on the node of the downstream. When the message indicating that the number of the message refreshing times exceeds the multiple of the PSB or RSB timeout is continuously received, the corresponding state in the BSB is deleted.

MPLS-LDP Protocol
The multi-protocol label switch label distribution protocol (MPLS-LDP) is used for the label switched routers (LSR) to distribute labels in the network. MPLS-LDP Peer Entities The MPLS-LDP peer entities refer to two NEs, where LDP session exists, use the MPLS-LDP to exchange labels mapping relation. MPLS-LDP Session The MPLS-LDP session is used to exchange label mapping and releasing messages between different equipment. The MPLS-LDP session consists the following two types: l l Local MPLS-LDP session, in which the two NEs used to set up the session is directly connected. Remote MPLS-LDP session, in which the two NEs used to set up the session is not directly connected.

MPLS-LDP Message Types The MPLS-LDP protocol mainly uses the following four types of messages: l l l l Discovery message, which is used to notify and maintain the existence of the equipment in the network. Session message, which is used to set up, maintain and end the session between MPLSLDP peer entities. Advertisement message, which is used to create, change and delete the label mapping. Notification message, which is used to provide the constructive message and error notification.
Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. Issue 02 (2010-09-24)

3-8

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

3 End-to-End RTN IP Management

Standards and Protocols Compliance


The tunneling technology is mainly compliant with the following: l l l l l ITU-T G.8110 MPLS layer network architecture ITU-T G.8110.1 Application of MPLS in the transport network ITU-T G.8121 Characteristics of transport MPLS equipment functional blocks RFC 3031 MPLS architecture RFC 3032 MPLS label stack encoding

3.3.1.3 Basic Concepts of the Tunnel


Multi-protocol label switching (MPLS) is a tunnel technology and enables a routing and switching platform that integrates the switching and forwarding technologies of labels and network-layer routing technologies. In the MPLS architecture, the control plane is connectionless and uses the powerful and flexible routing function of the IP network to meet the network requirements of new application; the data plane is connection-oriented and uses short and fixed-length labels to encapsulate packets for implementation of fast forwarding. This topic describes basic concepts of the tunnel. FEC Forwarding equivalence class (FEC) is a class of packets that are forwarded in the same way on an MPLS network. Label Label is a short and length-fixed identifier. The label identifies the FEC that a packet belongs to and functions only in the MPLS domain. One FEC may involve multiple labels but one label can only indicate one FEC. LDP Label distribution protocol (LDP) is the control protocol for MPLS. Similar to the signaling protocol of a traditional network, the LDP protocol is responsible for creation and maintenance of LSPs and PWs, FEC classification, and label distribution. MPLS can use the following label distribution protocols: l l LSP On an MPLS network, the trail that an FEC traverses is a label switched path (LSP), that is, a unidirectional trail from the ingress to egress. LSPs are classified into static LSPs and dynamic LSPs. Static LSPs should be manually configured and dynamic LSPs are dynamically generated by the LDP protocol. LSR Label switching router (LSR) is the basic element in an MPLS domain. All LSRs support the MPLS protocol. Each node on an LSP is an LSR. An edge LSR (LER) is at the edge of an MPLS domain and connects to other user networks. The core LSR is in the center of an MPLS domain. Packets travel along an LSP and enter an MPLS domain. The incoming LER is the ingress, the outgoing LER is the egress, and the intermediate nodes are the transit nodes. An LSR consists of the control unit and forward unit.
Issue 02 (2010-09-24) Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. 3-9

Protocols exclusive for label distribution, such as LDP. Existing protocols extended to support label distribution, such as RSVP-TE.

3 End-to-End RTN IP Management

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

l l

The control unit is responsible for label distribution, route selection, setup of label forward tables, and setup and removal of LSPs. The forward unit forwards received packets according to the label forward tables.

NHLFE Next hop label forwarding entry (NHLFE) describes the operations that an LSR performs on labels, including push, swap, and pop.

3.3.1.4 Working Principles


This topic describes how to create a tunnel and the working principles of a tunnel.

Process of Creating a Tunnel


Figure 3-4 shows the process of creating a tunnel. Meanwhile, the working principles of a tunnel are described. Figure 3-4 Process of creating a tunnel
Ingress node Label request packet Label mapping packet Set up the forward entry Transit node Label request packet Label mapping packet Allocate the ingress label and set up the forward entry Egress node

Allocate the ingress label and set up the forward entry

A tunnel is created as follows: 1. 2. 3. 4. 5. The ingress node uses the encapsulation protocol to calculates a path to the egress node and transmits a label request packet to the egress node in the direction of the path. After receiving the label request packets, the transit node forwards them to the egress node. After receiving the label request packet, the egress node allocates an ingress label for the tunnel, sets up a forward entry, and transmits a label mapping packet to the ingress node. After receiving the label mapping packet, the transit node allocates an ingress label for the tunnel, sets up a forward entry, and forwards the label mapping packet to the ingress node. After receiving the label mapping packet, the ingress node sets up a forward entry. The tunnel is created successfully between the ingress node and egress node.

Working Process of a Tunnel


Figure 3-5 shows the working process of a tunnel.

3-10

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

Issue 02 (2010-09-24)

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

3 End-to-End RTN IP Management

Figure 3-5 Working process of a tunnel


Tunnel

IMA E1 FE ATM STM-1

Ingress node MPLS Tunnel Packet FEC Push

Transit node

Egress IMA E1 node FE ATM STM-1

Swap PW

Pop

At each LSR, the LDP protocol and traditional routing protocol work together to set up the route table and label mapping table for the FEC as required. Each LSR node receives packets and performs the NHLFE operations for the packets: l Push: The ingress node receives packets and checks for the FEC that the packets belong to. Then, the ingress node adds labels on the packets and transmits the encapsulated MPLS packets to the next hop through the egress interface. Swap: A transit node uses the forward unit to forward the packets only according to packet labels and the label forward table. A transit node does not perform any Layer 3 operation for the packets. Pop: The egress node stripes the labels from the packets and forwards the packets.

3.3.1.5 Tunnel Protection Group


Automatic protection switching (APS) of the MPLS tunnel is a network protection mechanism. The protection MPLS tunnel protects the services transmitted in the working MPLS tunnel. When the working MPLS tunnel is faulty, the services are switched to the protection MPLS tunnel. In this way, the services transmitted in the working tunnel are protected. OptiX RTN equipment supports the 1+1 and 1:1 APS protection of the MPLS tunnel.

Basic Information
APS (Automatic Protection Switching) The automatic protection switching (APS) protocol is used to coordinate actions of the source and the sink in the case of bidirectional protection switching. By the APS protocol, the source and the sink cooperate with each other to perform functions such as protection switching, switching delay, and WTR function. According to ITU-T Y.1720, the source and the sink both need to select channels in the APS. In this case, the APS protocol is required for coordination. In the case of bidirectional protection switching, the APS protocol needs to be used regardless of the revertive mode. The APS protocol is always transmitted through the protection tunnel. Then, the equipment at either end knows that the tunnel from which the APS protocol is received is the protection tunnel of the opposite end and thus to determine whether the configuration about the working tunnel and the protection tunnel is consistent at the two ends. Switching Mode
Issue 02 (2010-09-24) Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. 3-11

3 End-to-End RTN IP Management

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

MPLS APS provides two switching modes, that is, single-ended switching and dual-ended switching. In the case of single-ended switching, when one end detects a fault, it only performs switching on the local end and does not instruct the opposite end to perform any switching. In the case of dual-ended switching, when one end detects a fault, it performs switching on the local end and also instructs the opposite end to perform switching. Single-ended switching does not require the APS protocol for negotiation and it features rapid and stable switching. Dual-ended switching ensures that the services are transmitted in a consistent channel, which facilitates service management. Revertive Mode The MPLS APS function supports two revertive modes, that is, revertive mode and non-revertive mode. In the non-revertive mode, services are not switched from the protection tunnel to the working tunnel even the working tunnel is restored to the normal state. In the revertive mode, services are switched from the protection tunnel to the original working tunnel if the working tunnel is restored to the normal state within the WTR time. WTR Time The WTR time refers to the period from the time when the original working tunnel is restored to the time when the services are switched from the protection tunnel to the original working tunnel. In certain scenarios, the state of the working tunnel is unstable. In this case, setting the WTR time can prevent frequent switching of services between the working tunnel and the protection tunnel. By default, the WTR time of the equipment is 5 minutes. Hold-off Time The hold-off time refers to the period from the time when the equipment detects a fault to the time when the switching operation is performed. When the equipment is configured with the MPLS APS protection and other protection, setting the hold-off time can ensure that other protection switching operations are performed first. By default, the hold-off time of the equipment is 0s.

Application of the Tunnel Protection


The MPLS tunnels of the same type are created in one tunnel protection group. In this way, 1:1 protection is provided to these MPLS tunnels. If the working MPLS tunnel fails, the Tunnel protection group ensures that services can still normally run. By using the U2000, the user can configure 1:1 protection for MPLS tunnels that carry important services. Figure 3-6 shows the protection principle for unicast tunnels.
3-12 Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. Issue 02 (2010-09-24)

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

3 End-to-End RTN IP Management

Figure 3-6 Principles of the tunnel protection


CE CE Working tunnel

Ingress node

Protection tunnel

Egress node

Configuration of source protection group

Configuration of sink protection group

3.3.1.6 Application of the Tunnel


As the carrier of PWs in the network, the MPLS Tunnel provides the service tunnel to transmit service packets. The MPLS Tunnel can carry various services, such as CES services, ATM/IMA services, Ethernet service and protocol packets. The MPLS Tunnel is mainly used for transparent transmission of point-to-point data service packets.

Transparent Transmission of Point-to-Point Data Packets


Commonly, the tunnel is used to provide a point-to-point channel for services such as EPL service. In this way, PEs on a RTN network can transparently transmit services. Figure 3-7 shows how point-to-multipoint data packets are transparently transmitted on a network.

Issue 02 (2010-09-24)

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

3-13

3 End-to-End RTN IP Management

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

Figure 3-7 Transparent transmission of point-to-point data packets

Third-party IP network

Node B PE RSVP TE network MPLS network

PE

RNC

IP tunnel Static CR tunnel RSVP TE tunnel LDP tunnel

An edge node on one network receives services from Node B, and transmits the services to the RNC connected to another PE. In this case, a point-to-point MPLS tunnel can be used. The application scenarios of different tunnels are as follows: l When an IP tunnel transmits services, the service can be transparently transmitted on a third-party IP network. Therefore, IP tunnels are used mainly when the services that the RTN equipment transmits need to be transparently transmitted on a third-party IP network. When a static CR tunnel transmits services, the service can be transparently transmitted on an entire MPLS network. Therefore, static CR tunnels are used mainly when high QoS is not required and the routes are specified. When an RSVP TE tunnel transmits services, the service can be transparently transmitted on an entire RSVP TE network. RSVP TE tunnels are used when high QoS and resource usage are required on a network. When an LDP tunnel transmits services, the service can be transparently transmitted on an entire MPLS network. LDP tunnels are widely used on MPLS VPNs. To prevent traffic congestion on a certain node of a VPN, you can configure the LDP over RSVP feature. That is, the LSP of an LDP tunnel traverses the RSVP TE domain and thus the LDP tunnel can transmit VPN services.

When all the preceding tunnels traverse the third-party equipment, you can set the third-party equipment as a virtual node to ensure that the tunnels are created properly.

3.3.2 Tunnel Configuration Flow


This section describes the operation tasks for configuring the Tunnel, and relations among these tasks. When configuring and managing the Tunnel, follow the configuration flow. Configure and manage Tunnels by following the configuration flow shown in Figure 3-8.

3-14

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

Issue 02 (2010-09-24)

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

3 End-to-End RTN IP Management

Figure 3-8 Tunnel configuration flow


Required Optional Creating Network Start

Configure the network-side interface

Configure the LSR ID

Configure the control plane

Create the Tunnel

End

For the detailed configuration tasks shown in Figure 3-8, see Table 3-1. Table 3-1 Tunnel configuration tasks Task 1. Create Network 2. Configure the network-side interface 3. Configure the LSR ID Remarks To create a network, you need to create NEs, configure NE data, create fibers and crate level 2 link. Set the general attributes and Layer 3 attributes (tunnel enable status and IP address) for interfaces to carry the tunnel carrying. Specifies the LSR ID for each NE that a service traverses and the start value of the global label space. Each LSR ID is unique on a network.

Issue 02 (2010-09-24)

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

3-15

3 End-to-End RTN IP Management

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

Task 4. Configure the control plane

Remarks Set the protocol parameters related to the control plane to create the tunnel. l When you create a static CR tunnel to carry services, you do not need to set the parameters relevant to the control plane but you need to manually add labels. l When you create an RSVP TE tunnel to carry services, the LDP automatically distributes labels. In this case, you need to set the parameters relevant to the control plane. 1. Set the IGP-ISIS protocol parameters. 2. Set the MPLS-RSVP protocol parameters. l When you create an LDP Tunnel to carry services, the LDP automatically distributes labels. In this case, you need to set the parameters relevant to the control plane. 1. Set the IGP-ISIS protocol parameters. 2. Create the MPLS-LDP. l When you create an IP tunnel to carry services, the label distribution protocol automatically allocates the forwarding label value. In addition, you need to configure parameters relevant to the control plane. Create a static route table.
NOTE To configure parameters relevant to the control plane, refer to the descriptions of configuring the control plane in the Operation Guide for RTN NE Management.

5. Create the Tunnel

Configure the basic information, equipment list, advanced attributes of the tunnel.

3.3.3 Configuring a Tunnel


This topic describes how to configure a tunnel, such as creating a tunnel, deploying a tunnel, viewing discrete tunnels, and deleting a tunnel. 3.3.3.1 Creating a Tunnel This topic describes how to create a tunnel in the end-to-end mode. You can create a tunnel easily and efficiently. 3.3.3.2 Creating Tunnels in Batches In certain commonly used networks, the U2000 provides the function of creating tunnels in batches. Currently, you can create only RSVP-TE tunnels in batches. 3.3.3.3 Creating a Protection Group This topic describes how to create a tunnel protection group. If a tunnel protection group is created, the services carried over the active tunnel is switched over to the protection tunnel when the working tunnel is faulty.
3-16 Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. Issue 02 (2010-09-24)

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

3 End-to-End RTN IP Management

3.3.3.4 Configuring OAM for a Tunnel This topic describes how to configure OAM for a tunnel. 3.3.3.5 Automatic Search for Protection Groups This topic describes automatic search for protection groups. With this function, you can recover the protection group existing on the current network to the end to end management module of the NMS for monitoring. In this manner, you can ensure the normal running of these protection group. 3.3.3.6 Deploying a Tunnel This topic describes how to apply the settings of a tunnel to NEs. 3.3.3.7 Viewing a Discrete Tunnel To view a discrete tunnel facilitates the management of discrete tunnels. 3.3.3.8 Deleting a Tunnel This topic describes how to delete a tunnel on the U2000.

3.3.3.1 Creating a Tunnel


This topic describes how to create a tunnel in the end-to-end mode. You can create a tunnel easily and efficiently.

Prerequisite
You must be an NM user with "network operator" authority or higher. You must complete the correct configuration of the port attributes. You must complete the correct setting of the LSR ID for each NE. The control plane must be configured for the RSVP-TE, and IP tunnels.

Procedure
Step 1 Choose Service > Tunnel > Create Tunnel from the main menu.

Issue 02 (2010-09-24)

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

3-17

3 End-to-End RTN IP Management

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

Step 2 Configure basic information.


NOTE

l When you create a reverse tunnel, the U2000 automatically allocates different Tunnel Name to the forward and reverse tunnels. If you manually set Tunnel Name for the forward tunnel, the U2000 automatically set Tunnel Name to Forward Tunnel Name+_Reverse for the reverse tunnel. l When "Signaling Type" is set to be Static CR. In this case, if you select Create Reverse Tunnel, the U2000 creates two unidirectional tunnels in two opposite directions. If you select Create Bidirectional Tunnel, the U2000 creates a bidirectional tunnel, which has two opposite directions. l When "Signaling Type" is set to be Static CR, You can select the "Create Protection Group", the tunnel and the protection group of tunnel are created at the same time. l The "Template" parameter is available only when the "Signaling Type" parameter is set to RSVP TE. You can configure the detailed information of a tunnel by using a template. l When you create a RSVP-TE tunnel, you can select the "Configure As Bypass Tunnel" check box to create a bypass protection tunnel. l A static CR tunnel is created on the basis of certain constraints. The mechanism for creating and managing those constraints are constraint-based routing (CR). Different from a static tunnel, the establishment of a CR tunnel depends on the routing information and other conditions, for example, the specified bandwidth, the fixed route, and QoS parameters. The PTN supports only the static CR tunnel.

Step 3 Configure the NE list. 1. Select the source and sink NEs or the transit NE and configure the NE location in a tunnel in the NE Role column. You can select an NE in the following methods: l Manner 1: In the physical topology in the upper right pane, select the required NE, rightclick and choose Add from the shortcut menu. l Manner 2: In the physical topology in the upper right pane, double-click the required NE. l Manner 3: a.
3-18

Click Add and select NE from the drop-down list.


Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. Issue 02 (2010-09-24)

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

3 End-to-End RTN IP Management

b.

In the dialog box that is displayed, select the required NE and click OK.

NOTE

In the case of an RSVP-TE, LDP, or IP tunnel, you need to specify only the source and sink nodes of the tunnel. In the case of a static CR tunnel, you need to specify the source node, sink node, and transit nodes of the tunnel. You can choose Add and select Virtual Node from the drop-down list to specify virtual nodes through which a tunnel travels. A virtual node simulates an NE beyond the management range of the U2000. The virtual node is used for creating a tunnel whose source NE is on the U2000 but the sink NE is not on the U2000.

2.

Optional: In the case of a static CR tunnel. Set the route calculation for the U2000 as follows: a. b. c. Select Auto-Calculate route. Then, the U2000 automatically calculates the routes for a tunnel after you finish steps 2 and 3. Set Restriction Bandwidth(Kbit/s) and specify the source and sink nodes. Specify route constraint. Specifically, you can click Route Restriction and specify route constraint in the dialog box that is displayed. Alternatively, you can specify the explicit and excluded restriction through shortcut menu items in the physical topology.
NOTE

You can set NEs or ports as route constraints as required.

d.

If you do not select Auto-Calculate route, you can click Calculate Route to calculate the routes for a tunnel in the U2000.
NOTE

A layer 2 link must be configured before route calculation, refer the chapter of topology management to configure the layer 2 link. By default, the shortest route is selected from the routes that are calculated according to Restriction Bandwidth(Kbit/s) and route constraints.

You select Create Protection Group and click Configure Protection Group to configure parameters relevant to the protection group. Step 4 Click Details to configure details of the tunnel.
NOTE

l It is recommended that you configure details of an RSVP-TE tunnel by using a template. l In the case of a static CR tunnel, Next Hop is the IP address of the ingress port of the next node in the direction of the tunnel. l In the case of a static CR tunnel, double-click Out Interface or In Interface. In the dialog box that is displayed, select an interface and click Configure to configure the attributes of the interface or click Add Virtual Interface to create Ethernet virtual interface.

Step 5 Optional: In the case of static CR tunnel, if you select Create Protection Group, you can click Configure Protection Group to configure parameters relevant to the protection group and click Configure OAM to configure OAM parameters relevant to the protection group. Step 6 Select the Deploy check box and click OK.

Issue 02 (2010-09-24)

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

3-19

3 End-to-End RTN IP Management


NOTE

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

l If you clear the Deploy check box, the configuration data information is stored only on the U2000. If you select the Deploy check box, the configuration data information is stored on the U2000 and applied to NEs. By default, the Deploy check box is selected. l When you select the Deploy and Enable check box, A tunnel is available on NEs only when it is enabled.

----End

3.3.3.2 Creating Tunnels in Batches


In certain commonly used networks, the U2000 provides the function of creating tunnels in batches. Currently, you can create only RSVP-TE tunnels in batches.

Prerequisite
You must be an NM user with "network operator" authority or higher. Configuration of the port attributes must be correct. Settings of the LSR ID for each NE must be correct. Configuration of the control plan for each NE must be correct.

Procedure
Step 1 Choose Service > Tunnel > Batch Create Tunnel from the main menu.

Step 2 Configure basic information. In the Basic Information field, set the Network Type, Protocol Type and Signaling Type parameters.

3-20

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

Issue 02 (2010-09-24)

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management
NOTE

3 End-to-End RTN IP Management

Currently, the U2000 supports the following networking modes: l 1. Full-Mesh: The equipment is bidirectionally and fully connected. l 2. Hub-Spoke: All spoke nodes and hub nodes are directionally connected. In addition, the hub nodes are bidirectionally and fully connected. l 3. Ring: Bidirectional connections are generated based on rings. You can set the Template parameter when the Signaling Type parameter is set to RSVP TE.

Step 3 Configure the NE list. 1. Select the source and sink NEs or the transit NE and configure the NE location in a tunnel in the NE Role column. You can select an NE in the following manners: l Manner 1: In the physical topology in the upper right pane, select the required NE, rightclick and choose Add from the shortcut menu. l Manner 2: In the physical topology in the upper right pane, double-click the required NE. l Manner 3: a. b. 2. Click Add and select NE from the drop-down list. In the dialog box that is displayed, select the required NE and click OK.

Optional: You can set the NE Role parameter when the Network Type parameter is set to Hub-Spoke.

Step 4 Click Auto-Assign. Then, the U2000 automatically assigns IDs to the tunnels created in batches.
NOTE

You can also enter tunnel IDs.

Step 5 Configure details of tunnels. l In the case of RSVP-TE tunnels, set the General, TE Information, Trail Information, Protection Attribute, QoS Information, and Advance Information parameters. l In the case of LDP tunnels, set the EXP parameter. Step 6 Select the Deploy check box and click OK.
NOTE

If you select the Deploy check box, the tunnel information is stored on the U2000 and applied to NEs. By default, the Deploy check box is selected. When you select the Deploy and Enable check box, A tunnel is available on NEs only when it is enabled.

----End

3.3.3.3 Creating a Protection Group


This topic describes how to create a tunnel protection group. If a tunnel protection group is created, the services carried over the active tunnel is switched over to the protection tunnel when the working tunnel is faulty.

Prerequisite
You must be an NM user with "network operator" authority or higher. The working and protection tunnels of an MPLS tunnel must be created.
Issue 02 (2010-09-24) Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. 3-21

3 End-to-End RTN IP Management

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

Context
Figure 3-9 shows the window for creating a tunnel protection group. Figure 3-9 The figure of tunnel protection group

Precautions: l l The MPLS APS protection must not be coupled with the FRR, LMSP, LAG, and microwave 1+1 protection. The protection tunnel should not carry any extra service.

Procedure
Step 1 Choose Service > Tunnel > Create Protection Group from the main menu. Step 2 Configure basic information of a tunnel protection group.
NOTE

If a tunnel protection group is of the 1+1 protection type, services are dually fed on the source and selectively received on the sink. If a tunnel protection is of the 1:1 protection type, services are processed in the single fed single receiving mode. Single-ended switching refers to the scenario wherein only the local end is switched but the peer end is not notified to switch when a fault occurs at one end. Single-ended switching does not negotiate by using negotiation packets. Therefore, it is fast and reliable. Dual-ended switching refers to the scenario wherein the local end is switched and the peer end is notified to switch when a fault occurs at one end. In the case of dual-ended switching, the come-and-go path of a service is the same. This facilitates service management.

Step 3 Click Add. In the dialog box that is displayed, select the working tunnel and the protection tunnel and click OK. Step 4 Optional: Select a required tunnel, click Configure OAM, and then configure the OAM information of the tunnel. An OAM packet is used to detect the connectivity of a link. When a fault occurs on the working tunnel, services are switched to the protection tunnel.
3-22 Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. Issue 02 (2010-09-24)

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

3 End-to-End RTN IP Management

NOTE

By default, the OAM status is enabled for the protection tunnel, to ensure that the duration of switching to the protection tunnel is less than 50 ms, set the detect type to FFD and the frequency to 3.3. It is optional to configure OAM. If you do not configure it, the U2000, by default, enables the OAM of the tunnel protection group when you configure the tunnel protection group. You can set other OAM parameters only when you set OAM Status to Enabled. You can set Detection Packet Type and Detection Packet Period(ms) only when you set Detection Mode of the sink to Manual. The value of SF Threshold must be equal to or greater than the value of SD Threshold.

Step 5 Configure attributes of the tunnel protection group. Step 6 Choose Deploy. Click OK. ----End

3.3.3.4 Configuring OAM for a Tunnel


This topic describes how to configure OAM for a tunnel.

Prerequisite
l
Issue 02 (2010-09-24)

You must be an NM user with "network operator" authority or higher.


Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. 3-23

3 End-to-End RTN IP Management

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

l l

The running status of RSVP TE tunnel is UP. OAM cannot be configured for an IP tunnel.

Procedure
Step 1 Choose Service > Tunnel > Manage Tunnel from the main menu. Step 2 In the Set Filter Criteria dialog box set the filter criteria. Then, click Filter. The services meeting the filter criteria are displayed in the query result area. Step 3 Right-click a required tunnel and choose OAM > Configure OAM from the shortcut menu. Step 4 In the dialog box that is displayed, set OAM parameters of the tunnel.

Step 5 Click OK. Step 6 Select one or more tunnel, right click and choose OAM > Enable OAM to enable the OAM of tunnel. ----End

3.3.3.5 Automatic Search for Protection Groups


This topic describes automatic search for protection groups. With this function, you can recover the protection group existing on the current network to the end to end management module of
3-24 Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. Issue 02 (2010-09-24)

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

3 End-to-End RTN IP Management

the NMS for monitoring. In this manner, you can ensure the normal running of these protection group.

Prerequisite
You must be an NM user with "network operator" authority or higher.

Procedure
Step 1 Choose Service > Tunnel > Search for Protection Group from the main menu. Step 2 In the dialog box that is displayed, click Add, select required equipment, and then click OK. Step 3 Click OK. A dialog box is displayed indicating the number of protection groups. Step 4 Click OK in the Prompt dialog box. ----End

3.3.3.6 Deploying a Tunnel


This topic describes how to apply the settings of a tunnel to NEs.

Prerequisite
You must be an NM user with "network operator" authority or higher.

Procedure
Step 1 Choose Service > Tunnel > Manage Tunnel from the main menu. Step 2 In the Set Filter Criteria dialog box set the filter criteria. Then, click Filter. The services meeting the filter criteria are displayed in the query result area. Step 3 Right-click a tunnel whose settings are not applied to NEs and choose Deploy from the shortcut menu.

Issue 02 (2010-09-24)

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

3-25

3 End-to-End RTN IP Management

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

Step 4 Click Close in the dialog box displayed. ----End

3.3.3.7 Viewing a Discrete Tunnel


To view a discrete tunnel facilitates the management of discrete tunnels.

Prerequisite
You must be an NM user with "network operator" authority or higher. A discrete tunnel must exist on the U2000.

Procedure
Step 1 Choose Service > Tunnel > Manage Discrete Tunnel from the main menu. Step 2 Click Filter Criteria. In the dialog box that is displayed, set filtering criteria and click Filter. Step 3 On the discrete tunnel management window, select a discrete tunnel, click the corresponding tab to view details. Step 4 Optional: Select a discrete tunnel, click Delete button and click Yes in the dialog box displayed. ----End

3.3.3.8 Deleting a Tunnel


This topic describes how to delete a tunnel on the U2000.

Prerequisite
You must be an NM user with "network operator" authority or higher.
3-26 Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. Issue 02 (2010-09-24)

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

3 End-to-End RTN IP Management

A tunnel must exist on the U2000.

Procedure
Step 1 Choose Service > Tunnel > Manage Tunnel from the main menu. Step 2 Click Filter to set the filter criteria. Then, click OK. The services meeting the filter criteria are displayed in the query result area.. Step 3 Right-click a required tunnel and choose Delete from the shortcut menu.
NOTE

Deleting a tunnel is to delete a tunnel on a per-NE basis and an end-to-end tunnel. When you choose Delete from Network Side, only the data about end-to-end tunnels is deleted. A discrete tunnel cannot be deleted from the network side.

Step 4 In the dialog box that is displayed, click Yes. ----End

3.3.4 Monitoring a Tunnel


This topic describes how to monitor a tunnel to facilitate tunnel services management. 3.3.4.1 Viewing the VPN Service Carried on a Tunnel TAfter viewing VPN services that are transmitted in a tunnel, you can conveniently manage the tunnel and the VPN services. 3.3.4.2 Viewing the Topology of a Tunnel This topic describes how to view the tunnel topology. By viewing the topology of a tunnel, you can learn the topology structure and running status of the tunnel in real time 3.3.4.3 Viewing the Performance of a Tunnel This topic describes how to view the performance of a tunnel. 3.3.4.4 Viewing the Alarms of a Tunnel This topic describes how to view the alarms of a tunnel. 3.3.4.5 Monitoring the Running Status of a Tunnel By using this function, you can view the running status of a tunnel in real time. 3.3.4.6 Viewing the LSP Topology of a Tunnel This topic describes how to view the LSP topology of a tunnel. To view the actual routing information of a tunnel, you can perform this operation. 3.3.4.7 Diagnosing a Tunnel This topic describes how to diagnose a tunnel by performing the LSP ping and LSP tracert tests.

3.3.4.1 Viewing the VPN Service Carried on a Tunnel


TAfter viewing VPN services that are transmitted in a tunnel, you can conveniently manage the tunnel and the VPN services.

Prerequisite
You must be an NM user with "NM monitor" authority or higher.
Issue 02 (2010-09-24) Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. 3-27

3 End-to-End RTN IP Management

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

Procedure
Step 1 Choose Service > Tunnel > Manage Tunnel from the main menu. Step 2 In the Set Filter Criteria dialog box set the filter criteria. Then, click Filter. The services meeting the filter criteria are displayed in the query result area. Step 3 Right-click a required tunnel and choose View VPN from the shortcut menu.
NOTE

You can view the VPN service of only one tunnel at a time. You can view the end-to-end services that are transmitted in a tunnel, but not the discrete services that are transmitted in the tunnel.

Step 4 View information of the VPN service carried on the tunnel in View VPN window. Step 5 Optional: Select a required VPN service, click View Details. In the relevant service management window, you can view or modify parameters of the VPN service. ----End

3.3.4.2 Viewing the Topology of a Tunnel


This topic describes how to view the tunnel topology. By viewing the topology of a tunnel, you can learn the topology structure and running status of the tunnel in real time

Prerequisite
You must be an NM user with "NM monitor" authority or higher.

Procedure
Step 1 Choose Service > Tunnel > Manage Tunnel from the main menu. Step 2 In the Set Filter Criteria dialog box set the filter criteria. Then, click Filter. The services meeting the filter criteria are displayed in the query result area. Step 3 Select a required tunnel and view the topology of the tunnel. Perform the following operations as required. l On the Topology tab page, right-click an NE and choose View Real-Time Performance or NE Explorer from the shortcut menu. l On the Topology tab page, right-click a link and choose Fast Diagnose, View VPN, View LSP Topology, or Alarm from the shortcut menu.
NOTE

You can view the real-time performance of only the tunnels that are in the deployed states. You can view the LSP topology of the RSVP TE tunnel that is in the UP running state.

3-28

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

Issue 02 (2010-09-24)

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

3 End-to-End RTN IP Management

Step 4 Optional: On the window for creating a tunnel, click the Service Topology tab to view topology information of the new tunnel. Step 5 Optional: In the Main Topology, click Current View, select Tunnel View from the drop-down list, and then view the topology of the tunnel in the network-side tunnel topology view. ----End

3.3.4.3 Viewing the Performance of a Tunnel


This topic describes how to view the performance of a tunnel.

Prerequisite
You must be an NM user with "NM monitor" authority or higher.

Procedure
Step 1 Choose Service > Tunnel > Manage Tunnel from the main menu. Step 2 In the Set Filter Criteria dialog box set the filter criteria. Then, click Filter. The services meeting the filter criteria are displayed in the query result area. Step 3 View the runtime performance of a tunnel. Right-click the NE and choose View Real-Time Performance from the shortcut menu in the topology view. Step 4 Create a monitoring instance for a tunnel. For details, refer to the chapter of monitoring instance management in Performance Management System (PMS). Step 5 View the history performance of a tunnel. Right-click a required tunnel and choose Performance > View History Data from the shortcut menu. ----End

3.3.4.4 Viewing the Alarms of a Tunnel


This topic describes how to view the alarms of a tunnel.
Issue 02 (2010-09-24) Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. 3-29

3 End-to-End RTN IP Management

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

Prerequisite
You must be an NM user with "NM monitor" authority or higher.

Procedure
Step 1 Choose Service > Tunnel > Manage Tunnel from the main menu. Step 2 In the Set Filter Criteria dialog box set the filter criteria. Then, click Filter. The services meeting the filter criteria are displayed in the query result area. Step 3 View the Alarm Status parameter of a tunnel. Step 4 Right-click a required tunnel and choose Alarm > View Current Alarm from the shortcut menu to view current alarms of the tunnel. Step 5 Right-click a required tunnel and choose Alarm > View History Alarm from the shortcut menu to view history alarms of the tunnel. ----End

3.3.4.5 Monitoring the Running Status of a Tunnel


By using this function, you can view the running status of a tunnel in real time.

Prerequisite
You must be an NM user with "network operator" authority or higher.

Procedure
Step 1 Choose Service > Tunnel > Manage Tunnel from the main menu. Step 2 In the Set Filter Criteria dialog box set the filter criteria. Then, click Filter. The services meeting the filter criteria are displayed in the query result area. Step 3 Right-click the tunnel and select Update Running Status, view the Running Status parameter of a tunnel. ----End

3.3.4.6 Viewing the LSP Topology of a Tunnel


This topic describes how to view the LSP topology of a tunnel. To view the actual routing information of a tunnel, you can perform this operation.

Prerequisite
You must be an NM user with "NM monitor" authority or higher. The RSVP-TE tunnel must support this operation and the running status of tunnel is UP. The function of viewing a tunnel must be supported.
3-30 Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. Issue 02 (2010-09-24)

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

3 End-to-End RTN IP Management

Procedure
Step 1 Choose Service > Tunnel > Manage Tunnel from the main menu. Step 2 In the Set Filter Criteria dialog box set the filter criteria. Then, click Filter. The services meeting the filter criteria are displayed in the query result area. Step 3 Right-click a required tunnel and choose View LSP Topology from the shortcut menu. Click the link in the dialog box that is displayed, view the actual routing information of the tunnel. ----End

3.3.4.7 Diagnosing a Tunnel


This topic describes how to diagnose a tunnel by performing the LSP ping and LSP tracert tests.

Prerequisite
You must be an NM user with "network operator" authority or higher. In the case of a static CR tunnel, the IS-IS protocol must be enabled on the source and sink ports of an MPLS tunnel. Alternatively, a diagnose test must be initiated at the local NE and a static route in control plane must be configured on the opposite NE.

Procedure
Step 1 Choose Service > Tunnel > Manage Tunnel from the main menu. Step 2 In the Set Filter Criteria dialog box set the filter criteria. Then, click Filter. The services meeting the filter criteria are displayed in the query result area. Step 3 Configure a scheduled test. 1. 2. 3. 4. 1. 2. 3. Right-click a required tunnel and choose Diagnose > Create Test Suite from the shortcut menu. Select the Select check box and click Next. Select the LSP Ping check box and click Details. In the dialog box that is displayed, set advance test parameters and click OK. Set parameters in the Test Time field, click Add, and then click Finish. Right-click a required tunnel and choose Diagnose > View Test Strategy from the shortcut menu. Click Condition. In the dialog box that is displayed, set relevant criteria and click OK. Click Query. Select a record and click Task Information and Associated Test Suite to view relevant information. Right-click a required tunnel and choose Diagnose > View Test Result from the shortcut menu. Click Query to view the result of a scheduled test. Optional: Click Export Result to export the result of the scheduled test to local computer.
Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. 3-31

Step 4 View the test strategy.

Step 5 View the result of a scheduled test. 1. 2. 3.


Issue 02 (2010-09-24)

3 End-to-End RTN IP Management


NOTE

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

The result of a scheduled test can be exported in a .cvs, .html, .xls, .pdf or .txt file.

Step 6 Configure a manual test. 1. 2. 3. 4. Right-click a required tunnel and choose Test and Check from the shortcut menu. Optional: Select the LSP Ping or ICMP Ping check box and click box that is displayed, set parameters of the ping test and click OK. . In the dialog

Optional: Select the LSP Tracert or ICMP Tracert check box and click . In the dialog box that is displayed, set parameters of the LSP tracert test and click OK. Click Run and view the test result on the right pane.

----End

3.3.5 Configuration Example (Static CR Tunnel)


This topic describes a networking diagram and the corresponding example of configuring a static CR tunnel on the network. 3.3.5.1 Networking Diagram This topic describes the networking topology of the NEs. 3.3.5.2 Service Planning This topic describes parameters that are required for the data configuration. 3.3.5.3 Configuration Process (Creating a Static CR Tunnel) This topic describes how to create a static CR tunnel by using the trail function.

3.3.5.1 Networking Diagram


This topic describes the networking topology of the NEs. Between BTS and BSC, the voice service is transported through the RTN equipment and the static MPLS tunnel service needs to be created, as shown in Figure 3-10. Figure 3-10 Networking diagram of the MPLS tunnel
NE4

NE1 BTS

Packet Swtiching Network

NE3

BSC

Working tunnel NE2 Bypass tunnel

3-32

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

Issue 02 (2010-09-24)

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

3 End-to-End RTN IP Management

The voice service requires high network security. The service tunnel between NE1 and NE3 is configured with 1:1 protection. In the case of a service that requires high network security, MPLS APS protection can be configured to protect the service. l l The NE1-to-NE3 working tunnel is along the NE1-NE2-NE3 trail. NE2 is the transit node. The NE1-to-NE3 protection tunnel is along the NE1-NE4-NE3 trail. When the NE1-NE2 link fails or NE2 fails, the protection tunnel protects the working tunnel.

3.3.5.2 Service Planning


This topic describes parameters that are required for the data configuration.

Microwave Port Planning


Table 3-2 Microwave port planning NE Microwave Port 3-IFE2-1 4-IFE2-1 3-IFE2-1 4-IFE2-1 3-IFE2-1 4-IFE2-1 3-IFE2-1 4-IFE2-1 Peer NE NE2 NE4 NE3 NE1 NE4 NE2 NE1 NE3 Peer Microwave Port 4-IFE2-1 3-IFE2-1 4-IFE2-1 3-IFE2-1 4-IFE2-1 3-IFE2-1 4-IFE2-1 3-IFE2-1

NE1

NE2

NE3

NE4

NE Parameter Planning
Table 3-3 NE parameter planning NE NE1 LSR ID 1.0.0.1 Port 3-IFE2-1 4-IFE2-1 3-IFE2-1 4-IFE2-1 3-IFE2-1 4-IFE2-1 Port IP 10.1.1.1 10.1.4.2 10.1.2.1 10.1.1.2 10.1.3.1 10.1.2.2 Mask 255.255.255.252 255.255.255.252 255.255.255.252 255.255.255.252 255.255.255.252 255.255.255.252
3-33

NE2

1.0.0.2

NE3

1.0.0.3

Issue 02 (2010-09-24)

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

3 End-to-End RTN IP Management

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

NE NE4

LSR ID 1.0.0.4

Port 3-IFE2-1 4-IFE2-1

Port IP 10.1.4.1 10.1.3.2

Mask 255.255.255.252 255.255.255.252

Tunnel Planning
Table 3-4 Tunnel planning Parameter Tunnel ID Tunnel Name Signaling Type Protocol Type LSP Type EXP CIR(Kbit/s) Ingress Node Transit Node Egress Node Ingress Node Route Information 100 Working Tunnel Static CR MPLS E-LSP None No Limit NE1 NE2 NE3 NE1 l Out Interface: 3IFE2-1 (Port-1) l Out Label: 20 Transit Node Route Information NE2 l In Interface: 4-IFE2-1 (Port-1) l In Label: 20 l Out Interface: 3IFE2-1 (Port-1) l Out Label: 30
3-34

Working Tunnel 101 Working Tunnel_Reverse Static CR MPLS E-LSP None No Limit NE3 NE2 NE1 NE3 l Out Interface: 4-IFE2-1 (Port-1) l Out Label: 21 120

Protection Tunnel 121 Protection Tunnel_Reverse Static CR MPLS E-LSP None No Limit NE3 NE4 NE1 NE3 l Out Interface: 3IFE2-1 (Port-1) l Out Label: 23 NE4 l In Interface: 4-IFE2-1 (Port-1) l In Label: 23 l Out Interface: 3IFE2-1 (Port-1) l Out Label: 33
Issue 02 (2010-09-24)

Protection Tunnel Static CR MPLS E-LSP None No Limit NE1 NE4 NE3 NE1 l Out Interface: 4IFE2-1 (Port-1) l Out Label: 22

NE2 l In Interface: 3-IFE2-1 (Port-1) l In Label: 21 l Out Interface: 4-IFE2-1 (Port-1) l Out Label: 31

NE4 l In Interface: 3-IFE2-1 (Port-1) l In Label: 22 l Out Interface: 4IFE2-1 (Port-1) l Out Label: 32

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

3 End-to-End RTN IP Management

Parameter Egress Node Route Information NE3

Working Tunnel NE1 l In Interface: 3-IFE2-1 (Port-1) l In Label: 31 NE3 l In Interface: 4-IFE2-1 (Port-1) l In Label: 30

Protection Tunnel NE1 l In Interface: 4-IFE2-1 (Port-1) l In Label: 33 l In Interface: 3-IFE2-1 (Port-1) l In Label: 32

Protection Group Planning


Table 3-5 Planning of protection group parameters Parameter Group Name Protection Type Switch Mode Protocol Status Revertive Mode Hold-off Time(100ms) WTR Time(min) Tunnel Type Vlaue Protection Group 1:1 Double Ended Enable Revertive 0 5 Working Tunnel: Forward Working Protection Tunnel:Forward Protecting Protection Tunnel_Reverse: Backward Working Working Tunnel_Reverse: Backward Protecting

3.3.5.3 Configuration Process (Creating a Static CR Tunnel)


This topic describes how to create a static CR tunnel by using the trail function.

Prerequisite
l l l You must be an NM user with "NE operator" authority or higher. You must understand the networking, requirements and service planning of the example. A network must be created.

Procedure
Step 1 Configure the microwave port that carries the MPLS tunnel.
Issue 02 (2010-09-24) Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. 3-35

3 End-to-End RTN IP Management

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

1.

Select the NE from the Object Tree in the NE Explorer. Choose Configuration > Interface Management > Microwave Interface from the Function Tree to configure the networkside interface. In the General Attributes tab, select the 3-IFE2-1(Port-1)and 4-IFE2-1(Port-1). Rightclick the Port Mode filed and select Layer 3. Set the parameters as required, and click Apply.

2.

NOTE

l When Port Mode is set to Layer 2, the Encapsulation Type support Null, 802.1Q and QinQ. l When Port Mode is set to Layer 3, the Encapsulation Type support 802.1Q, and then the interface can be used by tunnel.

3.

Select 3-IFE2-1(Port-1) and 4-IFE2-1(Port-1) on the Layer 3 Attributes tab page. Rightclick the Enable Tunnel field and choose Enabled from the shortcut menu. Right-click the Specify IP Address field and choose Manually from the shortcut menu. Then, set the parameters, such as IP Address and IP Mask, and click Apply.

Parameter Enable Tunnel

Example Value Enabled

Principle for Value Selection Set this parameter according to the service planning. The maximum reserved bandwidth should not exceed the physical bandwidth of the bearer port. It is configured only for a dynamic tunnel. You can set the port IP address when Manually is selected. Set this parameter according to the service planning. Set this parameter according to the service planning.

Max Reserved Bandwidth (Kbit/s)

1000000

Admin Group Specify IP Address

0 Manually

IP Address

3-IFE2-1(Port-1): 10.1.1.1 4-IFE2-1(Port-1): 10.1.4.2

IP Mask

255.255.255.252

4.

Display the NE Explorer for NE2, NE3, and NE4 separately. Perform Step 1.1 through Step 1.3 to set parameters of relevant interfaces. Set the relevant parameters as follows:

3-36

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

Issue 02 (2010-09-24)

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

3 End-to-End RTN IP Management

The general attributes and Layer 3 attributes of each interface are consistent with those of NE1-4-IFE2-1(Port-1), except that the IP addresses are different. The Layer 3 attributes for each interface are set as follows: Parameter IP Address Example Value The layer 3 attributes of each port are as follows: l NE2-3-IFE2-1(Port-1) IP Address: 10.1.2.1 l NE2-4-IFE2-1(Port-1) IP Address: 10.1.1.2 l NE3-3-IFE2-1(Port-1) IP Address: 10.1.3.1 l NE3-4-IFE2-1(Port-1) IP Address: 10.1.2.2 l NE4-3-IFE2-1(Port-1) IP Address: 10.1.4.1 l NE4-4-IFE2-1(Port-1) IP Address: 10.1.3.2 Principle for Value Selection Set this parameter according to the service planning.

Step 2 Set LSR IDs. 1. 2. In the NE Explorer, select NE1 and choose Configuration > MPLS Management > Basic Configuration from the Function Tree. Set LSR ID, Start of Global Label Space, and other parameters. Click Apply.

Parameter LSR ID

Example Value NE1: 1.0.0.1

Principle for Value Selection Set this parameter according to the network planning. In addition, this value is unique on the entire network. Set this parameter according to the network planning.

Start of Global Label Space

3.

Display the NE Explorer of NE2, NE3, and NE4 separately and perform the preceding two steps to set the parameters, such as LSR ID.

Issue 02 (2010-09-24)

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

3-37

3 End-to-End RTN IP Management

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

Parameter LSR ID

Example Value NE2: 1.0.0.2 NE3: 1.0.0.3 NE4: 1.0.0.4

Principle for Value Selection Set this parameter according to the network planning. In addition, this value is unique on the entire network. Set this parameter according to the network planning.

Start of Global Label Space

Step 3 Create the working tunnel. 1. 2. Choose Service > Tunnel > Create Tunnel from the main menu. Set the basic information about the working tunnel.

Parameter Tunnel Name

Example Value Working Tunnel

Principle for Value Selection Set this parameter according to the service planning. Set this parameter according to the service planning. Set this parameter according to the service planning. This parameter is selected when a reverse tunnel needs to be created.

Protocol Type

MPLS

Signaling Type

Static CR

Create Reverse Tunnel

Selected

3.

Configure the NE list. On the physical topology, double-click NE1, NE2, and NE3 to add them to the NE list and set the corresponding NE roles.

3-38

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

Issue 02 (2010-09-24)

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

3 End-to-End RTN IP Management

Parameter NE Role

Example Value NE1: Ingress NE2: Transit NE3: Egress

Principle for Value Selection An ingress is the incoming node of a network. In this example, NE1 is an ingress node. A transit is a pass-through node. In this example, NE2 is a transit node. An egress is the outgoing node of a network. In this example, NE3 is an egress node.

Deploy

Selected

When this parameter is selected, a tunnel is saved on the U2000 and applied to the corresponding NEs

4.

Click Details to set the details of the reverse tunnel. Click OK. Parameter Tunnel ID Example Value l Forward Tunnel: 100 l Reverse Tunnel: 101 CIR(Kbit/s) Forward and Reverse Tunnels: 10000 Principle for Value Selection Set this parameter according to the service planning. Set this parameter according to the service planning.

Issue 02 (2010-09-24)

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

3-39

3 End-to-End RTN IP Management

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

Parameter LSP Type

Example Value Forward and Reverse Tunnels: E-LSP

Principle for Value Selection Currently, this parameter can be set to E-LSP only. E-LSP indicates that the tunnel determines the scheduling priority and discarding priority of packets according to the EXP information. On one MPLS tunnel of the E-LSP type, there can be a maximum of eight types of PWs.

EXP

Forward and Reverse Tunnels: None Forward Tunnel: l NE1: 3-IFE2-1 l NE2: 3-IFE2-1 Reverse Tunnel: l NE3: 4-IFE2-1 l NE2: 4-IFE2-1

Set this parameter according to the network planning. Set this parameter according to the service planning. Only this parameter needs to be set for only the ingress node and transit node.

Out Interface

Out Label

Forward Tunnel: l NE1: 20 l NE2: 30 Reverse Tunnel: l NE3: 21 l NE2: 31

Set this parameter according to the service planning.

In Interface

Forward Tunnel: l NE2: 4-IFE2-1 l NE3: 4-IFE2-1 Reverse Tunnel: l NE2: 3-IFE2-1 l NE1: 3-IFE2-1

Set this parameter according to the service planning. Only this parameter needs to be set for only the egress node and transit node.

In Label

Forward Tunnel: l NE2: 20 l NE3: 30 Reverse Tunnel: l NE2: 21 l NE1: 31

Set this parameter according to the network planning.

3-40

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

Issue 02 (2010-09-24)

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

3 End-to-End RTN IP Management

Parameter Next Hop

Example Value Forward Tunnel: l NE1: 10.1.1.2 l NE2: 10.1.2.2 Reverse Tunnel: l NE3: 10.1.2.1 l NE2: 10.1.1.1

Principle for Value Selection Set this parameter according to the service planning. Only this parameter needs to be set for only the ingress node and transit node.

Step 4 Create the protection tunnel. 1. Create the protection tunnel by referring to Step 3.1 through Step 3.4. Set the basic Information as follows: Parameter Tunnel Name Example Value Working Tunnel Principle for Value Selection Set this parameter according to the service planning. Set this parameter according to the service planning. Set this parameter according to the service planning. This parameter is selected when a reverse tunnel needs to be created.

Protocol Type

MPLS

Signaling Type

Static CR

Create Reverse Tunnel

Selected

Set the node information as follows:

Issue 02 (2010-09-24)

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

3-41

3 End-to-End RTN IP Management

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

Parameter NE Role

Example Value NE1: Ingress NE4: Transit NE3: Egress

Principle for Value Selection An ingress is the incoming node of a network. In this example, NE1 is an ingress node. A transit is a pass-through node. In this example, NE4 is transit node. An egress is the outgoing node of a network. In this example, NE3 is an egress node.

Deploy

Selected

When this parameter is selected, a tunnel is saved on the U2000 and delivered to the corresponding NEs

For route details, see the descriptions of route settings in Table 3-4. Step 5 Creating the protection group.

1. 2.

Choose Service > Tunnel > Create Protection Group from the main menu. Configure basic information of a tunnel protection group. Parameter Group Name Example Value Protection Group Principle for Value Selection Set this parameter according to the service planning.

3-42

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

Issue 02 (2010-09-24)

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

3 End-to-End RTN IP Management

Parameter Protection Type

Example Value 1:1

Principle for Value Selection Set this parameter according to the service planning. This parameter is selected when a reverse tunnel needs to be created.

Switch Mode

Double Ended

3. 4.

Click Add. In the dialog box that is displayed, select the working tunnel and the protection tunnel and click OK. Configure the type of tunnel. Parameter Working Tunnel Example Value Forward Working Principle for Value Selection Set this parameter according to the service planning. Set this parameter according to the service planning. Set this parameter according to the service planning. This parameter is selected when a reverse tunnel needs to be created.

Protection Tunnel

Forward Protecting

Protection Tunnel_Reverse

Backward Working

Working Tunnel_Reverse

Backward Protecting

5.

Configure attributes of the tunnel protection group, choose Deploy, click OK. Parameter Protocol Status Example Value Enable Principle for Value Selection Set this parameter according to the service planning. Set this parameter according to the service planning. Set this parameter according to the service planning. This parameter is selected when a reverse tunnel needs to be created.
3-43

Revertive Mode

Revertive

Hold-off Time(100ms)

WTR Time(min)

Issue 02 (2010-09-24)

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

3 End-to-End RTN IP Management

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

----End

3.3.6 Configuration Example (RSVP TE Tunnel)


This topic describes a networking diagram and the corresponding example of configuring a static RSVP TE tunnel on the network. 3.3.6.1 Networking Diagram This topic describes the networking topology of the NEs. 3.3.6.2 Service Planning This topic describes parameters that are required for the data configuration. 3.3.6.3 Configuration Process (Creating a RSVP TE Tunnel) This topic describes how to create a RSVP TE tunnel by using the trail function.

3.3.6.1 Networking Diagram


This topic describes the networking topology of the NEs. Between BTS and BSC, the voice service is transported through the RTN equipment, as shown in Figure 3-11. Figure 3-11 Networking diagram of the MPLS tunnel
NE4

NE1 BTS

Packet Swtiching Network

NE3

BSC

Working tunnel NE2 Bypass tunnel

The voice service requires high network security. The service tunnel between NE1 and NE3 is configured with FRR protection. l The primary tunnel between NE1 and NE3 is along the NE1-NE2-NE3 trail. NE2 is the transit node.
Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. Issue 02 (2010-09-24)

3-44

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

3 End-to-End RTN IP Management

The bypass tunnel between NE1 and NE3 is along the NE1-NE4-NE3 trail. When the NE1NE2 link fails or NE2 fails, the bypass tunnel protects the primary tunnel.

3.3.6.2 Service Planning


This topic describes parameters that are required for the data configuration.

Microwave Port Planning


Table 3-6 Microwave port planning NE Microwave Port 3-IFE2-1 4-IFE2-1 3-IFE2-1 4-IFE2-1 3-IFE2-1 4-IFE2-1 3-IFE2-1 4-IFE2-1 Peer NE NE2 NE4 NE3 NE1 NE4 NE2 NE1 NE3 Peer Microwave Port 4-IFE2-1 3-IFE2-1 4-IFE2-1 3-IFE2-1 4-IFE2-1 3-IFE2-1 4-IFE2-1 3-IFE2-1

NE1

NE2

NE3

NE4

NE Parameter Planning
Table 3-7 NE parameter planning NE NE1 LSR ID 1.0.0.1 Port 3-IFE2-1 4-IFE2-1 3-IFE2-1 4-IFE2-1 3-IFE2-1 4-IFE2-1 3-IFE2-1 4-IFE2-1 Port IP 10.1.1.1 10.1.4.2 10.1.2.1 10.1.1.2 10.1.3.1 10.1.2.2 10.1.4.1 10.1.3.2 Mask 255.255.255.252 255.255.255.252 255.255.255.252 255.255.255.252 255.255.255.252 255.255.255.252 255.255.255.252 255.255.255.252

NE2

1.0.0.2

NE3

1.0.0.3

NE4

1.0.0.4

Issue 02 (2010-09-24)

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

3-45

3 End-to-End RTN IP Management

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

Control Plane Planning


Table 3-8 Control plane planning Parameter Node Level IGP ISI S Area ID Port NE1 level-1-2 490001 3-IFE2-1 (level-1-2) 4-IFE2-1 (level-1-2) Opposite LSR ID 1.0.0.3 NE2 level-1-2 490001 3-IFE2-1 (level-1-2) 4-IFE2-1 (level-1-2) NE3 level-1-2 490001 3-IFE2-1 (level-1-2) 4-IFE2-1 (level-1-2) 1.0.0.1 NE4 level-1-2 490001 3-IFE2-1 (level-1-2) 4-IFE2-1 (level-1-2) -

MP LSLD P Pee r Enti ty

Tunnel Planning
Table 3-9 Tunnel planning Parameter Tunnel ID Primary Tunnel Forward: 1 Reverse: 2 Name Forward: Tunnel-0001 Reverse: Tunnel-0002 Signal Type Scheduling Type Bandwidth (kbit/s) Tunnel Source Node Tunnel Sink Node Forward Route Constraint Port IP Address Dynamic E-LSP 10240 NE1 NE3 IP addresses of ingress port of NE2: 4-IFE2-1: 10.1.1.2 IP addresses of ingress port of NE3: 4-IFE2-1: 10.1.2.2
3-46 Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

Bypass Tunnel Forward: 3 Reverse: 4 Forward: Tunnel-0003 Reverse: Tunnel-0004 Dynamic E-LSP 10240 NE1 NE3 IP addresses of ingress port of NE4: 3-IFE2-1: 10.1.4.1 IP addresses of ingress port of NE3: 3-IFE2-1: 10.1.3.1
Issue 02 (2010-09-24)

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

3 End-to-End RTN IP Management

Parameter Reverse Route Constraint Port IP Address

Primary Tunnel IP addresses of ingress port of NE2: 3-IFE2-1: 10.1.2.1 IP addresses of ingress port of NE1: 3-IFE2-1: 10.1.1.1

Bypass Tunnel IP addresses of ingress port of NE4: 4-IFE2-1: 10.1.3.2 IP addresses of ingress port of NE1: 4-IFE2-1: 10.1.4.2 Include Strict

Rerouting Mode

Include Strict

3.3.6.3 Configuration Process (Creating a RSVP TE Tunnel)


This topic describes how to create a RSVP TE tunnel by using the trail function.

Prerequisite
l l l You must be an NM user with "NE operator" authority or higher. You must understand the networking, requirements and service planning of the example. A network must be created.

Procedure
Step 1 Configure the microwave port that carries the MPLS tunnel. 1. Select the NE from the Object Tree in the NE Explorer. Choose Configuration > Interface Management > Microwave Interface from the Function Tree to configure the networkside interface. In the General Attributes tab, select the 3-IFE2-1(Port-1)and 4-IFE2-1(Port-1). Rightclick the Port Mode filed and select Layer 3. Set the parameters as required, and click Apply.

2.

NOTE

l When Port Mode is set to Layer 2, the Encapsulation Type support Null, 802.1Q and QinQ. l When Port Mode is set to Layer 3, the Encapsulation Type support 802.1Q, and then the interface can be used by tunnel.

3.

Select 3-IFE2-1(Port-1) and 4-IFE2-1(Port-1) on the Layer 3 Attributes tab page. Rightclick the Enable Tunnel field and choose Enabled from the shortcut menu. Right-click the Specify IP Address field and choose Manually from the shortcut menu. Then, set the parameters, such as IP Address and IP Mask, and click Apply.

Issue 02 (2010-09-24)

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

3-47

3 End-to-End RTN IP Management

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

Parameter Enable Tunnel

Example Value Enabled

Principle for Value Selection Set this parameter according to the service planning. The maximum reserved bandwidth should not exceed the physical bandwidth of the bearer port. It is configured only for a dynamic tunnel. You can set the port IP address when Manually is selected. Set this parameter according to the service planning. Set this parameter according to the service planning.

Max Reserved Bandwidth (Kbit/s)

1000000

Admin Group Specify IP Address

0 Manually

IP Address

3-IFE2-1(Port-1): 10.1.1.1 4-IFE2-1(Port-1): 10.1.4.2

IP Mask

255.255.255.252

4.

Display the NE Explorer for NE2, NE3, and NE4 separately. Perform Step 1.1 through Step 1.3 to set parameters of relevant interfaces. Set the relevant parameters as follows: The general attributes and Layer 3 attributes of each interface are consistent with those of NE1-4-IFE2-1(Port-1), except that the IP addresses are different. The Layer 3 attributes for each interface are set as follows:

3-48

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

Issue 02 (2010-09-24)

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

3 End-to-End RTN IP Management

Parameter IP Address

Example Value The layer 3 attributes of each port are as follows: l NE2-3-IFE2-1(Port-1) IP Address: 10.1.2.1 l NE2-4-IFE2-1(Port-1) IP Address: 10.1.1.2 l NE3-3-IFE2-1(Port-1) IP Address: 10.1.3.1 l NE3-4-IFE2-1(Port-1) IP Address: 10.1.2.2 l NE4-3-IFE2-1(Port-1) IP Address: 10.1.4.1 l NE4-4-IFE2-1(Port-1) IP Address: 10.1.3.2

Principle for Value Selection Set this parameter according to the service planning.

Step 2 Set LSR IDs. 1. 2. In the NE Explorer, select NE1 and choose Configuration > MPLS Management > Basic Configuration from the Function Tree. Set LSR ID, Start of Global Label Space, and other parameters. Click Apply.

Parameter LSR ID

Example Value NE1: 1.0.0.1

Principle for Value Selection Set this parameter according to the network planning. In addition, this value is unique on the entire network. Set this parameter according to the network planning.

Start of Global Label Space

3.

Display the NE Explorer of NE2, NE3, and NE4 separately and perform the preceding two steps to set the parameters, such as LSR ID. Parameter LSR ID Example Value NE2: 1.0.0.2 NE3: 1.0.0.3 NE4: 1.0.0.4 Principle for Value Selection Set this parameter according to the network planning. In addition, this value is unique on the entire network.
3-49

Issue 02 (2010-09-24)

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

3 End-to-End RTN IP Management

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

Parameter Start of Global Label Space

Example Value 0

Principle for Value Selection Set this parameter according to the network planning.

Step 3 Configure the control plane. 1. 2. In the NE Explorer, select NE1 and choose Configuration > Control Plane Configuration > IGP-ISIS Configuration from the Function Tree. Click the Port Configuration tab page. Click New. In the dialog box displayed, click Add. Select 3-IFE2-1(Port-1) and 4-IFE2-1(Port-1), and click OK. Set parameters as follows: Parameter Link Level LSP Retransmission Interval(s) Example Value level-1-2 5 Principle for Value Selection Currently, only level-1-2 is supported by the U2000. In the case of a point-topoint link, if the local equipment fails to receive any response in a period after transmitting an LSP, the local equipment considers that the LSP is lost or discarded. To ensure the transmission reliability, the local equipment transmits the LSP again. Sets the minimum delay between two consecutive LSPs.

Minimum LSP Transmission Interval (ms)

100

3.

Display the NE Explorers of NE2, NE3, and NE4 separately and refer to Step 3.1 through Step 3.2 to set control plane parameters for NE2, NE3, and NE4. The parameters of NE2, NE3, and NE4 are the same as those of NE1, except that the ports specified for NE2, NE3, and NE4 are different as follows:

3-50

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

Issue 02 (2010-09-24)

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

3 End-to-End RTN IP Management

Parameter Port

Example Value NE2: l 3-IFE2-1(Port-1) l 4-IFE2-1(Port-1) NE3: l 3-IFE2-1(Port-1) l 4-IFE2-1(Port-1) NE4: l 3-IFE2-1(Port-1) l 4-IFE2-1(Port-1)

Principle for Value Selection Set this parameter according to the service planning.

Step 4 Create an active tunnel. 1. 2. Choose Service > Tunnel > Create Tunnel from the main menu. Set the basic information about a tunnel.

Parameter Tunnel Name

Example Value Tunnel-0001

Principle for Value Selection Set this parameter according to the service planning. Set this parameter according to the service planning. Set this parameter according to the service planning.

Protocol Type

MPLS

Signaling Type

RSVP TE

Issue 02 (2010-09-24)

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

3-51

3 End-to-End RTN IP Management

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

Parameter Create Reverse Tunnel

Example Value Selected

Principle for Value Selection This parameter is selected when a reverse tunnel needs to be created.

3.

Configure the NE list. On the physical topology, double-click NEs to add them to the NE list. Then, specify the ingress and egress NEs.

Parameter NE Role

Example Value NE1: Ingress NE3: Egress

Principle for Value Selection An ingress is the incoming node of a network. In this example, NE1 is an ingress node. An egress is the outgoing node of a network. In this example, NE3 is an egress node.

Deploy

Selected

When this parameter is selected, a tunnel is saved on the U2000 and applied to the corresponding NEs

4.

Click Details to configure details of the tunnel management. The general information is as follows: Parameter Tunnel ID Example Value Forward Tunnel: 1 Reverse Tunnel: 2 Principle for Value Selection Set this parameter according to the service planning.

The parameters of the affinity object are as follows:


3-52 Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. Issue 02 (2010-09-24)

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

3 End-to-End RTN IP Management

Parameter Enable Affinity

Example Value Forward and Reverse Tunnels: Selected

Principle for Value Selection After you select Enable Affinity, when the active tunnel is faulty, the links with the same route color are preferred during a rerouting. The forward and reverse tunnels are set to the same value. Set the affinity attribute of a link. When the primary tunnel is faulty, the link of the same color is preferred during rerouting. When the affinity attribute of links is not required, adopt the default value.

Color(0x)

Forward and Reverse Tunnels: 0

Mask(0x)

Forward and Reverse Tunnels: 0

The forward and reverse tunnels are set to the same value. Set the number of bits of the mask. Match the link color according to the number of bits of the mask. Select the route of a matching link color.

The parameters of a hop-by-hop object are as follows: Parameter IP Address Example Value Forward Tunnel: 10.1.1.2, 10.1.2.2 Reverse Tunnel: 10.1.2.1, 10.1.1.1 Principle for Value Selection Set the IP address that a tunnel traverses. For the forward tunnel, use the IP address of the NE2-4IFE2-1(Port-1) and NE3-4IFE2-1(Port-1) ports. For the reverse tunnel, use the IP addresses of the NE3-3IFE2-1(Port-1) and NE1-3IFE2-1(Port-1) ports.

Issue 02 (2010-09-24)

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

3-53

3 End-to-End RTN IP Management

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

Parameter Hop Type

Example Value Forward and Reverse Tunnels: Strictly include

Principle for Value Selection When this parameter is set to Strictly include, the tunnel is created strictly in the sequence of the set IP addresses.

Fast reroute attributes are as follows: Parameter Enable FRR FRR BW Type Example Value Forward and Reverse Tunnels: Selected Forward and Reverse Tunnels: facility Principle for Value Selection Select this parameter to enable the FRR function. Currently, only facility is supported. In this mode, a protection tunnel can protect multiple LSPs. The bypass tunnel that a PLR selects is required to protect the adjacent downstream node of the PLR and the link between the adjacent downstream node and the PLR. Set this parameter according to the network planning.

FRR Protect Type

Forward and Reverse Tunnels: Node Protection

FRR Bandwidth(Kbit/s)

Forward and Reverse Tunnels: 10000

The QoS configuration is as follows:

3-54

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

Issue 02 (2010-09-24)

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

3 End-to-End RTN IP Management

Parameter LSP Type

Example Value Forward and Reverse Tunnels: E-LSP

Principle for Value Selection Currently, this parameter can be set to E-LSP only. E-LSP indicates that the tunnel determines the scheduling priority and discarding priority of packets according to the EXP information. On one MPLS tunnel of the E-LSP type, there can be a maximum of eight types of PWs.

EXP

Forward and Reverse Tunnels: 4

Set this parameter according to the network planning.

Step 5 Create bypass tunnel. 1. Refer to Step 4.1 through Step 4.2 to configure the basic attributes of bypass tunnel. Parameter Tunnel Name Example Value Tunnel-0002 Principle for Value Selection Set this parameter according to the service planning. Set this parameter according to the service planning. Set this parameter according to the service planning. This parameter is selected when a reverse tunnel needs to be created. This parameter needs to be selected because the tunnel is a bypass tunnel.

Protocol Type

MPLS

Signaling Type

RSVP TE

Create Reverse Tunnel

Selected

Configure As Bypass Tunnel

Selected

2.

Configure the NE list. On the physical topology, double-click NEs to add them to the NE list. Then, specify the ingress and egress NEs.

Issue 02 (2010-09-24)

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

3-55

3 End-to-End RTN IP Management

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

Parameter NE Role

Example Value NE1: Ingress NE3: Egress

Principle for Value Selection An ingress is the incoming node of a network. In this example, NE1 is an ingress node. An egress is the outgoing node of a network. In this example, NE3 is an egress node.

Deploy

Selected

When this parameter is selected, a tunnel is saved on the U2000 and applied to the corresponding NEs

3.

Click Details to configure details of the tunnel management. The basic Information is as follows: Parameter Tunnel ID Example Value Forward Tunnel: 3 Reverse Tunnel: 4 Principle for Value Selection Set this parameter according to the service planning.

The parameters of the affinity object are as follows:

3-56

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

Issue 02 (2010-09-24)

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

3 End-to-End RTN IP Management

Parameter Enable Affinity

Example Value Forward and Reverse Tunnels: Selected

Principle for Value Selection After you select Enable Affinity, when the active tunnel is faulty, the links with the same route color are preferred during a rerouting. The forward and reverse tunnels are set to the same value. Set the affinity attribute of a link. When the primary tunnel is faulty, the link of the same color is preferred during rerouting. When the affinity attribute of links is not required, adopt the default value.

Color(0x)

Forward and Reverse Tunnels: 0

Mask(0x)

Forward and Reverse Tunnels: 0

The forward and reverse tunnels are set to the same value. Set the number of bits of the mask. Match the link color according to the number of bits of the mask. Select the route of a matching link color.

The parameters of a hop-by-hop object are as follows: Parameter IP Address Example Value Forward Tunnel: 10.1.4.1, 10.1.3.1 Reverse Tunnel: 10.1.3.2, 10.1.4.2 Principle for Value Selection Set the IP address that a tunnel traverses. For the forward tunnel, use the IP addresses of the NE4-3IFE2-1(Port-1) and NE3-3IFE2-1(Port-1) ports. For the reverse tunnel, use the IP addresses of the NE4-4IFE2-1(Port-1) and NE1-4IFE2-1(Port-1) ports.

Issue 02 (2010-09-24)

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

3-57

3 End-to-End RTN IP Management

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

Parameter Hop Type

Example Value Forward and Reverse Tunnels: Strictly include

Principle for Value Selection When this parameter is set to Strictly include, the tunnel is created strictly in the sequence of the set IP addresses.

Fast reroute attributes are as follows: Parameter Enable FRR FRR BW Type Example Value Forward and Reverse Tunnels: Selected Forward and Reverse Tunnels: facility Principle for Value Selection Select this parameter to enable the FRR function. Currently, only facility is supported. In this mode, a protection tunnel can protect multiple LSPs. The bypass tunnel that a PLR selects is required to protect the adjacent downstream node of the PLR and the link between the adjacent downstream node and the PLR. Set this parameter according to the network planning.

FRR Protect Type

Forward and Reverse Tunnels: Node Protection

FRR Bandwidth(Kbit/s)

Forward and Reverse Tunnels: 10000

The QoS configuration is as follows:

3-58

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

Issue 02 (2010-09-24)

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

3 End-to-End RTN IP Management

Parameter LSP Type

Example Value Forward and Reverse Tunnels: E-LSP

Principle for Value Selection Currently, this parameter can be set to E-LSP only. E-LSP indicates that the tunnel determines the scheduling priority and discarding priority of packets according to the EXP information. On one MPLS tunnel of the E-LSP type, there can be a maximum of eight types of PWs.

EXP

Forward and Reverse Tunnels: 4

Set this parameter according to the network planning.

The Bypass attribute is as follows: Parameter Protected BW Unlimit Example Value Yes Principle for Value Selection Set this parameter according to the service planning. Set this parameter according to the service planning.

Protected Out Interface

Port 4/2

----End

3.4 Configuring a Service Template


By using a service template, you can create services more quickly and easily. You can customize a service template according to actual O&M requirements. 3.4.1 Creating a Service Template This topic describes how to create a service template. There are service templates as follows: VPLS service template, L3VPN service template, PWE3 service template, and RSVP-TE service template. 3.4.2 Creating a Service by Using a Template This topic describes how to create a service by using a template.

Issue 02 (2010-09-24)

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

3-59

3 End-to-End RTN IP Management

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

3.4.1 Creating a Service Template


This topic describes how to create a service template. There are service templates as follows: VPLS service template, L3VPN service template, PWE3 service template, and RSVP-TE service template.

Prerequisite
You must be an NM user with "NE operator" authority or higher.

Procedure
Step 1 Choose Service > Service Template from the main menu. Step 2 Click Create and select the required type of the service template from the drop-down list. Step 3 Set the parameters relevant to the service template.
NOTE

To set the new service template as the default template, select Set as Default Template.

Step 4 Click OK. The service template is created successfully. Step 5 Optional: In the service template management window, select the new service template, and click the Configure Template tab to view the details of the template. Step 6 Optional: In the service template management window, select the new service template, click Configure to modify the details of the template. ----End

3.4.2 Creating a Service by Using a Template


This topic describes how to create a service by using a template.

Prerequisite
You must be an NM user with "NE operator" authority or higher.

Context
The following example describes how to create a tunnel service by using an RSVP TE Service Template.

Procedure
Step 1 Choose Service > Tunnel > Create Tunnel from the main menu. Step 2 Configure the general information about a tunnel. 1. 2. 3. 4.
3-60

Set Protocol Type to MPLS and set Signaling Type to RSVP TE. Click . In the dialog box displayed, select the service template to be used.

Click OK. A dialog box is displayed, indicating that data loss may occur. Click Confirm.
Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. Issue 02 (2010-09-24)

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

3 End-to-End RTN IP Management

5.

Select Create Reverse Tunnel or Configure As Bypass Tunnel as required.

Step 3 Configure the NE list. Select source and sink NEs. In NE Role, set the location of an NE in a tunnel as follows: You can select an NE by using any of the following three methods: l Method 1: On the physical topology in the upper right portion, select an NE, right-click, and choose Add from the shortcut menu. l Method 2: On the physical topology in the upper right portion, double-click an NE. l Method 3: 1. 2. Click Add and select NE from the drop-down list. In the dialog box displayed, select an NE and click OK.

Step 4 Select Deploy and click OK. In the dialog box displayed, click Close.
NOTE

If Deploy is not selected, the tunnel is saved only on the U2000. If Deploy is selected, the tunnel is save on the U2000 and delivered to corresponding NEs. By default, Deploy is selected. When Deploy is selected, Enable is selected accordingly. A tunnel on the NE side can be used only when the tunnel is enabled.

----End

3.5 Viewing a Service Resource


This topic describes how to view the usage of a service resource. 3.5.1 Querying Public Resources This topic describes how to view the details about a service resource. Service resources include PW IDs, VSI IDs, RDs, RTs, and IP addresses. 3.5.2 Querying CTP Resources This topic describes how to view the interface resources bound to a service.

3.5.1 Querying Public Resources


This topic describes how to view the details about a service resource. Service resources include PW IDs, VSI IDs, RDs, RTs, and IP addresses.

Procedure
Step 1 Choose Service > Service Resource > Common Resource Management from the main menu. Step 2 In the Set Filter Criteria dialog box set the filter criteria. Then, click Filter. The services meeting the filter criteria are displayed in the query result area.
NOTE

You can set the filter criteria, such as Resource Type and NE Name. In this manner, only the information meeting the filter criteria is displayed in the query result area.

Step 3 In the query result area, you can view the Resource Type, Resource Value, and Service Sum information about a resource.
Issue 02 (2010-09-24) Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. 3-61

3 End-to-End RTN IP Management

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

Step 4 After selecting a resource that is already added to a service, you can click the Details tab to view the details about the resource, such as Resource Value, NE Name, Service Name, Service Type, Customer, and Service Deployment Status. Step 5 On the Details tab page, right-click a resource and choose View Service from the shortcut menu. The service management user interface for the service corresponding to the selected resource is displayed. Step 6 Optional: Click Print to set the print parameters and prints the related data on the current user interface. Step 7 Optional: Click Save to export all the service resources in the query result area to a file of the specified format.
NOTE

The file can be saved in .xls, .txt, .html, .csv.

----End

3.5.2 Querying CTP Resources


This topic describes how to view the interface resources bound to a service.

Procedure
Step 1 Choose Service > Service Resource > SAI from the main menu. Step 2 In the Set Filter Criteria dialog box set the filter criteria. Then, click Filter. The services meeting the filter criteria are displayed in the query result area.
NOTE

You can set the filter criteria, such as Service Type and NE name. In this manner, only the information meeting the filter criteria is displayed in the query result area.

Step 3 In the query result area, you can view the details about the interface. Step 4 Right-click an interface that is already bound to a service and choose View Service from the shortcut menu. The service management user interface for the service corresponding to the selected interface is displayed. Step 5 Optional: Click Print to set the print parameters and prints the related data on the current user interface. Step 6 Optional: Click Save to export all the interface resources in the query result area to a file of the specified format.
NOTE

The file can be saved in .xls, .txt, .html, .csv.

----End

3.6 Managing PWE3 Services


This section describes how to configure PWE3 services. 3.6.1 Overview of PWE3 This topic describes basic concepts of the PWE3.
3-62 Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. Issue 02 (2010-09-24)

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

3 End-to-End RTN IP Management

3.6.2 PWE3 Configuration Process The configuration process of the PWE3 consists of configure the CES services, ATM services, IP line service and Ethernet services. This section describes the operation tasks for configuring the services, and relations between the tasks. When configure and managing the PWE3 service, follow the configuration process. 3.6.3 PWE3 Operation Tasks This topic describes all operation tasks relevant to a PWE3 service. 3.6.4 PWE3 Service Monitoring The PWE3 service monitoring enables you to view the service topology, monitor service performance, and monitor service alarms. 3.6.5 Locating a PWE3 Service Fault This topic describes how to locate a PWE3 service fault. 3.6.6 Example for Configuring a CES Emulation Service This topic describes the example of configuring a CES emulation service. Specifically, the example description, service planning, and configuration process are provided. 3.6.7 Example for Configuring an ATM Emulation Service This topic describes the example of configuring an ATM emulation service. Specifically, the example description, service planning, and configuration process are provided. 3.6.8 Example for Configuring an Ethernet Private Line Emulation Service This topic describes the example of configuring an Ethernet private line emulation service. Specifically, the example description, service planning, and configuration process are provided.

3.6.1 Overview of PWE3


This topic describes basic concepts of the PWE3. 3.6.1.1 Introduction In a packet switched network (PSN), PWE3 is a Layer 2 service bearing technology that emulates as faithfully as possible the basic behaviors and characteristics of ATM services, Ethernet services, low-rate time division multiplexing (TDM) circuit services, and other services. Such a technology can interconnect the traditional network with PSN network to share resources and expand the network. 3.6.1.2 Reference Standards and Protocols This topic describes the compliant standards and protocols for various technologies used in the PWE3. 3.6.1.3 PWE3 Basic Principle This topic describes the implementation principle for the PWE3 to carry various Layer 2 services on the customer edge (CE) side. 3.6.1.4 PW Template A PW template abstracts common attributes of PWs. Hence, you can use the PW template conveniently for different PWs. Specifically, by using a PW template, you can configure PWs with similar attributes easily. 3.6.1.5 VCCV Virtual circuit connectivity verification (VCCV) is a technology that is used to verify and diagnose the connectivity of a PW forwarding trail. 3.6.1.6 Static and Dynamic Hybrid Multi-Hop PW This topic describes the static and dynamic hybrid multi-hop PW.
Issue 02 (2010-09-24) Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. 3-63

3 End-to-End RTN IP Management

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

3.6.1.7 PW Protection To implement quick data switching, the PW protection mechanism ensures that services can be quickly switched to another PW when one PW fails. 3.6.1.8 ATM Cell Transparent Transmission This topic describes the ATM cell transparent transmission technology. 3.6.1.9 The Application of PWE3 Service This topic describes a typical application of the PWE3.

3.6.1.1 Introduction
In a packet switched network (PSN), PWE3 is a Layer 2 service bearing technology that emulates as faithfully as possible the basic behaviors and characteristics of ATM services, Ethernet services, low-rate time division multiplexing (TDM) circuit services, and other services. Such a technology can interconnect the traditional network with PSN network to share resources and expand the network.

Definition
PWE3 is a Layer 2 service bearing technology, mainly used to emulate essential behaviors and characteristics of services such as ATM, frame relay, Ethernet, low-rate TDM circuit, and synchronous optical network (SONET)/synchronous digital hierarchy (SDH) as faithfully as possible in a PSN. PWE3 is a point-to-point L2 VPN(Virtual Private Network) technology. PWE3 has the following features: Adding new signaling; reducing cost of signaling; regulating the auto-negotiation mode of multiple hops; achieving flexible networking diagrams. The PWE3 protocol can reduce packet exchange, avoid repeated PW creations and deletions caused by network unstabilities.

Objectives
With development of the IP network, the IP network has great compatibility and great capabilities for expansion, upgrade, and interoperation. The traditional communication network, which has poor capabilities for expansion, upgrade, and interoperation, is restricted by the transmission mode and service type. In addition, newly built networks support few services and are unsuitable for interoperation management. Hence, during the upgrade and expansion of traditional communication networks, you should consider whether to build duplicated networks or use existing or common network resources. PWE3 is a solution that combines traditional communication networks with the existing packet networks. PWE3 has certain advantages of MPLS L2VPN. In addition, PWE3 can be used to interconnect traditional networks with PSNs. Hence, resources can be shared and networks can be expanded.

3.6.1.2 Reference Standards and Protocols


This topic describes the compliant standards and protocols for various technologies used in the PWE3. The reference documents of this feature are as follows:

3-64

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

Issue 02 (2010-09-24)

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

3 End-to-End RTN IP Management

Document RFC3916 RFC3985 RFC4446 draft-ietf-pwe3control-protocol-17 draft-martini-pwe3pw-switching-03 draft-ietf-pwe3-cw-00 draft-ietf-pwe3vccv-03 draft-ietf-pwe3ethernet-encap-10 draft-ietf-pwe3-atmencap-11 draft-ietf-pwe3-celltransport-05 RFC 5085

Description Requirements for Pseudo-Wire Emulation Edge-toEdge (PWE3) Pseudo Wire Emulation Edge-to-Edge (PWE3) Architecture IANA Allocations for Pseudowire Edge to Edge Emulation (PWE3) Pseudo wire Setup and Maintenance using the Label Distribution Protocol Pseudo Wire Switching PWE3 Control Word for use over an MPLS PSN Pseudo Wire Virtual Circuit Connectivity Verification (VCCV) Encapsulation Methods for Transport of Ethernet Over MPLS Networks Encapsulation Methods for Transport of ATM Over MPLS Networks PWE3 ATM Transparent Cell Transport Service Pseudowire Virtual Circuit Connectivity Verification (VCCV) A Control Channel for Pseudowires

Remark s

VCCV of PWs in L2TP V3 mode is not supporte d.

3.6.1.3 PWE3 Basic Principle


This topic describes the implementation principle for the PWE3 to carry various Layer 2 services on the customer edge (CE) side.

Basic Transmission Components of the PWE3


As shown in Figure 3-12, the basic transmission components of the PWE3 network are as follows: l l l
Issue 02 (2010-09-24)

Virtual link pseudo wire (PW) Forwarder Tunnels


Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. 3-65

3 End-to-End RTN IP Management

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

PW signaling protocol

Figure 3-12 Basic transmission components of the PWE3


VPN1 CE1 Forwarder CE3 Forwarder Site2

VPN1 Site1

PE1 VPN2 Site1 CE2

P MPLS Network

PE2 CE4 VPN2 Site2

AC PW PW Signal Tunnel

The VPN1 packet flow from CE1 to CE3 is taken as an example. The basic data flow is as follows: l l l Layer 2 packets are sent to CE1 first, and the packets gain access to PE1 through the link. After PE1 receives the packets, the forwarder selects the PWs for forwarding packets. PE1 generates two MPLS labels (a private network label and a public network label) according to the PW forwarding table entries. The private network label is used to identify the PW, and the public network label is used for a service to traverse over the tunnel to PE2. The Layer 2 packets reach PE2 through the public network. Then, the system prompts private network labels (on the P equipment, public network labels are prompted in the last hop but one). The forwarder of PE2 selects the link for forwarding packets, and then forwards the Layer 2 packets to CE3.

PWE3 Network Mode


The PWE3 network can be in single-hop mode or multi-hop mode. l Single-hop PWE3 network Single-hop PW indicates that only one PW is available between U-PEs, and the label switching of the internal label is not required. Figure 3-13 shows the typical network topology of the single-hop PW.

3-66

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

Issue 02 (2010-09-24)

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

3 End-to-End RTN IP Management

Figure 3-13 PWE3 single-hop topology MPLS Network PE1 P PE2

PW

CE1

CE2

Multi-hop PWE3 network in LDP mode In most cases, the single-hop PW can meet the actual requirement. In the following three cases, however, the single-hop PW cannot meet the requirement and the multi-hop PW needs to be used: Two PEs are not in the same AS domain. In addition, the signaling connection or tunnel between the two PEs cannot be constructed. The signaling types on the two PEs are different. For example, one end runs the LDP, and the other end runs the RSVP. The access equipment can run the MPLS, but it cannot construct a large number of LDP sessions. In this case, the user facing provider equipment (UFPE) is used as the U-PE, and the high-performance S-PE is used as the switching node (similar to the signaling reflector) of the LDP sessions. The multi-hop PW indicates that multiple PWs are available between U-PEs. The forwarding mechanisms of the U-PE in the case of multi-hop forwarding and the U-PE in the case of single-hop forwarding are the same. In the case of multi-hop forwarding, the label switching of the PW label should be performed on the S-PE. Figure 3-14 shows the typical network topology of the multi-hop PW using the LDP as the signaling.

Issue 02 (2010-09-24)

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

3-67

3 End-to-End RTN IP Management

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

Figure 3-14 PWE3 multi-hop topology

MPLS Network U-PE1 S-PE1 S-PE2 U-PE2

PW1

PW2

PW3

CE1

CE2

Static PW
The static PW does not use the signaling protocol for parameter negotiation. The information required by the static PW is manually specified through commands, and the data is transmitted between PEs through the tunnel.

Dynamic PW
The dynamic PW is a PW constructed through signaling protocol. The U-PE switches the PW label through the LDP, and bundles the corresponding CE through PW ID. After the tunnel that connects two PEs is successfully constructed and the label switching and bundling are complete, if the link of the two PEs is up, a PW is constructed. The message packets of the dynamic PW consist of: l l Request: Requests for label allocation from the opposite end. Mapping: Notifies the opposite end of the label at the local end and determines whether to contain the status message according to the default signaling action. (The default Martini mode does not support the status message.) Notification: Notifies status to negotiate the PW status, and thus reducing the count of packets for interaction. Withdraw: Contains the relevant label and status to inform the opposite end to cancel the label. Release: As a response to the Withdraw packet, informs the opposite end that sends the Withdraw packet to cancel the label.

l l l

Extension at the PWE3 Control Plane


l Signaling extension The Notification mode is added to the LDP signaling. In this manner, only status is notified and the signaling is not cleared unless the configuration is deleted or the signaling protocol is interrupted. This mode reduces packet interaction and signaling overheads, and is compatible with the original LDP and Martini modes.
3-68 Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. Issue 02 (2010-09-24)

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

3 End-to-End RTN IP Management

Multi-hop extension The multi-hop PW function is added, which extends the network mode. The multi-hop PW lowers the requirement on the count of LDP connections of the access equipment, that is, lowers the overheads of the LDP session of the access nodes. Multi-hop access nodes meet the PW convergence requirement, which facilitates the network flexibility and is applicable to different levels (access, convergence, and core).

TDM interface extension Supports more telecommunication low-speed TDM interfaces. The functions of TDM packet sequencing, and clock extraction and synchronization are added through the control word (CW) and the forwarding plane Real-time Transport Protocol (RTP). The advantages of the low-speed TDM interfaces are as follows: The encapsulation type is added to support the encapsulation of low-speed TDMs. Supports integration of the PSTN, TV, and data networks. It is a mode to substitute the traditional DDN service.

Other extensions Other extensions at the control plane are as follows: The negotiation mechanism of the fragmentation capability is added to the control plane. The PW connectivity check, such as the virtual circuit connectivity verification (VCCV) and PW operation administration and maintenance (OAM), is added, which improves the quick convergence capability and reliability of the network.

Extension at the PWE3 Data Plane


l l l l Real-time information extension. Clock extraction and time synchronization through the Real-time Transport Protocol (RTP). Assurance of the bandwidth, jitter, and delay of telecommunication signals. Re-transmission of out-of-order packets.

3.6.1.4 PW Template
A PW template abstracts common attributes of PWs. Hence, you can use the PW template conveniently for different PWs. Specifically, by using a PW template, you can configure PWs with similar attributes easily. In order that common attributes extracted from various PWs can be shared by the PWs, the PW template is defined to contain the common attributes of the PWs for convenient extension. The template can be used for creating a PW in interface mode. PWs can be bound with the PW template and they can be reset. The PW template simplifies the configuration of PWs with similar attributes.

Attributes of the PW Template


The PW template can be created and specified with certain attributes on the PEs of a PW. Specifying attributes include specifying the address of the remote PW peer, enabling the control word (CW), enabling the VC connectivity verification (VCCV), specifying the PW tunnel policy, and specifying the maximum count of transmission cells. The attributes are optional and
Issue 02 (2010-09-24) Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. 3-69

3 End-to-End RTN IP Management

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

the operation sequence is not specified. Select the required attributes in actual configuration. To check the connectivity by using the CW mode, you need to enable the CW function first. To check the PW connectivity, it is recommended to use the PW template to create the PWs for the equipment along the trail and enable the VCCV (Virtual Circuit Connectivity Verification). l l In CW mode, in the case of pure dynamic PW, enable the VCCV on both U-PEs; in the case of pure static PW or hybrid PW, enable the VCCV also on the hybrid switching node. In MPLS Router Alert mode, enable the VCCV for the PE equipment along the trail.

3.6.1.5 VCCV
Virtual circuit connectivity verification (VCCV) is a technology that is used to verify and diagnose the connectivity of a PW forwarding trail. VCCV is an end-to-end PW fault detection and diagnosis mechanism. That is, the VCCV is the control channel on which connectivity verification messages are sent between the PW ingress and egress nodes. The objective of the VCCV is to verify and further diagnose the connectivity of the PW forwarding trail. The VCCV PING is a tool that help you to manually check the connection status of the virtual circuit. The VCCV PING is achieved through the extended LSP-PING. The VCCV defines a serial of messages exchanged between PEs to verify the connectivity of the PW. To ensure that the packets of the VCCV and data packets in the PW pass through the same trail, the VCCV packets and the PW packets must have the same encapsulation mode and pass through the same tunnel.

3.6.1.6 Static and Dynamic Hybrid Multi-Hop PW


This topic describes the static and dynamic hybrid multi-hop PW. Hybrid multi-hop PW refers to a PW with one end being the static PW and the other end being the dynamic PW (LDP). Either the static PW or the dynamic PW can have multiple hops. The static and dynamic PWs, however, cannot have multiple hops in interleaved mode. As shown in Figure 3-15, the PW between U-PE1 and S-PE is a dynamic PW and that between U-PE2 and S-PE is a static PW.

3-70

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

Issue 02 (2010-09-24)

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

3 End-to-End RTN IP Management

Figure 3-15 Network of the static and dynamic hybrid multi-hop PW


P1 S-PE P2

PW mic yn a D

Sta tic

PW

U-PE1

U-PE2

CE-A

CE-B

3.6.1.7 PW Protection
To implement quick data switching, the PW protection mechanism ensures that services can be quickly switched to another PW when one PW fails.

PW Redundancy
As shown in Figure 3-16, CE1 is connected to PE1 through a single link. CE2 is connected to PE2 and PE3 in dual-homing mode.
NOTE

PWs between PE equipment must be created by using the LDP signaling.

l l l l l

Create a PW between PE1 and PE3. This PW is the working PW. Create a PW between PE1 and PE2. This PW is the protection PW. Detect faults between CE and PE. When the active trail CE2- PE3- PE1- CE1 is faulty, the service traffic can be quickly switched to the standby trail CE2- PE2- PE1- CE1. After the fault on the active trail CE2- PE3- PE1- CE1 is rectified, the service traffic is switched to the original trail.

Issue 02 (2010-09-24)

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

3-71

3 End-to-End RTN IP Management

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

Figure 3-16 PW redundancy protection

PE3

CE1

PE1

PE2

CE2

Working PW

CE Symmetrical Access Dual-Homing Protection


As shown in Figure 3-17, CE1 is connected to PE1 and PE2 through the dual-homing mode, and CE1 is connected to PE2 and PE4 through the dual-homing mode. l l l Connect CE1 and CE2 to PE. Between PE1 and PE3 and between PE2 and PE4, create PWs. Trail CE2- PE3- PE1- CE1 and trail CE2- PE4- PE2- CE1 serve as mutual backups for each other. When a tail is faulty, the service traffic can be quickly switched to the other trail. By default, use trail CE2- PE3- PE1- CE1 as the working trail.

Figure 3-17 CE symmetrical access dual-homing protection

PE1

PE3

CE1

P P PE2 PE4

CE2

Working PW Protection PW

Backup Protection
As shown in Figure 3-18, CE1 is connected to PE1 and CE2 is connected to PE2.
3-72 Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. Issue 02 (2010-09-24)

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

3 End-to-End RTN IP Management

l l

Between PE1 and PE3, create two dynamic PWs. The two PWs on trail PE1- PE2 serve as mutual backups. When a trail is faulty, the service traffic can be quickly switched to the other trail.

Figure 3-18 Backup protection

PE1 CE1

PE2 CE2

Working PW Protection PW

PW APS Protection
As shown in Figure 3-19, CE1 is connected to PE1 and CE2 is connected to PE2 and PE3. l l l Between PE1 and PE2, create a PW. Between PE1 and PE3 and between PE2 and PE3, create PWs. When trail CE1- PE1- PE2- CE2 is faulty, the service traffic can be quickly switched to the protection trail CE1- PE1- PE3- PE2- CE2.

Figure 3-19 PW APS protection

PE2 PE1 W P CE1 P PE3 Working PW Protection PW CE2

Issue 02 (2010-09-24)

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

3-73

3 End-to-End RTN IP Management

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

3.6.1.8 ATM Cell Transparent Transmission


This topic describes the ATM cell transparent transmission technology.

Definition
ATM cell transparent transmission is a technology that is used to bear ATM cells on the PWE3 virtual circuit.

Objective
The ATM cell transparent transmission uses the PSN network to connect traditional ATM network resources and emulates traditional ATM services on the PSN network. In this case, traditional ATM network services are emulated to the maximum when traversing the PSN network. Therefore, end users can rarely sense any difference and the existing investment of customers and operators are fully utilized in the network integration and construction.

Implementation of the ATM Cell Transparent Transmission


The objective of the PWE3 is to use the PSN network to connect traditional network resources (ATM/FR/LAN) and provide the emulation of the traditional services on the PSN network. In this case, traditional network services are emulated to the maximum when traversing the PSN network. Therefore, end users can rarely sense any difference and the existing investment of customers and operators are fully utilized in the network integration and construction. By creating P2P tunnels, bearing data packets, cells, and bit streams, Layer 2 emulation service on the PSN traverses the public or private PSN. The original services are emulated to the maximum between two PEs that a PW connects. l Port-based ATM cell transparent transmission In this mode, the connection between two remote ATM ports is emulated. The port-based ATM cell transparent transmission can be classified into port-based remote ATM cell transparent transmission and port-based local ATM cell transparent transmission. l ATM cell transparent transmission in 1-to-1 virtual circuit connection (VCC) mode In this mode, a PW bears an ATM VCC cell. This mode supports all ATM adaptation layer (AAL) types. Because a PW bears only one ATM VCC cell, the tunnel packet does not contain the values of virtual path identifier (VPI) or virtual channel identifier (VCI). In addition, the permanent virtual circuits (PVCs) for the PEs are mapped through the PW, that is, the MPLS PW functions as the ATM switch to support the VPI/VCI switching without configuring the switching relation on the PE. The ATM cell transparent transmission in 1-to-1 VCC mode can be classified into remote ATM cell transparent transmission in 1-to-1 VCC mode and local ATM cell transparent transmission in 1-to-1 VCC mode. l ATM cell transparent transmission in N-to-1 VCC mode In this mode, a PW bears multiple ATM VCC cells. This mode supports all AAL types. Because a PW bears multiple ATM VCC cells, the tunnel packet contains the values of VPI and VCI. This encapsulation mode supports the function of mapping multiple VCs in the same ATM sub-interface to a PW, and does not support the function of mapping multiple VCs in different ATM interfaces to a PW or the function of mapping multiple inter-board VCs to a PW.
3-74 Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. Issue 02 (2010-09-24)

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

3 End-to-End RTN IP Management

The ATM cell transparent transmission in N-to-1 VCC mode can be classified into remote ATM cell transparent transmission in N-to-1 VCC mode and local ATM cell transparent transmission in N-to-1 VCC mode. l ATM cell transparent transmission in 1-to-1 virtual path connection (VPC) mode In this mode, a PW bears an ATM VPC cell. This mode supports all AAL types. Compared with the ATM cell transparent transmission in 1-to-1 VCC mode, the tunnel packet of this mode contains only the value of VCI. The output equipment then determines the destination CE based on the value of VCI. Because a PW bears only one ATM VPC cell, the PVCs for the PEs are mapped through the PW, that is, the MPLS PW functions as the ATM switch to support the VPI switching without configuring the switching relation on the PE. The ATM cell transparent transmission in 1-to-1 VPC mode can be classified into remote ATM cell transparent transmission in 1-to-1 VPC mode and local ATM cell transparent transmission in 1-to-1 VPC mode. l ATM cell transparent transmission in N-to-1 VPC mode In this mode, a PW bears multiple ATM VPC cells. This mode supports all AAL types. Because a PW bears multiple ATM VPC cells, the tunnel packet contains the value of VPI and VCI. The encapsulation modes of the ATM cell transparent transmission in N-to-1 VPC and N-to-1 VCC modes are the same. The ATM cell transparent transmission in N-to-1 VPC mode can be classified into remote ATM cell transparent transmission in N-to-1 VPC mode and local ATM cell transparent transmission in N-to-1 VPC mode.

Encapsulation Modes of the ATM Cell Transparent Transmission


The ATM cell transparent transmission covers the following transparent transmission services: l l l PVC-based transparent transmission service Permanent virtual path (PVP)-based transparent transmission service Interface-based transparent transmission service

The encapsulation modes of the ATM cell transparent transmission are as follows: l l 1-to-1 N-to-1

The ATM cell transparent transmission has the following transparent transmission modes: l l Cell Frame

Table 3-10 describes the features of the ATM cell transparent transmission services of different levels.

Issue 02 (2010-09-24)

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

3-75

3 End-to-End RTN IP Management

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

Table 3-10 Features of the ATM cell transparent transmission services Encapsulati on Mode Transpa rent Transmi ssion Mode Cell AAL Type Supported Connection Type Encapsulation Method

N-to-1 VCC

All AALs

VC

Contains the VPI and VCI. The control word (CW) is optional. Supports the VPI/ VCI switching. Not contain the VPI or VCI. The CW is mandatory. Supports the VPI/VCI switching. Contains the VPI and VCI. The CW is optional. Contains the VPI and not contain the VCI. The CW is mandatory. Contains the VPI and VCI. The CW is optional.

1-to-1 VCC

Cell

All AALs

VC

N-to-1 VPC 1-to-1 VPC

Cell Cell

All AALs All AALs

VP VP

Interface transparent transmission

Cell

All AALs

Interface

Table 3-11 describes the applicable scenarios of various connection types. Table 3-11 Applicable scenarios of various connection types Connection Type VCC cell transparent transmission Applicable Scenario Virtual channel connection, which is a basic unit on the ATM network. Applicable to transmission of various ATM network services. VPC cell transparent transmission Virtual path connection, a group of VCCs with the same destination. Applicable to transmission of various ATM network services, especially when multiple services with the same destination exist in the transmission direction. The VPC cell transparent transmission is quicker and easier for management and configuration than VCC cell transparent transmission. Applicable to the scenario that the VP and VC do not need to be processed and the equipment functions an ATM transmission private line.

Whole port transparent transmission

Table 3-12 describes the comparison between 1-to-1 and N-to-1 modes.
3-76 Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. Issue 02 (2010-09-24)

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

3 End-to-End RTN IP Management

Table 3-12 Comparison between 1-to-1 and N-to-1 modes Mode 1-to-1 N-to-1 Description A VCC or VPC maps one PW. Multiple VCCs or VPCs map one PW. (N >= 1) Applicable Scope All AAL types All AAL types Difference The VPI and VCI are not contained. The VPI and VCI must be contained in the encapsulation regardless whether N = 1 or N > 1.

3.6.1.9 The Application of PWE3 Service


This topic describes a typical application of the PWE3. As an end-to-end Layer 2 service transmission technology, the PWE3 provides end-to-end virtual emulation links on edges of packet switched networks (PSNs) for transmitting various services (ATM, Ethernet, and CES) on PSN networks. Such a technology can interconnect the traditional network and PSN to share resources and expand the network. Figure 3-20 Application of the PWE3

BITS NMS CE CE CE PW1 PE PW2 AC PE


E1 interface

BSC

CE

RNC

PW3

PE

BTS CE
FE interface

AC
IMA E1 interface

Node B CE
Issue 02 (2010-09-24) Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. 3-77

3 End-to-End RTN IP Management

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

Figure 3-20 shows a PWE3 single-hop mobile carrier network. On this network, the following types of services are transmitted: l l l BTS is connected to the PSN network through the E1 interface and TDM signals are transmitted to the BSC by using CES services. Node B is connected to the PSN network through the IMA E1 interface and ATM cells are transmitted to the RNC by using ATM services. Node B is connected to the PSN network through the FE interface and Ethernet packets are transmitted to the NMS by using Ethernet services.

All the preceding services are emulated by using the PWE3 technology and transmitted on PSN networks. By using the PWE3 technology, carriers can smoothly migrate original access schemes to PSN networks. This helps to reduce repeated network constructions and lower OPEX.

3.6.2 PWE3 Configuration Process


The configuration process of the PWE3 consists of configure the CES services, ATM services, IP line service and Ethernet services. This section describes the operation tasks for configuring the services, and relations between the tasks. When configure and managing the PWE3 service, follow the configuration process.

CES Service Configuration Process


Figure 3-21 shows the recommended configuration process for configuring and managing a CES service. Figure 3-21 CES service configuration process
Required Optional Create a Network Start

Set the NE LSR ID

Configure the networkside interface

Configure Control Plane

Configure Tunnel

Configure CES Service

End

3-78

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

Issue 02 (2010-09-24)

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

3 End-to-End RTN IP Management

Table 3-13 Tasks for configuring a CES service Operation 1. Create a network 2. Set the NE LSR ID 3. Configure the network-side interface 4. Configure Control Plane Description Complete creating the NE, configure the NE data, and creating fibers. Specifies the LSR ID for each NE that a service traverses and the start value of the global label space. Each LSR ID is unique on a network. Set the basic attributes and Layer 3 attributes (such as tunnel enabling status and IP address) for the interface to bear tunnels. Set the associated protocol parameters of the control plane for creating tunnels. l To create the static MPLS tunnel to bear the CES service, you do not need to set the associated parameters of the control plane. l To create the dynamic MPLS tunnel to bear the CES service, you need to set the following parameters: 1. IGP-ISIS protocol parameters 2. MPLS-RSVP protocol parameters To create the dynamic PW to bear services, you need to set the IGPISIS and MPLS-LDP protocol parameters. l To create the IP tunnel or GRE tunnel to bear the CES service, you need to add a static route. 5. Configure Tunnel The tunnel is used to bear services. l In the case of the static MPLS tunnel, you can create the tunnel in either NE or trail mode. Select the signaling type as static and set the relevant information about the tunnel, including the tunnel ID, service name, ingress node, egress node, and transit node. l In the case of the dynamic MPLS tunnel, you need to select the signaling type as dynamic and set the relevant information about the tunnel, including service name, and sink and source nodes of the tunnel. l In the case of the IP tunnel or GRE tunnel, set the source board, source port, and IP address of the sink port. 6. Configure the service interface 7. Configure CES Service Use the CD1 board or tributary card to access the base station services. 1. Create the CES service, including setting the service ID and service name. 2. Set the source and sink information, including setting the board and channel. 3. Configure the PW, including setting the PW type, label, and tunnel type. 4. Configure the advanced attributes, including setting the jitter buffer time, packet loading time, and clock mode.
Issue 02 (2010-09-24) Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. 3-79

3 End-to-End RTN IP Management

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

ATM Service Configuration Process


Figure 3-22 shows the flowchart for configuring an ATM service. For details of each step, see the relevant section. Figure 3-22 ATM service configuration process
Required Optional Create Network Start

Configure the LSR ID

Configure the network-side interface Configure the control plane

Configure Tunnel

Configure the ATM Policy

Configure the ATM Interface

Configure the UNIsNNI ATM service

End

Table 3-14 Tasks for configuring an ATM service Operation 1. Create Network 2. Configure the LSR ID Description Complete creating the NE, configure the NE data, and creating fibers. Specifies the LSR ID for each NE that a service traverses and the start value of the global label space. Each LSR ID is unique on a network.

3-80

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

Issue 02 (2010-09-24)

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

3 End-to-End RTN IP Management

Operation 3. Configure the network-side interface 4. Configure the control plane

Description Set the basic attributes and Layer 3 attributes (such as tunnel enabling status and IP address) for the interface to bear tunnels. Set the associated protocol parameters of the control plane for creating tunnels. l To create the static MPLS tunnel to bear the ATM service, you do not need to set the associated parameters of the control plane. l To create the dynamic MPLS tunnel to bear the ATM service, you need to set the following parameters: 1. IGP-ISIS protocol parameters 2. MPLS-RSVP protocol parameters To create the dynamic PW to bear the service, you need to set the IGP-ISIS and MPLS-LDP protocol parameters. l To create the IP tunnel or GRE tunnel to bear the ATM service, you need to add a static route.

5. Configure Tunnel

The tunnel is used to bear services. l In the case of the static MPLS tunnel, you can create the tunnel in either NE or trail mode. Select the signaling type as static and set the relevant information about the tunnel, including the tunnel ID, service name, ingress node, egress node, and transit node. l In the case of the dynamic MPLS tunnel, you need to select the signaling type as dynamic and set the relevant information about the tunnel, including service name, and sink and source nodes of the tunnel. l In the case of the IP tunnel or GRE tunnel, set the source board, source port, and IP address of the sink port.

6. Configure the ATM Policy 7. Configure the ATM interface 8. Configure the UNIs-NNI ATM service

The ATM policy is used to perform the traffic management on the ATM service. The ATM interface is used to access the base station services. 1. Create the ATM service, including setting the service ID and service name, and selecting the service type and connection type. 2. Configure the connection, including setting the source information, PW ID, sink information, and policy. 3. Configure the PW, including setting the PW type, label, and tunnel type. 4. Configure the CoS mapping and CoS policy of the PW.

IP Line Service Configuration Flow


Figure 3-23 shows the recommended flow for configuring an IP line service.

Issue 02 (2010-09-24)

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

3-81

3 End-to-End RTN IP Management

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

Figure 3-23 Flow of configuring an IP line service


Mandatory Optional Create a network Start

Configure interfaces

Configure a Layer 3 virtual interface Create a static MPLS tunnel Configure an IP line service

Configure a QoS policy

End

Table 3-15 Operation tasks for configuring an IP line service Task Remarks

1. Create a network. Create NEs and fibers, and configure NE data. 2. Configure interface. l Configure a UNI port, which is used from service access from a base station. l Configure an NNI port. That is, set the general attributes and Layer 3 attributes (such as Enable Tunnel and IP Address) for the port so that the port can carry tunnels. 3. Configure a Layer 3 virtual interface. 4. Configure a static MPLS tunnel. Configure a Layer 3 virtual interface as the sink port for the IP line service. An IP line service can be carried only by a static MPLS tunnel. l You can create a static MPLS tunnel site by site or end to end. When creating a static MPLS tunnel, you need to set the signaling type to static and specify the service name, ingress node, egress node, and transit node.

3-82

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

Issue 02 (2010-09-24)

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

3 End-to-End RTN IP Management

Task 5. Configure an IP line service.

Remarks 1. Create an IP line service. That is, set the service ID and specify the service name. 2. Set the source and sink. That is, choose boards and a tunnel. 3. Configure a PW. That is, set the PW type, PW label, and tunnel type. 4. Set advanced attributes. That is, set parameters such as QoS for the UNI port.

3.6.3 PWE3 Operation Tasks


This topic describes all operation tasks relevant to a PWE3 service. 3.6.3.1 Creating a CES Service This topic describes how to create a CES service. You can create a CES PWE3 service tunnel for transmitting TDM signals in trail configuration mode. By using the trail configuration mode, you can directly configure the source and sink nodes of a CES service and the PW attributes on the GUI of the U2000. In this manner, the CES service can be created quickly. 3.6.3.2 Creating an ETH Service This topic describes how to create an ETH service. The service is connected to the user side, and transmitted to one PW at the network side. In this manner, user data can be transparently transmitted in a point-to-point manner. By using the trail configuration mode, you can directly configure the source and sink nodes of an ETH service and the PW attributes on the GUI of the U2000. In this manner, the ETH service can be created quickly. 3.6.3.3 Creating an ATM Service This topic describes how to create an ATM service. You can create an ATM PWE3 service tunnel for transmitting ATM signals in trail configuration mode. By using the trail configuration mode, you can directly configure the source and sink nodes of an ATM service and the PW attributes on the GUI of the U2000. In this manner, the ATM service can be created quickly. 3.6.3.4 Creating a PWE3 Service Through Duplication This topic describes how to create a PWE3 service through duplication. You can duplicate a PWE3 service and change certain parameters to create another PWE3 service. 3.6.3.5 Deploying a PWE3 Service This topic describes how to deploy a PWE3 service. When you deploy a PWE3 service, the service is applied from the U2000 to NEs. 3.6.3.6 Adjusting a Discrete PWE3 Service This topic describes how to adjust a discrete PWE3 service. The U2000 searches out all discrete services on the network automatically. Then, the U2000 converts these services to unterminated services or delete these services.

3.6.3.1 Creating a CES Service


This topic describes how to create a CES service. You can create a CES PWE3 service tunnel for transmitting TDM signals in trail configuration mode. By using the trail configuration mode, you can directly configure the source and sink nodes of a CES service and the PW attributes on the GUI of the U2000. In this manner, the CES service can be created quickly.
Issue 02 (2010-09-24) Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. 3-83

3 End-to-End RTN IP Management

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

Prerequisite
l l l You must be an NM user with "network operator" authority or higher. The DCN function must be disabled for the port that carries the CES service. The CES service interface must be configured. Specifically, the interface mode must be configured to Layer 1 and the frame format and frame mode of the interface must be configured. If the service need be carried by an MPLS Tunnel, you must configure a tunnel first.. To create the dynamic PW to bear the service, you need to set the IGP-ISIS and MPLSLDP protocol parameters.

l l

Context
When the interface is used to carry the CES service, you need to set the frame format, to ensure that the frame format is the same as the service encapsulation format. When the emulation mode of a CES service is CESoPSN, it is recommended that you set the frame format at the interface to CRC-4 multiframe. When the emulation mode of a CES service is SATop, the frame format at the interface should be set to non-framing. When the UNI interface is used to carry the CES service, you need to set the frame mode.

Procedure
Step 1 Choose Service > PWE3 Service > Create PWE3 Service from the main menu. Step 2 Set the parameters on the General Attributes tab page.

NOTE

l You can use a template to configure a service. Specifically, you can select a template in the Service template field. Alternatively, you can create another template. l Set Service Type to CES.

Step 3 Selects the source and sink NEs for a service. 1. 2. 3. 4.


3-84

Click Configure Source And Sink. A dialog box is displayed. Select a source NE from Physical Topology on the left. Then, the selected NE is displayed in the upper-right pane. In the right portion of NE Panel, all slots and available cards of the NE are displayed. According to the service type to be created, select the appropriate card. Select an interface.
Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. Issue 02 (2010-09-24)

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

3 End-to-End RTN IP Management

5.

Set the SAI attribute of the CES service in the SAI configuration. After you complete the setting, click Add Node, In the lower portion of the window, the new source and sink NEs are displayed,click OK.
NOTE

The configuration method is the same for the sink NE and source NE. Hence, only the example for configuring a source NE is provided as follows. In the dialog box for configuring the source and sink, you can select multiple lower order timeslots and create CES services in batches.

Step 4 Optional: Click Configure Source And Sink,select the Unterminated on the left,specify the LSR ID of unterminated node and click Add Node,In the lower portion of the window, the unterminated source and sink NEs are displayed, click OK.
NOTE

On a network, if the equipment at one end of a service can be managed by the U2000, and the equipment at the other end of the service is from another vendor and cannot be managed by the U2000, select Unterminated to set the LSR ID of the opposite end of the service. Currently, the RTN equipment in the same management domain can be used to configure unterminated trails. If Protection Type is PW backup protection or PW APS protection, the unterminated node cannot be set.

Step 5 Set parameters for the source and sink NEs that are displayed in Node List. To view the topology of a configured service, click the Service Topology tab in the upper-right area. Step 6 In the PW pane in lower left portion of the window, configure parameters. Configure general attributes of the PW.

NOTE

l The PW ID can be automatically allocated. l You can set Signaling Type to Dynamic or Static. If you set Signaling Type to Dynamic, the Forward Label and Reverse Label are assigned automatically. If you set Signaling Type to Static, the Forward Label and Reverse Label can be assigned automatically or manually. l You can set Forward Type and Reverse Type to Static Binding or Select policy. If you set Forward Type to Static Binding, you need to manually specify a tunnel in the Forward Tunnel field. If you set Forward Type to Select Policy, you need to set the tunnel priority in the Forward Type field so that the system selects a tunnel according to the priority. l You may also set the forward tunnel and reverse tunnel by clicking the Service Topology tab in the upper-right area. Select a tunnel between the source NE and sink NE, right-click, and then choose Select Forward Tunnel or Select Reverse Tunnel. In the dialog box that is displayed, select the tunnel for static binding.

Step 7 Optional: Click Detail. A pane is displayed in the lower-right area. Step 8 Optional: Click the Advanced PW Attribute tab to set parameters for a PW and set the clock mode of the source and sink NEs.

Issue 02 (2010-09-24)

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

3-85

3 End-to-End RTN IP Management


NOTE

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

Generally, Packet Loading Time (us) for packets that carry the CES service is 1 ms. The value of Jitter Compensation Buffering Time(us) must be greater than the value of Packet Loading Time (us) at the peer end.

Step 9 Select the Deploy check box and click OK.


NOTE

l If you clear the Deploy check box, the configuration data information is stored only on the U2000. If you select the Deploy check box, the configuration data information is stored on the U2000 and applied to NEs. By default, the Deploy check box is selected. l When you select the Deploy and Enable check box, A service is available on NEs only when it is enabled.

----End

3.6.3.2 Creating an ETH Service


This topic describes how to create an ETH service. The service is connected to the user side, and transmitted to one PW at the network side. In this manner, user data can be transparently transmitted in a point-to-point manner. By using the trail configuration mode, you can directly configure the source and sink nodes of an ETH service and the PW attributes on the GUI of the U2000. In this manner, the ETH service can be created quickly.

Prerequisite
l l l l You must be an NM user with "network operator" authority or higher. If you need to use the port exclusively, disable the DCN function of the UNI port. The MPLS tunnel for carrying services must be created if it is used. To create the dynamic PW to bear the service, you need to set the IGP-ISIS and MPLSLDP protocol parameters.

Procedure
Step 1 Choose Service > PWE3 Service > Create PWE3 Service from the main menu. Step 2 Set the parameters on the General Attributes tab page.

NOTE

l You can use a template to configure a service. Specifically, you can select a template in the Service template field. Alternatively, you can create another template. l Set Service Type to ETH.

3-86

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

Issue 02 (2010-09-24)

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

3 End-to-End RTN IP Management

Step 3 Selects the source and sink NEs for a service. 1. Click Configure Source And Sink. A dialog box is displayed.

2. 3. 4. 5.

Select a source NE from Physical Topology on the left. Then, the selected NE is displayed in the upper-right pane. In the right portion of NE Panel, all slots and available cards of the NE are displayed. According to the service type to be created, select the appropriate card. Select an interface. Set the SAI attribute of the Ethernet service in the SAI configuration. After you complete the setting, click Add Node, In the lower portion of the window, the new source and sink NEs are displayed. Click OK.
NOTE

The configuration method is the same for the sink NE and source NE. Hence, only the example for configuring a source NE is provided as follows.

Step 4 Optional: Click Configure Source And Sink, select the Unterminated on the left, specify the LSR ID of unterminated node, and click Add Node, In the lower portion of the window, the unterminated source and sink NEs are displayed, click OK.
NOTE

On a network, if the equipment at one end of a service can be managed by the U2000, and the equipment at the other end of the service is from another vendor and cannot be managed by the U2000, select Unterminated to set the LSR ID of the opposite end of the service. Currently, the RTN equipment in the same management domain can be used to configure unterminated trails. If Protection Type is PW backup protection or PW APS protection, the unterminated node cannot be set.

Step 5 Set parameters for the source and sink NEs that are displayed in Node List. To view the topology of a configured service, click the Service Topology tab in the upper-right area. Step 6 In the PW pane in lower left portion of the window, configure parameters. Configure general attributes of the PW.
Issue 02 (2010-09-24) Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. 3-87

3 End-to-End RTN IP Management

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

NOTE

l The PW ID can be automatically allocated. l You can set Signaling Type to Dynamic or Static. If you set Signaling Type to Dynamic, the Forward Label and Reverse Label are assigned automatically. If you set Signaling Type to Static, the Forward Label and Reverse Label can be assigned automatically or manually. l You can set Forward Type and Reverse Type to Static Binding or Select policy. If you set Forward Type to Static Binding, you need to manually specify a tunnel in the Forward Tunnel field. If you set Forward Type to Select Policy, you need to set the tunnel priority in the Forward Type field so that the system selects a tunnel according to the priority. l You may also set the forward tunnel and reverse tunnel by clicking the Service Topology tab in the upper-right area. Select a tunnel between the source NE and sink NE, right-click, and then choose Select Forward Tunnel or Select Reverse Tunnel. In the dialog box that is displayed, select the tunnel for static binding.

Step 7 Optional: Click Detail. A pane is displayed in the lower-right area. Step 8 Optional: Click the SAI QoS tab to view the Local QoS Policy or configure the global template of SAI. Alternatively, you can select one of the policies that are configured in the Global QoS Policy Template field. Step 9 Optional: Click Service Parameter tab to configure the service parameter. If you set BPDU to Transparent Transmission, the MTU(byte) cannot be set. Step 10 Optional: Click the PW QoS tab to configure the global template of a PW. Alternatively, you can click Global QoS Policy Template and select the global template of QoS from the dropdown list. Then, set parameters. Step 11 Optional: Click the Advanced PW Attribute tab to set parameters for a PW. When the PW Type is set to Ethernet Tagged Mode, the TPID and Request VLAN is available.

Step 12 Select the Deploy check box and click OK.


NOTE

l If you clear the Deploy check box, the configuration data information is stored only on the U2000. If you select the Deploy check box, the configuration data information is stored on the U2000 and applied to NEs. By default, the Deploy check box is selected. l When you select the Deploy and Enable check box, A service is available on NEs only when it is enabled.

----End

3.6.3.3 Creating an ATM Service


This topic describes how to create an ATM service. You can create an ATM PWE3 service tunnel for transmitting ATM signals in trail configuration mode. By using the trail configuration
3-88 Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. Issue 02 (2010-09-24)

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

3 End-to-End RTN IP Management

mode, you can directly configure the source and sink nodes of an ATM service and the PW attributes on the GUI of the U2000. In this manner, the ATM service can be created quickly.

Prerequisite
l l l l l l You must be an NM user with "network operator" authority or higher. The control plane must be configured. The interface must be configured. If IMA services are connected, the IMA group must be configured. The ATM policy must be configured. The MPLS tunnel for carrying services must be created if it is used. To create the dynamic PW to bear the service, you need to set the IGP-ISIS and MPLSLDP protocol parameters.

Procedure
Step 1 Choose Service > PWE3 Service > Create PWE3 Service from the main menu. Step 2 Set the parameters on the General Attributes tab page.

NOTE

l You can use a template to configure a service. Specifically, you can select a template in the Service Template field. Alternatively, you can create another template. l Set Service Type to ATM.

Step 3 Selects the source and sink NEs for a service. 1. Click Configure Source And Sink. A dialog box is displayed.

Issue 02 (2010-09-24)

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

3-89

3 End-to-End RTN IP Management

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

2. 3. 4. 5.

Select a source NE from Physical Topology on the left. Then, the selected NE is displayed in the upper-right pane. In the right portion of NE Panel, all slots and available cards of the NE are displayed. According to the service type to be created, select the appropriate card. Select an interface. Set the SAI attribute of the ETH service in the SAI configuration. After you complete the setting, click Add Node, In the lower portion of the window, the new source and sink NEs are displayed,click OK. Configure the sink NE, protection NE and transit NE with the same method and based on different protection types. To configure multiple ATM connections for an ATM service at the same time, select multiple ports for an NE by using the same method.
NOTE

6. 7.

The configuration method is the same for the sink NE and source NE. Hence, only the example for configuring a source NE is provided as follows.

Step 4 Optional: Click Configure Source And Sink,select the Unterminated on the left,specify the LSR ID of unterminated node and click Add Node,In the lower portion of the window, the unterminated source and sink NEs are displayed, click OK.
NOTE

On a network, if the equipment at one end of a service can be managed by the U2000, and the equipment at the other end of the service is from another vendor and cannot be managed by the U2000, select Unterminated to set the LSR ID of the opposite end of the service. Currently, the RTN equipment in the same management domain can be used to configure unterminated trails. If Protection Type is PW backup protection or PW APS protection, the unterminated node cannot be set.

Step 5 Set parameters for the source and sink NEs that are displayed in Node List. To view the topology of a configured service, click the Service Topology tab in the upper-right area. Step 6 In the PW pane in lower left portion of the window, configure parameters. Configure general attributes of the PW.
3-90 Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. Issue 02 (2010-09-24)

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

3 End-to-End RTN IP Management

NOTE

l The PW ID can be automatically allocated. l You can set Signaling Type to Dynamic or Static. If you set Signaling Type to Dynamic, the Forward Label and Reverse Label are assigned automatically. If you set Signaling Type to Static, the Forward Label and Reverse Label can be assigned automatically or manually. l You can set Forward Type and Reverse Type to Static Binding or Select policy. If you set Forward Type to Static Binding, you need to manually specify a tunnel in the Forward Tunnel field. If you set Forward Type to Select Policy, you need to set the tunnel priority in the Forward Type field so that the system selects a tunnel according to the priority. l You may also set the forward tunnel and reverse tunnel by clicking the Service Topology tab in the upper-right area. Select a tunnel between the source NE and sink NE, right-click, and then choose Select Forward Tunnel or Select Reverse Tunnel. In the dialog box that is displayed, select the tunnel for static binding.

Step 7 Click ATM Link. In the dialog box that is displayed, add the ATM connection, and set relevant parameters of the ATM connection.

NOTE

After you finishing configuring VPI/VCI of the source and sink, the U2000 assigns the transit VPI/VCI automatically. In the case of a network consisting of RTN equipment, the transit VPI/VCI can be set. Moreover, the transit VPI/VCI can be set be different from the VPI/VCI of the source and sink.

Step 8 Optional: Click Detail. A pane is displayed in the lower-right area. Step 9 Optional: Click the PW QoS tab to configure the global template of a PW. Alternatively, you can select one of the templates that are configured in the Global QoS Policy Template field, and set parameters. Step 10 Optional: Click the Advanced PW Attribute tab to set parameters for a PW. Step 11 Select the Deploy check box and click OK.
NOTE

l If you clear the Deploy check box, the configuration data information is stored only on the U2000. If you select the Deploy check box, the configuration data information is stored on the U2000 and applied to NEs. By default, the Deploy check box is selected. l When you select the Deploy and Enable check box, A service is available on NEs only when it is enabled.

----End
Issue 02 (2010-09-24) Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. 3-91

3 End-to-End RTN IP Management

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

Postrequisite
After the service is created successful, the service is displayed in the PWE3 service management window.

3.6.3.4 Creating a PWE3 Service Through Duplication


This topic describes how to create a PWE3 service through duplication. You can duplicate a PWE3 service and change certain parameters to create another PWE3 service.

Prerequisite
l l You must be an NM user with "network operator" authority or higher. PWE3 services that are created successfully must exist.

Context
To create a PWE3 services through duplication, you can specify the source, sink, and transit nodes again, or change certain parameters only.

Procedure
Step 1 Choose Service > PWE3 Service > Manage PWE3 Service from the main menu. Step 2 Set the query criteria and click Filter. Step 3 Create a PWE3 service by duplicating either a protected PWE3 service or an unprotected PWE3 service. l Methods of duplicating different protected PWE3 services and the corresponding windows are similar. The following example describes how to duplicate a PWE3 service with the PW backup protection. 1. 2. Select a PWE3 service with PW backup protection, right-click, and choose Copy from the shortcut menu. In the Copy PWE3 Service window, modify the attributes relevant to the new service based on service planning, and click OK.

3-92

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

Issue 02 (2010-09-24)

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management
NOTE

3 End-to-End RTN IP Management

In the Copy PWE3 Service window, all parameters of the original PWE3 service are retained, including parameters of the access ports. You must change an original access port to another idle access port before a duplicate service can be created successfully. l If you want to change the access port to another port of the same NE, change the port directly in the node list on the left. l If you want to change the access port to a port of another NE, change the port by any of the two methods. Method 1: In the topology view, right-click the NE where the required port resides and choose the corresponding shortcut menu (change source, sink or transit node). In the dialog box that is displayed, change the service access port. Method 2: In the node list on the left, delete the corresponding NE. Then configure another NE for the access port.

l Methods of duplicating unprotected Ethernet services, IP E-line services and CES services and the corresponding windows are similar. The following example describes how to duplicate a CES service. 1. 2. 3. Select one CES service to be duplicated, right-click, and choose Copy from the shortcut menu. In the Copy PWE3 Service dialog box, click Add. In the Add Service dialog box, set the source and sink nodes, and then click OK.
NOTE

On a network, if the equipment at one end of a service can be managed by the U2000, and the equipment at the other end of the service is from another vendor and cannot be managed by the U2000, select Unterminated to set the LSR ID of the opposite end of the service. Currently, the RTN equipment in the same management domain can be used to configure unterminated trails.
NOTE

In the Add Service dialog box, you can set multiple source and sink nodes to create the corresponding services through duplication. Those services can share intermediate NEs. The following describes the details. l The mapping between the source and sink NEs is 1:N or N:1. In this case, only one source node exists, and a service is created between the source node and a sink node. In this way, N services are created. l The mapping between the source and sink NEs is N:N. In this case, a service is created between a source node and the sink node with the same number. For example, a service is created between source node 1 and sink node 1 and a service is created between source node 2 and sink node 2. In this way, N services are created. l The mapping between the source and sink NEs is N:M and M is greater than N. In this case, a service is created between the source node whose number is smaller than or equal to N and the sink node with the same number. For the remaining sink nodes, a service is created between source node N and each remaining sink node. In this way, M services are created. Select an NE of the same type as the original NE when you select the source, sink, or transit node for the duplication.

4. 5. 1. 2.

Click Advanced and Modify SAI tabs respectively to modify relevant parameters of the service. Click OK. Configure the general attributes of the service created through duplication. For details, see 3.1 through 3.4. In the Service Parameter area, modify the attributes relevant to the ATM connection of the new service.
Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. 3-93

l The following describes how to duplicate an unprotected ATM service.

Issue 02 (2010-09-24)

3 End-to-End RTN IP Management

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

3. 4. ----End

Click Add Link to add an ATM connection to the new service. Click OK.

3.6.3.5 Deploying a PWE3 Service


This topic describes how to deploy a PWE3 service. When you deploy a PWE3 service, the service is applied from the U2000 to NEs.

Prerequisite
l l You must be an NM user with "network operator" authority or higher. A PWE3 service must be created.

Procedure
Step 1 Choose Service > PWE3 Service > Manage PWE3 Service from the main menu. Step 2 In the Set Filter Criteria dialog box that is displayed, set the filter criteria, and click Filter. The NMS displays the PWE3 services that meet the filter criteria. Step 3 Select one PWE3 service that is configured, right-click, and then choose Deploy from the shortcut menu.
NOTE

l If you deploy a service, the service configuration data is applied to NEs. l If you do not deploy a service, the service configuration data is saved in the U2000. l After the service is created successful, in the PWE3 service management window, Deployment Status of the service is displayed as Deployed.

----End

Postrequisite
When you need to delete the service, select the service and click Delete, click Yes in the dialog box displayed.
NOTE

Deleting a service is to delete a service on a per-NE basis and an end-to-end tunnel. When you choose Delete from Network Side, only the data about end-to-end services is deleted.

3.6.3.6 Adjusting a Discrete PWE3 Service


This topic describes how to adjust a discrete PWE3 service. The U2000 searches out all discrete services on the network automatically. Then, the U2000 converts these services to unterminated services or delete these services.

Prerequisite
l l
3-94

You must be an NM user with "network operator" authority or higher. Discrete services must exist on the network.
Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. Issue 02 (2010-09-24)

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

3 End-to-End RTN IP Management

Context
NOTE

You cannot convert a discrete service that has no LSR IDs for both the source and sink ends to an unterminated service.

Procedure
Step 1 Choose Service > PWE3 Service > Manage PWE3 Discrete Service from the main menu. Step 2 Set the query criteria and click Filter.
NOTE

Currently, only the router supports the function of filtering services by port name.

Step 3 Select one or more discrete services, click Convert to Unterminated. Alternatively, right-click and choose Convert to Unterminated from the shortcut menu. Step 4 Set the parameters in the dialog box, click OK. Step 5 In the Confirm dialog box, click OK. The adjusted discrete PWE3 service is displayed in the service list in the PWE3 Service Management window. Step 6 Optional: Delete a discrete PWE3 service. 1. 2. Select one or more discrete services, click Delete Discrete. Alternatively, right-click and choose Delete Discrete rom the shortcut menu. In the Confirm dialog box, click OK.

----End

3.6.4 PWE3 Service Monitoring


The PWE3 service monitoring enables you to view the service topology, monitor service performance, and monitor service alarms. 3.6.4.1 Viewing the PWE3 Service Topology This topic describes how to view the PWE3 service topology. By viewing the service topology of a PWE3 service, you can learn the topology structure and running status of the service in real time. 3.6.4.2 Monitoring Performance of a PWE3 Service This topic describes how to monitor performance of a PWE3 service. While a PWE3 service is running, abnormal status may occur. By viewing the performance data of a PWE3 service, you may learn the abnormal status in time. In this manner, the maintenance personnel can take timely measures to avoid faults. 3.6.4.3 Monitoring Alarms of a PWE3 Service This topic describes how to monitor alarms of a PWE3 service. By creating a service monitoring template, the maintenance personnel can monitor alarms of services that important to customers, and learn the running status of services in real time, thus ensuring the normal running of services.

Issue 02 (2010-09-24)

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

3-95

3 End-to-End RTN IP Management

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

3.6.4.1 Viewing the PWE3 Service Topology


This topic describes how to view the PWE3 service topology. By viewing the service topology of a PWE3 service, you can learn the topology structure and running status of the service in real time.

Prerequisite
l l You must be an NM user with "network operator" authority or higher. PWE3 services that are created must exist.

Procedure
Step 1 Choose Service > PWE3 Service > Manage PWE3 Service from the main menu. Step 2 In the Set Filter Criteria dialog box that is displayed, set the filter criteria, and click Filter. The NMS displays the PWE3 services that meet the filter criteria. Step 3 In the service list, select a service to be viewed. Step 4 View the topology structure of a service. In the service topology, you can learn PE information of the source and sink ends, and interface information for connecting to CE. Step 5 Check alarm information of a service. If a fault occurs, the corresponding interface and PW of the PE in the service topology is displayed with fault identifier. Step 6 You can perform the following operations in the service topology. l In the service topology, select a PE, right-click, and then choose the following menu items from the shortcut menu respectively. Choose NE Explorer to view the NE Explorer of the equipment. Choose View Real-Time Performance to view the real-time performance of the PW. l In the service topology, select one interface, right-click, and then choose View Real-Time Performance to view the real-time performance of the interface. l In the topology view, select a PW between PEs, right-click, and then choose the following menu items from the shortcut menu respectively. Choose View Real-Time Performance to view the real-time performance of the PW. Choose View Tunnel. In the Tunnel Management dialog box that is displayed, view the Tunnel information. ----End

3.6.4.2 Monitoring Performance of a PWE3 Service


This topic describes how to monitor performance of a PWE3 service. While a PWE3 service is running, abnormal status may occur. By viewing the performance data of a PWE3 service, you may learn the abnormal status in time. In this manner, the maintenance personnel can take timely measures to avoid faults.
3-96 Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. Issue 02 (2010-09-24)

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

3 End-to-End RTN IP Management

Procedure
Step 1 Choose Service > PWE3 Service > Manage PWE3 Service from the main menu. Step 2 In the Set Filter Criteria dialog box that is displayed, set the filter criteria, and click Filter. The NMS displays the PWE3 services that meet the filter criteria. Step 3 View the runtime performance of a service. Right-click the NE and choose View Real-Time Performance from the shortcut menu in the topology view. Step 4 Create a monitoring instance for a service. For details, refer to the chapter of monitoring instance management in Performance Management System (PMS). Step 5 View the history performance of a service. Right-click a required service and choose Performance > View History Data from the shortcut menu. ----End

3.6.4.3 Monitoring Alarms of a PWE3 Service


This topic describes how to monitor alarms of a PWE3 service. By creating a service monitoring template, the maintenance personnel can monitor alarms of services that important to customers, and learn the running status of services in real time, thus ensuring the normal running of services.

Procedure
Step 1 Choose Fault > Service Monitoring > Service Monitoring Template from the main menu. Step 2 In the Centralized Monitoring dialog box, expand the All Service branch to view alarm information of all services.

Step 3 Click Select Monitoring Group. Step 4 In the Select Monitoring Group dialog box, click Add from the shortcut menu. Step 5 In the Add Monitoring Group dialog box, enter the name of the monitoring group and click OK. The newly-added monitoring group is displayed in the monitoring group list.

Issue 02 (2010-09-24)

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

3-97

3 End-to-End RTN IP Management

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

Step 6 Select the monitoring group that is added, right-click, and then choose Add Monitoring Service from the shortcut menu. Step 7 In the Add Monitoring Service dialog box, select the corresponding service tab and select the service to be added. Then, click Add. Step 8 Click Close. ----End

3.6.5 Locating a PWE3 Service Fault


This topic describes how to locate a PWE3 service fault. 3.6.5.1 CES Service Troubleshooting This section describes how to troubleshoot interruption or bit errors of the CES service in terms of the symptoms, impact on the system, possible causes, tools required for troubleshooting, troubleshooting procedure, and precautions that should be taken during the troubleshooting. 3.6.5.2 ATM Service Troubleshooting This section describes how to troubleshoot interruption or bit errors of the ATM or IMA service in terms of the symptoms, impact on the system, possible causes, tools required for troubleshooting, troubleshooting procedure, and precautions that should be taken during the troubleshooting. 3.6.5.3 Ethernet Service Troubleshooting This section describes how to troubleshoot Ethernet service interruption or packet loss in terms of the symptoms, impact on the system, possible causes, tools required for troubleshooting, troubleshooting procedure, and precautions that should be taken during the troubleshooting.

3.6.5.1 CES Service Troubleshooting


This section describes how to troubleshoot interruption or bit errors of the CES service in terms of the symptoms, impact on the system, possible causes, tools required for troubleshooting, troubleshooting procedure, and precautions that should be taken during the troubleshooting.

3-98

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

Issue 02 (2010-09-24)

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

3 End-to-End RTN IP Management

Symptoms
The symptoms of a CES service fault may be as follows. See Table 3-16. Clear up all the reported alarms and the fault is rectified. Table 3-16 List of common symptoms of CES service faults Symptom The CES service is interrupted. Alarm Reported HARD_BAD, TEMP_OVER, COMMUN_FAIL, or BUS_ERR T_ALOS, UP_E1_AIS, or DOWN_E1_AIS R_LOS, LASER_MOD_ERR, LSR_WILL_DIE, IN_PWR_ABN, TEM_HA, or LSR_BCM_ALM MPLS_TUNNEL_LOCV PW_DOWM The CES service has bit errors and the communication is degraded. HARD_BAD, TEMP_OVER, or BUS_ERR SYNC_C_LOS or LTI LASER_MOD_ERR, LSR_WILL_DIE, IN_PWR_ABN, TEM_HA, or LSR_BCM_ALM CES_LOSPKT_EXC, CES_MISORDERPKT_EX C, CES_STRAYPKT_EXC, CES_JTRUDR_EXC, or CES_JTROVR_EXC Board SCA, XCS, or MP1

D75 or D12 CD1

EG16 or EX2 EG16, EX2, or PM1 SCA, XCS, or MP1

XCS CD1

MD1, MQ1, or CD1

Troubleshooting Flowchart
Figure 3-24 shows the flowchart for troubleshooting CES service faults.

Issue 02 (2010-09-24)

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

3-99

3 End-to-End RTN IP Management

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

Figure 3-24 Flowchart for troubleshooting CES service faults


Start

Whether HARD_BAD, TEMP_OVER, BUS_ERR, or COMMUN_FAIL alarm exists?

Yes

Board is faulty or interboard communication fails

Reset/re-insert/replace board

No
Whether T_ALOS, R_LOS, or LASER_MOD_ERR alarm exists?

Yes

Signals are lost or degradeed

Check fiber, optical module, and network cable, and handle problems

No

Reset/re-insert/ replace board

No Whether MPLS_TUNNEL_LOCV or PW_DOWN alarm exists? No Whether SYNC_C_LOS or LTI alarm exists? No
Whether CES_LOSPKT_EXC, CES_JTRUDR_EXC alarm exists?

Yes

Tunnel or PW which carries service is faulty

Rectify fault of physical link

No

Rectify fault of opposite equipment

Yes

Synchronous clock is lost

Rectify clock fault

No Reset/re-insert/replace
cross-connect board

Yes

Lost packets, errored packets, or jitter crosses threshold

Check fiber, optical module, and connections, and handle problems

No

Modify network configuration

No

Whether fault is rectified? Yes

Contact Huawei technical support engineers

End

Impact on the System


The CES service in the network has bit errors or is interrupted. As a result, the communication is degraded or interrupted. If the CES service fault is caused by the SCA or XCS board, other services accessed by the equipment may also be affected.

Possible Causes
As shown in the troubleshooting flowchart, a CES service fault may be due to the following causes: l l l l Cause 1: The board has a hardware fault or excessively high temperature, or the inter-board communication fails. As a result, the board does not work normally. Cause 2: The signals accessed by the processing board or interface board are lost or degraded. Cause 3: The tunnel or PW that carries the CES service is interrupted. Cause 4: The priority of the synchronous clock source or the synchronous clock source itself is lost.
Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. Issue 02 (2010-09-24)

3-100

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

3 End-to-End RTN IP Management

Cause 5: The number of lost packets or erorred packets, or the jitter buffer of the CES service over the PW crosses the threshold.

Procedure
l Cause 1: The board has a hardware fault or excessively high temperature, or the inter-board communication fails. As a result, the board does not work normally. 1. 2. l Query the current alarms of the system to check for the HARD_BAD, TEMP_OVER, COMMUN_FAIL, or BUS_ERR alarm and determine which board reports the alarm. Handle theHARD_BAD, TEMP_OVER, COMMUN_FAIL, or BUS_ERR alarm.

Cause 2: The signals accessed by the processing board or interface board are lost or degraded. 1. 2. 3. Check for the T_ALOS, UP_E1_AIS, or DOWN_E1_AIS alarm of the system and handle the T_ALOS, UP_E1_AIS, or DOWN_E1_AIS alarm. Check for the R_LOS alarm of the system and handle the R_LOS alarm. Check for the LASER_MOD_ERR, LSR_WILL_DIE, IN_PWR_ABN, TEM_HA, or LSR_BCM_ALM alarm of the system and handle the LASER_MOD_ERR, LSR_WILL_DIE, IN_PWR_ABN, TEM_HA, or LSR_BCM_ALM alarm. Check for the MPLS_TUNNEL_LOCV alarm of the system and handle the MPLS_TUNNEL_LOCV alarm. Check for the PW_DOWN alarm of the system and handle the PW_DOWN alarm.

Cause 3: The tunnel or PW that carries the CES service is interrupted. 1. 2.

Cause 4: The priority of the synchronous clock source or the synchronous clock source itself is lost. 1. Check for the SYNC_C_LOS or LTI alarm of the system and handle the SYNC_C_LOS or LTI alarm.

Cause 5: The number of lost packets or erorred packets, or the jitter buffer of the CES service over the PW crosses the threshold. 1. Check for the CES_LOSPKT_EXC, CES_MISORDERPKT_EXC, or CES_STRAYPKT_EXC alarm of the system and handle the CES_LOSPKT_EXC, CES_MISORDERPKT_EXC, or CES_STRAYPKT_EXC alarm. Check for the CES_JTRUDR_EXC, or CES_JTROVR_EXC alarm of the system and handle the CES_JTRUDR_EXC, or CES_JTROVR_EXC alarm.

2. ----End

3.6.5.2 ATM Service Troubleshooting


This section describes how to troubleshoot interruption or bit errors of the ATM or IMA service in terms of the symptoms, impact on the system, possible causes, tools required for troubleshooting, troubleshooting procedure, and precautions that should be taken during the troubleshooting.

Symptoms
The symptoms of ATM or IMA service faults may be as follows: See Table 3-17. Clear up all the reported alarms and the fault is rectified.
Issue 02 (2010-09-24) Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. 3-101

3 End-to-End RTN IP Management

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

Table 3-17 List of common symptoms of ATM service faults Symptom The ATM or IMA service is interrupted. Alarm Reported HARD_BAD, TEMP_OVER, COMMUN_FAIL, or BUS_ERR R_LOS or ALM_ALS VC_AIS or VP_AIS IMA_GROUP_LE_DOWN or IMA_GROUP_RE_DOWN The IMA service has bit errors or loses packets. HARD_BAD, TEMP_OVER, or BUS_ERR ALM_IMA_RFI, ALM_IMA_LIF, ALM_IMA_RE_RX_UNUSABLE, or ALM_IMA_RE_TX_UNUSABLE Board SCA, XCS, or MP1

AD1, AFO1, or CD1 AD1 or AFO1 MQ1, CD1, or MD1

SCA, XCS, or MP1

D12, D75, or CD1

Troubleshooting Flowchart
Figure 3-25 shows the flowchart for troubleshooting ATM service faults.

3-102

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

Issue 02 (2010-09-24)

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

3 End-to-End RTN IP Management

Figure 3-25 Flowchart for troubleshooting ATM service faults


Start

Whether HARD_BAD, TEMP_OVER, BUS_ERR, or COMMUN_FAIL alarm exists?

Yes

Board is faulty or interboard communication fails

Reset/re-insert/replace board

No Whether R_LOS alarm exists? No Whether ALM_ALS alarm exists? No Whether VC_AIS or VP_AIS alarm exists? No
Whether IMA_GROUP_LE_DOWN or IMA_GROUP_RE_DOWN alarm exists?

Yes

Received signals are lost

Check fiber, optical module, and network cable, and handle problems

No

Reset/re-insert/ replace board

Yes

Laser shutdown is set

Re-set laser

No

Reset/re-insert/ replace board

Yes

Upstream service is interrupted

Rectify fault of upstream NE

Yes

IMA protocol is not enabled

Enable the IMA protocol

No

Modify the IMA link configuration

No

Whether fault is rectified? Yes

Contact Huawei technical support engineers

End

Impact on the System


The ATM service in the network is interrupted, has bit errors, or loses packets. If the fault is caused by the SCA, XCS board, other services accessed by the equipment may also be affected.

Possible Causes
As shown in the troubleshooting flowchart, an ATM service fault may be due to the following causes: l l l l l Cause 1: The board has a hardware fault or excessively high temperature, or the inter-board communication fails. As a result, the board does not work normally. Cause 2: The signals on the receive side of the interface board are lost. Cause 3: The laser is automatically shut down. Cause 4: The VC and VP connections are abnormal and the upstream ATM service is interrupted. Cause 5: The IMA group attributes are incorrect on the two ends of the link. As a result, the local and remote ends mis-step in receiving IMA frames, and the remote IMA link abnormally transmits and receives signals.
Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. 3-103

Issue 02 (2010-09-24)

3 End-to-End RTN IP Management

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

Procedure
l Cause 1: The board has a hardware fault or excessively high temperature, or the inter-board communication fails. As a result, the board does not work normally. 1. 2. l l l 1. 1. Query the current alarms of the system to check for the HARD_BAD, TEMP_OVER, COMMUN_FAIL, or BUS_ERR alarm and the board that reports the alarm. Handle the HARD_BAD, TEMP_OVER, COMMUN_FAIL, or BUS_ERR alarm. Check for the R_LOS alarm of the system and handle the R_LOS alarm. Check for the ALM_ALS alarm of the system and handle the ALM_ALS alarm.

Cause 2: The signals on the receive side of the interface board are lost. Cause 3: The laser is automatically shut down. Cause 4: The VC or VP connections are abnormal, or the upstream ATM service is interrupted. 1. Check for the VC_AIS or VP_AIS alarm of the system and handle the VC_AIS or VP_AIS alarm.

Cause 5: The IMA group attributes are incorrect on the two ends of the link. As a result, the local and remote ends mis-step in receiving IMA frames, and the remote IMA link abnormally transmits and receives signals. 1. 2. Check for the ALM_IMA_RFI or ALM_IMA_LIF alarm of the system and handle the ALM_IMA_RFI or ALM_IMA_LIF alarm. Check for the ALM_IMA_RE_RX_UNUSABLE or ALM_IMA_RE_TX_UNUSABLE alarm of the system and handle the ALM_IMA_RE_RX_UNUSABLE or ALM_IMA_RE_TX_UNUSABLE alarm.

----End

3.6.5.3 Ethernet Service Troubleshooting


This section describes how to troubleshoot Ethernet service interruption or packet loss in terms of the symptoms, impact on the system, possible causes, tools required for troubleshooting, troubleshooting procedure, and precautions that should be taken during the troubleshooting.

Symptoms
The symptoms of Ethernet service faults may be as follows. See Table 3-18. Clear up all the reported alarms and the fault is rectified. Table 3-18 List of common symptoms of Ethernet service faults Symptom The Ethernet service is interrupted. Alarm Reported HARD_BAD, TEMP_OVER, COMMUN_FAIL, or BUS_ERR ETH_LOS, ETH_AUTO_LINK_DOW N, or MAC_FCS_EXC R_LOS
3-104 Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

Board SCA, XCS, EG16, or EX2

EG16, EX2, ETFC, EFG2, or EFF8 POD41


Issue 02 (2010-09-24)

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

3 End-to-End RTN IP Management

Symptom

Alarm Reported ETH_LINK_DOWN LOOP_ALM ETH_EFM_LOOPBACK LASER_SHUT or LSR_WILL_DIE

Board EG16, EX2, EFG2, or EFF8 EG16, EX2, ETFC, EFG2, EFF8, or POD41 EG16, EX2, ETFC, EFG2, or EFF8 EG16, EX2, EFG2, EFF8, or POD41 SCA, XCS, EG16, or EX2

The Ethernet service loses packets or has erorred packets.

HARD_BAD, TEMP_OVER, or BUS_ERR LSR_WILL_DIE MAC_FCS_EXC or FLOW_OVER ETH_CFM_UNEXPERI

EG16, EX2, EFG2, EFF8, or POD41 EG16, EX2, ETFC, EFF8, or EFG2 EG16 or EX2

Troubleshooting Flowchart
Figure 3-26 shows the flowchart for troubleshooting Ethernet service faults.

Issue 02 (2010-09-24)

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

3-105

3 End-to-End RTN IP Management

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

Figure 3-26 Flowchart for troubleshooting Ethernet service faults


Start

Whether HARD_BAD, TEMP_OVER, BUS_ERR, or COMMUN_FAIL alarm exists?

Yes

Board is faulty or interboard communication fails

Reset/re-insert/replace board

No Whether ETH_LOS, R_LOS, or MAC_FCS_EXC alarm exists? No Whether ETH_LINK_DOWN alarm exists? No Whether LOOP_ALM or ETH_EFM_LOOPBACK alarm exists? No Whether FLOW_OVER or ETH_CFM_UNEXPERI alarm exists? Yes Yes Yes Port negotiation fails
Modify port configuration, including port attributes and working mode

Yes

Signals are lost or degraded

Check fiber, optical module, and network cable, and handle problems

No

Reset/re-insert/ replace board

Port loopback is set

Modify port loopback configuration

Service configuration is incorrect

Modify service configuration

No

Whether fault is rectified? Yes

Contact Huawei technical support engineers

End

Procedure
l Cause 1: The board has a hardware fault or excessively high temperature, or the inter-board communication fails. As a result, the board does not work normally. 1. 2. l 1. 2. 3. 4. l
3-106

Query the current alarms of the system to check for the HARD_BAD, TEMP_OVER, COMMUN_FAIL, or BUS_ERR alarm and the board that reports the alarm. Handle the HARD_BAD, TEMP_OVER, COMMUN_FAIL, or BUS_ERR alarm. Check for the ETH_LOS or ETH_AUTO_LINK_DOWN alarm of the system and handle the ETH_LOS or ETH_AUTO_LINK_DOWN alarm. Check for the R_LOS alarm of the system and handle the R_LOS alarm. Check for the LASER_SHUT or LSR_WILL_DIE alarm of the system and handle the LASER_SHUT or LSR_WILL_DIE alarm. Check for the MAC_FCS_EXC alarm of the system and handle the MAC_FCS_EXC alarm.

Cause 2: The signals on the receive side are lost.

Cause 3: The Ethernet port is misconnected and the port negotiation fails.
Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. Issue 02 (2010-09-24)

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

3 End-to-End RTN IP Management

1. l

Check for the ETH_LINK_DOWN alarm of the system and handle the ETH_LINK_DOWN alarm. Check for the LOOP_ALM alarm of the system and handle the LOOP_ALM alarm. Check for the ETH_EFM_LOOPBACK alarm of the system and handle the ETH_EFM_LOOPBACK alarm.

Cause 4: Loopback is configured for the port. 1. 2.

Cause 5: The configured traffic limit is excessively low at the port and configurations of the source and sink ports are inconsistent. 1. 2. Check for the FLOW_OVER alarm of the system and handle the FLOW_OVER alarm. Check for the ETH_CFM_UNEXPERI alarm of the system and handle the ETH_CFM_UNEXPERI alarm.

----End

3.6.6 Example for Configuring a CES Emulation Service


This topic describes the example of configuring a CES emulation service. Specifically, the example description, service planning, and configuration process are provided. 3.6.6.1 Networking Diagram This topic describes the networking topology of the NEs. 3.6.6.2 Service Planning This topic describes parameters that are required for the data configuration. 3.6.6.3 Configuration Process This topic describes how to configure a CES emulation service.

3.6.6.1 Networking Diagram


This topic describes the networking topology of the NEs. Between BTS and BSC, the CES service is transported through the RTN equipment, as shown in Figure 3-27. Figure 3-27 Networking diagram of the CES service

NE1 BTS

Packet Swtiching Network NE3 BSC

NE2 BTS

Issue 02 (2010-09-24)

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

3-107

3 End-to-End RTN IP Management

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

Between BTS and NE2, two CES services are configured. All the timeslots of one E1 are occupied, and timeslots 1-14 and 20 of another E1 are occupied. Between BTS and NE1, the service is configured through one E1 interface. All the timeslots of the E1 are occupied.

3.6.6.2 Service Planning


This topic describes parameters that are required for the data configuration.

Service Port Planning


Table 3-19 Service port planning Service Source NE E1 Port NE2-NE3 (The E1 timeslots are fully occupied.) NE2-NE3 (The E1 timeslots are partially occupied.) NE1-NE3 (The E1 timeslots are fully occupied.) 3-ML1-1 Microwave Port 4-IFE2-1 Sink NE Microwave Port 4-IFE2-1 E1 Port 3-ML1-1

3-ML1-2

4-IFE2-1

4-IFE2-1

3-ML1-2

3-ML1-1

4-IFE2-1

2-IFE2-1

3-ML1-3

Service Planning
Table 3-20 Parameters for configuring the CES service: NE2-NE3 (The E1 timeslots are partially occupied.) Attribute Station Level Service ID Service Name Mode Protection Type Source Board Source Port
3-108

Value NE2 E1 4 CES Remote Service 1 UNI-NNI No Protection 3-ML1 3-ML1-2(Port-2)


Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

Value NE3 E1 4 CES Remote Service 1 UNI-NNI No Protection Issue 02 (2010-09-24)

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

3 End-to-End RTN IP Management

Attribute Source 64k timeslot Source High-order timeslot Source Low-order timeslot PW ID Forward Tunnel Reverse Tunnel Sink Board Sink Port Sink 64k timeslot Sink High-order timeslot Sink Low-order timeslot Signaling Type PW Type Forward Label Reverse Label Peer IP RTP Header Jitter Compensation Buffering Time(us) Packet Loading Time (us) Clock Mode EXP

Value 1-14,20 8 Working Tunnel-Forward (Tunnel-0100) Working Tunnel-Reverse (Tunnel-0101) 1-14,20 Static CESoPSN 36 36 10.10.10.3 Disabled 5000 1000 Null 4

Value 1-14,20 8 Working Tunnel-Forward (Tunnel-0100) Working Tunnel-Reverse (Tunnel-0101) 3-ML1 3-ML1-2(Port-2) 1-14,20 Static CESoPSN 36 36 10.10.10.2 Disabled 5000 1000 Null 4

Table 3-21 Parameters for configuring the CES service: NE2-NE3 (The E1 timeslots are fully occupied.) Attribute Station Level Service ID Value NE2 E1 5 Value NE3 E1 5

Issue 02 (2010-09-24)

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

3-109

3 End-to-End RTN IP Management

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

Attribute Service Name Mode Protection Type Source Board Source Port PW ID Forward Tunnel Reverse Tunnel Sink Board Sink Port Signaling Type PW Type Forward Label Reverse Label Peer IP RTP Header Jitter Compensation Buffering Time(us) Packet Loading Time (us) Clock Mode EXP

Value CES Remote Service 2 UNI-NNI No Protection 3-ML1 3-ML1-1(Port-1) 9 Working Tunnel-Forward (Tunnel-0100) Working Tunnel-Reverse (Tunnel-0101) Static SAToP 37 37 10.10.10.3 Disabled 5000 1000 Null 4

Value CES Remote Service 2 UNI-NNI No Protection 9 Working Tunnel-Forward (Tunnel-0100) Working Tunnel-Reverse (Tunnel-0101) 3-ML1 3-ML1-1(Port-1) Static SAToP 37 37 10.10.10.2 Disabled 5000 1000 Null 4

Table 3-22 Parameters for configuring the CES service: NE1-NE3 (The E1 timeslots are fully occupied.) Attribute Station Level Service ID Service Name Value NE1 E1 6 CES Remote Service 3 Value NE3 E1 6 CES Remote Service 3

3-110

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

Issue 02 (2010-09-24)

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

3 End-to-End RTN IP Management

Attribute Mode Protection Type Source Board Source Port PW ID Forward Tunnel Reverse Tunnel Sink Board Sink Port Signaling Type PW Type Forward Label Reverse Label Peer IP RTP Header Jitter Compensation Buffering Time(us) Packet Loading Time (us) Clock Mode EXP

Value UNI-NNI No Protection 3-ML1 3-ML1-1(Port-1) 9 Working Tunnel-Forward (Tunnel-0120) Working Tunnel-Reverse (Tunnel-01201) Static SAToP 35 35 10.10.10.3 Disabled 5000 1000 Null 4

Value UNI-NNI No Protection 9 Working Tunnel-Forward (Tunnel-0120) Working Tunnel-Reverse (Tunnel-0121) 3-ML1 3-ML1-3(Port-3) Static SAToP 35 35 10.10.10.1 Disabled 5000 1000 Null 4

3.6.6.3 Configuration Process


This topic describes how to configure a CES emulation service.

Prerequisite
You must be an NM user with "NE administrator" authority or higher. You must learn about the networking requirements and service planning described in the example. The network must be created. Tunnel 2 exists between NE1 and NE3. And Tunnel 1 exists between NE2 and NE3.
Issue 02 (2010-09-24) Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. 3-111

3 End-to-End RTN IP Management

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

Context
When the interface is used to carry the CES service, you need to set the frame format, to ensure that the frame format is the same as the service encapsulation format. When the emulation mode of a CES service is CESoPSN, it is recommended that you set the frame format at the interface to CRC-4 multiframe. When the emulation mode of a CES service is SAToP, the frame format at the interface should be set to non-framing. When the UNI interface is used to carry the CES service, you need to set the frame mode. The Frame Mode of the PDH port packets of theRTN support 30 and 31 timeslots. In a mixed networking, ensure that the frame mode of the local port is the same as that of the peer port. l l 30 timeslots: The 1-15 and 17-31 timeslots in the E1 frame format are used to transmit service data. 31 timeslots: The 31 timeslots in the E1 frame format are used to transmit service data.

Procedure
Step 1 Set LSR IDs. 1. 2. In the NE Explorer, select NE1 and choose Configuration > MPLS Management > Basic Configuration from the Function Tree. Set LSR ID, Start of Global Label Space, and other parameters. Click Apply.

Parameter LSR ID

Example Value NE1: 1.0.0.1

Principle for Value Selection Set this parameter according to the network planning. In addition, this value is unique on the entire network. Set this parameter according to the network planning.

Start of Global Label Space

3.

Display the NE Explorer of NE2, and NE3 separately and perform the preceding two steps to set the parameters, such as LSR ID. Parameter LSR ID Example Value NE2: 1.0.0.2 NE3: 1.0.0.3 Principle for Value Selection Set this parameter according to the network planning. In addition, this value is unique on the entire network. Set this parameter according to the network planning.
Issue 02 (2010-09-24)

Start of Global Label Space

3-112

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

3 End-to-End RTN IP Management

Step 2 Configure the tunnel that carries the CES service. For details of the configuration, see 3.3.5.3 Configuration Process (Creating a Static CR Tunnel) or 3.3.6.3 Configuration Process (Creating a RSVP TE Tunnel). Step 3 Configure the E1 interface at the BTS side. 1. 2. In the NE Explorer, select NE2 and choose Configuration > Interface Management > PDH Interface from the Function Tree. Click the General Attributes tab. Select 3-ML1-1(Port-1) and 3-ML1-2(Port-2) and set Port Mode to Layer 1.

NOTE

Before setting the port mode, ensure that the DCN of the port is disabled.

3. 4.

Click Apply. The Operation Result dialog box is displayed, indicating that the operation is successful. Click Close. Click the Advanced Attributes tab. Select 3-ML1-2(Port-2) and set Frame Format to CRC-4 Multiframe. Select 3-ML1-1(Port-1) and set Frame Format to Unframe.

5. 6.

Click Apply. The Operation Result dialog box is displayed, indicating that the operation is successful. Click Close. Display the NE Explorer for NE1. Perform Step 3.1 through Step 3.5 to set parameters of relevant E1 interfaces. The general attributes and advanced attributes of each interface are consistent with those of NE2-3-ML1-1(Port-1).

Issue 02 (2010-09-24)

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

3-113

3 End-to-End RTN IP Management

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

Step 4 Configure the E1 interface on the BSC side. Display the NE Explorer for NE3. Perform Step 3.1 through Step 3.5 to set parameters of relevant E1 interfaces. l The general attributes and advanced attributes of NE3-3-ML1-1(Port-1) are consistent with those of NE2-3-ML1-1(Port-1). l The general attributes and advanced attributes of NE3-3-ML1-2(Port-2) are consistent with those of NE2-3-ML1-2(Port-2). l The general attributes and advanced attributes of NE3-3-ML1-3(Port-3) are consistent with those of NE1-3-ML1-1(Port-1). Step 5 Create remote CES service 1. 1. 2. Choose Service > PWE3 Service > Create PWE3 Service from the main menu. Set the parameters of the CES service.

Table 3-23 Parameters of general attributes Parameter Service Type Example Value CES Principle for Value Selection Set this parameter according to the network planning. A service ID uniquely identifies a service on the entire network. Set this parameter according to the network planning. Set this parameter according to the network planning.

Service ID

Service Name

CES Remote Service 1

Protection Type

Protection-free

3.

Click Configure Source And Sink. A dialog box is displayed. On the Physical Topology in the upper left portion of the window, set NE2 as the source NE. Set relevant parameters, click Add Node and click OK.

3-114

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

Issue 02 (2010-09-24)

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

3 End-to-End RTN IP Management

Table 3-24 Parameters of the source node Parameter Name Example Value 3-ML1-2 Principle for Value Selection Set this parameter according to the network planning. Set this parameter according to the network planning. Indicates the SAI ID of a port. Set this parameter according to the network planning. l When working in channelized mode, the CE1 port is divided into 32 timeslots physically. You can bind any of the timeslots except timeslot 0. The bound timeslots work as a single port whose logical features are the same as those of a synchronous serial port. l When working in clear channel mode, the CE1 port does not support timeslotting.

SAI Type

CES

ID

Auto-Assign

Channelized

Checked

Issue 02 (2010-09-24)

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

3-115

3 End-to-End RTN IP Management

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

Parameter 64k timeslot

Example Value 1-14,20

Principle for Value Selection This parameter indicates the timeslot compression list for structured CES emulation services. Services are loaded in the timeslots that are included in the timeslot compression list, encapsulated into PW packets, and then transmitted to the peer end on an Ethernet. Services loaded in the timeslots that are not included in the timeslot compression list are not encapsulated into PW packets and thus the network bandwidth is saved. After receiving the PW packets, the peer end restores the services to the corresponding timeslot based on its own timeslot compression list. The timeslot lists at the two ends can be different, but the number of timeslots must be the same. Otherwise, services are unavailable.

4.

Click Configure Source And Sink. A dialog box is displayed. On the Physical Topology in the upper left portion of the window, set NE3 as the sink NE. Set relevant parameters, click Add Node and click OK. Table 3-25 Parameters of the sink node Parameter Name Example Value 3-ML1-2 Principle for Value Selection Set this parameter according to the network planning. Set this parameter according to the network planning.

SAI Type

CES

3-116

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

Issue 02 (2010-09-24)

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

3 End-to-End RTN IP Management

Parameter ID

Example Value Auto-Assign

Principle for Value Selection Indicates the SAI ID of a port. Set this parameter according to the network planning. l When working in channelized mode, the CE1 port is divided into 32 timeslots physically. You can bind any of the timeslots except timeslot 0. The bound timeslots work as a single port whose logical features are the same as those of a synchronous serial port. l When working in clear channel mode, the CE1 port does not support timeslotting.

Channelized

Checked

64k timeslot

1-14,20

This parameter indicates the timeslot compression list for structured CES emulation services. Services are loaded in the timeslots that are included in the timeslot compression list, encapsulated into PW packets, and then transmitted to the peer end on an Ethernet. Services loaded in the timeslots that are not included in the timeslot compression list are not encapsulated into PW packets and thus the network bandwidth is saved. After receiving the PW packets, the peer end restores the services to the corresponding timeslot based on its own timeslot compression list. The timeslot lists at the two ends can be different, but the number of timeslots must be the same. Otherwise, services are unavailable.
3-117

Issue 02 (2010-09-24)

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

3 End-to-End RTN IP Management

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

5.

In PW in the lower left portion of the window, set relevant parameters.

Table 3-26 PW parameters Parameter PW ID Example Value 8 Principle for Value Selection A PW ID uniquely identifies a PW on the entire network. This parameter specifies whether a PW is dynamic or static. In the case of a dynamic PW, services are available after a signaling negotiation is successful. In the case of a static PW, a signaling negotiation is not required. In addition, you need to configure Uplink Label and Downlink Label for a static PW. An uplink label is attached to the packet header when a CES frame is encapsulated into a PW. An uplink label is used for label switching. A downlink label is attached to the packet header when a CES frame is encapsulated into a PW. A downlink label is used for label switching.

Signaling Type

Static

Forward Label

36

Reverse Label

36

3-118

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

Issue 02 (2010-09-24)

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

3 End-to-End RTN IP Management

Parameter Forward Type

Example Value Static Binding

Principle for Value Selection l If you set Uplink Type to Static Binding, you need to manually specify a tunnel in the Uplink Name area. l If you set Uplink Type to Select Policy, you need to set the tunnel priority in the Uplink Name area so that the system selects a tunnel according to the priority.

Forward Tunnel

Working Tunnel-Forward (Tunnel-0100) Static Binding

Set this parameter according to the network planning. l If you set Downlink Type to Static Binding, you need to manually specify a tunnel in the Downlink Name area. l If you set Downlink Type to Select Policy, you need to set the tunnel priority in the Downlink Name area so that the system selects a tunnel according to the priority.

Reverse Type

Reverse Tunnel

Working Tunnel-Reverse (Tunnel-0101) MPLS

Set this parameter according to the network planning. Set this parameter according to the network planning.

Encapsulation Type

6.

Click Advanced and configure Advanced PW Attribute.

Issue 02 (2010-09-24)

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

3-119

3 End-to-End RTN IP Management

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

Table 3-27 Parameters of advanced attributes Parameter PW Type Example Value CESoPSN Principle for Value Selection CESoPSN is the structured emulation, for which the timeslot compression can be set. SAToP is the nonstructured emulation, for which the timeslot compression cannot be set. On an MPLS PSN network, a control word carries the packet information. A control word is the encapsulation packet header that consists of four bytes. A control word can be used to identify the packet sequence or used for bit stuffing. Set this parameter according to the network planning. The VCCV verification mode is used to detect the connectivity of a PW. Set this parameter according to the network planning. Set this parameter according to the network planning. Set this parameter according to the network planning. Set this parameter according to the network planning. Set this parameter according to the network planning. Set this parameter according to the network planning.

Control Word

Must Use

Control Channel Type

CW

VCCV Verification Mode

Ping

RTP Header

Disabled

Emulation Level

E1

Source Ingress Clock Mode

Null

Source Egress Clock Mode

Null

Sink Ingress Clock Mode

Null

Sink Egress Clock Mode

Null

3-120

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

Issue 02 (2010-09-24)

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

3 End-to-End RTN IP Management

7.

Click OK and the Operation Result dialog box is displayed indicating that the operation is successful. Click Close.

Step 6 Create remote CES service 2. For details, refer to Step 5.1 through Step 5.7. Table 3-28 Parameters of general attributes Parameter Service Type Service ID Example Value CES 5 Principle for Value Selection Set this parameter according to the network planning. A service ID uniquely identifies a service on the entire network. Set this parameter according to the network planning. Set this parameter according to the network planning.

Service Name Protection Type

CES Remote Service 2 Protection-free

Table 3-29 Parameters of the source node Parameter Name SAI Type ID Example Value 3-ML1-1 CES Auto-Assign Principle for Value Selection Set this parameter according to the network planning. Set this parameter according to the network planning. Indicates the SAI ID of a port. Set this parameter according to the network planning.

Table 3-30 Parameters of the sink node Parameter Name SAI Type ID Example Value 3-ML1-1 CES Auto-Assign Principle for Value Selection Set this parameter according to the network planning. Set this parameter according to the network planning. Indicates the SAI ID of a port. Set this parameter according to the network planning.

Issue 02 (2010-09-24)

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

3-121

3 End-to-End RTN IP Management

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

Table 3-31 PW parameters Parameter PW ID Signaling Type Example Value 9 Static Principle for Value Selection A PW ID uniquely identifies a PW on the entire network. This parameter specifies whether a PW is dynamic or static. In the case of a dynamic PW, services are available after a signaling negotiation is successful. In the case of a static PW, a signaling negotiation is not required. In addition, you need to configure Uplink Label and Downlink Label for a static PW. An uplink label is attached to the packet header when a CES frame is encapsulated into a PW. An uplink label is used for label switching. A downlink label is attached to the packet header when a CES frame is encapsulated into a PW. A downlink label is used for label switching. l If you set Uplink Type to Static Binding, you need to manually specify a tunnel in the Uplink Name area. l If you set Uplink Type to Select Policy, you need to set the tunnel priority in the Uplink Name area so that the system selects a tunnel according to the priority. Forward Tunnel Working Tunnel-Forward (Tunnel-0100) Set this parameter according to the network planning.

Forward Label

37

Reverse Label

37

Forward Type

Static Binding

3-122

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

Issue 02 (2010-09-24)

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

3 End-to-End RTN IP Management

Parameter Reverse Type

Example Value Static Binding

Principle for Value Selection l If you set Downlink Type to Static Binding, you need to manually specify a tunnel in the Downlink Name area. l If you set Downlink Type to Select Policy, you need to set the tunnel priority in the Downlink Name area so that the system selects a tunnel according to the priority.

Reverse Tunnel Encapsulation Type

Working Tunnel-reverse (Tunnel-0101) MPLS

Set this parameter according to the network planning. Set this parameter according to the network planning.

Table 3-32 Parameters of advanced attributes Parameter PW Type Example Value SAToP Principle for Value Selection CESoPSN is the structured emulation, for which the timeslot compression can be set. SAToP is the nonstructured emulation, for which the timeslot compression cannot be set. On an MPLS PSN network, a control word carries the packet information. A control word is the encapsulation packet header that consists of four bytes. A control word can be used to identify the packet sequence or used for bit stuffing. Set this parameter according to the network planning. The VCCV verification mode is used to detect the connectivity of a PW.

Control Word

Must Use

Control Channel Type VCCV Verification Mode

CW Ping

Issue 02 (2010-09-24)

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

3-123

3 End-to-End RTN IP Management

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

Parameter RTP Header Emulation Level Source Ingress Clock Mode Source Egress Clock Mode Sink Ingress Clock Mode Sink Egress Clock Mode

Example Value Disabled E1 Null Null Null Null

Principle for Value Selection Set this parameter according to the network planning. Set this parameter according to the network planning. Set this parameter according to the network planning. Set this parameter according to the network planning. Set this parameter according to the network planning. Set this parameter according to the network planning.

Step 7 Create remote CES service 3. For details, refer to Step 5.1 through Step 5.7. Table 3-33 Parameters of general attributes Parameter Service Type Service ID Example Value CES 6 Principle for Value Selection Set this parameter according to the network planning. A service ID uniquely identifies a service on the entire network. Set this parameter according to the network planning. Set this parameter according to the network planning.

Service Name Protection Type

CES Remote Service 3 Protection-free

Table 3-34 Parameters of the source node Parameter Name SAI Type Example Value 3-ML1-1 CES Principle for Value Selection Set this parameter according to the network planning. Set this parameter according to the network planning.

3-124

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

Issue 02 (2010-09-24)

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

3 End-to-End RTN IP Management

Parameter ID

Example Value Auto-Assign

Principle for Value Selection Indicates the SAI ID of a port. Set this parameter according to the network planning.

Table 3-35 Parameters of the sink node Parameter Name SAI Type ID Example Value 3-ML1-3 CES Auto-Assign Principle for Value Selection Set this parameter according to the network planning. Set this parameter according to the network planning. Indicates the SAI ID of a port. Set this parameter according to the network planning.

Table 3-36 PW parameters Parameter PW ID Signaling Type Example Value 7 Static Principle for Value Selection A PW ID uniquely identifies a PW on the entire network. This parameter specifies whether a PW is dynamic or static. In the case of a dynamic PW, services are available after a signaling negotiation is successful. In the case of a static PW, a signaling negotiation is not required. In addition, you need to configure Uplink Label and Downlink Label for a static PW. An uplink label is attached to the packet header when a CES frame is encapsulated into a PW. An uplink label is used for label switching.

Forward Label

35

Issue 02 (2010-09-24)

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

3-125

3 End-to-End RTN IP Management

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

Parameter Reverse Label

Example Value 35

Principle for Value Selection A downlink label is attached to the packet header when a CES frame is encapsulated into a PW. A downlink label is used for label switching. l If you set Uplink Type to Static Binding, you need to manually specify a tunnel in the Uplink Name area. l If you set Uplink Type to Select Policy, you need to set the tunnel priority in the Uplink Name area so that the system selects a tunnel according to the priority.

Forward Type

Static Binding

Forward Tunnel Reverse Type

Working Tunnel-Forward (Tunnel-0120) Static Binding

Set this parameter according to the network planning. l If you set Downlink Type to Static Binding, you need to manually specify a tunnel in the Downlink Name area. l If you set Downlink Type to Select Policy, you need to set the tunnel priority in the Downlink Name area so that the system selects a tunnel according to the priority.

Reverse Tunnel Encapsulation Type

Working Tunnel-reverse (Tunnel-0121) MPLS

Set this parameter according to the network planning. Set this parameter according to the network planning.

3-126

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

Issue 02 (2010-09-24)

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

3 End-to-End RTN IP Management

Table 3-37 Parameters of advanced attributes Parameter PW Type Example Value SAToP Principle for Value Selection CESoPSN is the structured emulation, for which the timeslot compression can be set. SAToP is the nonstructured emulation, for which the timeslot compression cannot be set. On an MPLS PSN network, a control word carries the packet information. A control word is the encapsulation packet header that consists of four bytes. A control word can be used to identify the packet sequence or used for bit stuffing. Set this parameter according to the network planning. The VCCV verification mode is used to detect the connectivity of a PW. Set this parameter according to the network planning. Set this parameter according to the network planning. Set this parameter according to the network planning. Set this parameter according to the network planning. Set this parameter according to the network planning. Set this parameter according to the network planning.

Control Word

Must Use

Control Channel Type VCCV Verification Mode

CW Ping

RTP Header Emulation Level Source Ingress Clock Mode Source Egress Clock Mode Sink Ingress Clock Mode Sink Egress Clock Mode

Disabled E1 Null Null Null Null

----End

3.6.7 Example for Configuring an ATM Emulation Service


This topic describes the example of configuring an ATM emulation service. Specifically, the example description, service planning, and configuration process are provided. 3.6.7.1 Networking Diagram
Issue 02 (2010-09-24) Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. 3-127

3 End-to-End RTN IP Management

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

This topic describes the networking topology of the NEs. 3.6.7.2 Service Planning This topic describes parameters that are required for the data configuration. 3.6.7.3 Configuration Process This topic describes how to configure an ATM emulation service.

3.6.7.1 Networking Diagram


This topic describes the networking topology of the NEs. Between NodeB1 and RNC, NodeB2 and RNC, the IMA service is transported through the RTN equipment. Figure 3-28 shows the service networking requirements. The R99 service and HSDPA service each need to be transmitted over one PW. The committed bandwidth of each PW is 4 Mbit/s, and the peak bandwidth of each PW is 10 Mbit/s. Figure 3-28 Networking diagram of the IMA service
UNI
Service R99 HSDPA VPI 1 1 VCI 100 101

NNI
VPI 50 51 VCI 32 32 VPI 50 51

NNI
VCI 32 32

UNI
VPI 50 51 VCI 32 32

IMA 1 Node B 1 IMA 2 NE1 Node B 2


Service R99 HSDPA VPI 1 1 VCI 100 101 VPI 60 61 VCI 32 32

Packet Swtiching Network

NE2

RNC

VPI 60 61

VCI 32 32

VPI 60 61

VCI 32 32

3.6.7.2 Service Planning


This topic describes parameters that are required for the data configuration.

3-128

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

Issue 02 (2010-09-24)

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

3 End-to-End RTN IP Management

Service Port Planning


Table 3-38 Service port planning Service Source NE (NE1) Microwave Port R99 service 4-IFE2-1 Trunk Port 3-ML1-1 (Trunk1) 3-ML1-2 (Trunk2) HSDPA service 4-IFE2-1 3-ML1-1 (Trunk1) 3-ML1-2 (Trunk2) 4-IFE2-1 3-ML1-1 (Trunk1) Sink NE (NE2) Microwave Port 4-IFE2-1 Trunk Port 3-ML1-1 (Trunk1)

IMA Planning
Table 3-39 IMA planning Parameter NE1 3-ML1-1(Trunk1) IMA Protocol Enable Status Binding Channel Port Type ATM Cell Payload Scrambling Max. VPI Max. VCI VCC-Supported VPI Count Enabled 3-ML1-(9-10) UNI Enabled 255 127 32 3-ML1-2(Trunk2) Enabled 3-ML1-(11-12) UNI Enabled 255 127 32 NE2 3-ML1-1(Trunk1) Enabled 3-ML1-(9-12) UNI Enabled 255 127 32

Issue 02 (2010-09-24)

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

3-129

3 End-to-End RTN IP Management

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

ATM QoS Policy Planning


Table 3-40 ATM QoS policy planning Parameter Policy Name Service Type Traffic Type Clp01Pcr(cell/s) Clp01Scr(cell/s) Clp0Scr(cell/s) MBS(cell) CDVT(us) Enable Traffic Frame Discarding UPC/NPC R99 Service RT-VBR RT-VBR ClpTransparentNoScr 1000 100000 No Enabled HSDPA Service UBR (policy) UBR NoTrafficDescriptor No Enabled

ATM Service Planning


Table 3-41 ATM service planning Parameter Service Name Connect Type Source NE Source Port R99 Service ATMService-R99 PVC NE1 3-ML1-1(Trunk1) 3-ML1-2(Trunk2) Sink NE Sink Port NE2 3-ML1-1(Trunk1) HSDPA Service ATMService-HSDPA PVC NE1 3-ML1-1(Trunk1) 3-ML1-2(Trunk2) NE2 3-ML1-1(Trunk1)

ATM Connection 1 (the R99 service of NodeB1 and the HSDPA service of NodeB1) Source Port Source VPI Source VCI Sink Port 3-ML1-1(Trunk1) 1 100 3-ML1-1(Trunk1) 3-ML1-1(Trunk1) 1 101 3-ML1-1(Trunk1)

3-130

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

Issue 02 (2010-09-24)

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

3 End-to-End RTN IP Management

Parameter Sink VPI Sink VCI Uplink ATM Policy Downlink ATM Policy Transit VPI Transit VCI

R99 Service 50 32 RT-VBR RT-VBR 50 32

HSDPA Service 51 32 UBR (policy) UBR (policy) 51 32

ATM Connection 2 (the R99 service of NodeB2 and the HSDPA service of NodeB2) Source Port Source VPI Source VCI Sink Port Sink VPI Sink VCI Uplink ATM Policy Downlink ATM Policy Transit VPI Transit VCI PW PW ID Signaling Type PW Ingress Label PW Egress Label Link Type Direction Uplink Tunnel Downlink Tunnel Control Word Control Channel Type VCCV Verification Mode 35 Dynamic 35 35 ATM N-to-1 VCC Cell Transport Bidirectional 1(Tunnel-0001) 2(Tunnel-0002) Must use CW Ping 36 Dynamic 36 36 ATM N-to-1 VCC Cell Transport Bidirectional 1(Tunnel-0001) 2(Tunnel-0002) Must use CW Ping 3-ML1-2(Trunk2) 1 100 3-ML1-1(Trunk1) 60 32 RT-VBR RT-VBR 60 32 3-ML1-2(Trunk2) 1 101 3-ML1-1(Trunk1) 61 32 UBR (policy) UBR (policy) 61 32

Issue 02 (2010-09-24)

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

3-131

3 End-to-End RTN IP Management

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

Parameter Max. Concatenated Cells Count Packet Loading Time (us) Mapping Between ATM CoS and CoS Priority

R99 Service 10 1000 Default mapping

HSDPA Service 20 1000 Default mapping

3.6.7.3 Configuration Process


This topic describes how to configure an ATM emulation service.

Prerequisite
You must be an NM user with "NE administrator" authority or higher. You must learn about the networking requirements and service planning described in the example. The network must be created. A tunnel exists between NE1 and NE2.

Procedure
Step 1 Set LSR IDs. 1. 2. In the NE Explorer, select NE1 and choose Configuration > MPLS Management > Basic Configuration from the Function Tree. Set LSR ID, Start of Global Label Space, and other parameters. Click Apply.

Parameter LSR ID

Example Value NE1: 1.0.0.1

Principle for Value Selection Set this parameter according to the network planning. In addition, this value is unique on the entire network. Set this parameter according to the network planning.

Start of Global Label Space

3.

In the NE Explorer of NE2, perform the preceding two steps to set the parameters, such as LSR ID.

3-132

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

Issue 02 (2010-09-24)

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

3 End-to-End RTN IP Management

Parameter LSR ID

Example Value NE2: 1.0.0.2

Principle for Value Selection Set this parameter according to the network planning. In addition, this value is unique on the entire network. Set this parameter according to the network planning.

Start of Global Label Space

Step 2 Configure the tunnel that carries the ATM service. For details of the configuration, see 3.3.5.3 Configuration Process (Creating a Static CR Tunnel) or 3.3.6.3 Configuration Process (Creating a RSVP TE Tunnel). Step 3 Configure ATM ports on Node B. 1. 2. In the NE Explorer, select NE1 and choose Configuration > Interface Management > PDH Interface from the Function Tree to configure ports on Node B. Select the ports from 3-ML1-1(Port-1) to 3-ML1-8(Port-8). In the Port Mode field, rightclick, and choose Layer 2 from the shortcut menu. Click Apply.

NOTE

Before setting the frame format, ensure that the DCN of the port is disabled.

Set relevant parameters as follows: l Port: ports from 3-ML1-1(Port-1) to 3-ML1-8(Port-8) l Name: NodeB ATM (You can set port names to distinguish different service ports for easy location and query.) l Port Mode: Layer 2 (IMA signals are carried.) l Encapsulation Type: ATM 3. Click the Advanced Attributes tab. Select the ports from 3-ML1-1(Port-1) to 3-ML1-8 (Port-8) and set Frame Format to CRC-4 Multiframe.

Issue 02 (2010-09-24)

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

3-133

3 End-to-End RTN IP Management

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

NOTE

Before setting the frame format, ensure that the DCN of the port is disabled.

Set relevant parameters as follows: l Port: ports from 3-ML1-1(Port-1) to 3-ML1-8(Port-8) l Frame Format: CRC-4 multiframe (The frame format must be same as the cell format on Node B.) l Frame Mode: 31 4. 5. Click Apply. The Operation Result dialog box is displayed, indicating that the operation is successful. Click Close. Choose Configuration > Interface Management > ATM IMA Management from the Function Tree. Click the Binding tab.

6.

On the Binding tab page, click Configuration. Then, set the bound ports for 3-ML1-1 (Trunk1) and 3-ML1-2(Trunk2). Click OK.

3-134

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

Issue 02 (2010-09-24)

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

3 End-to-End RTN IP Management

Set the parameters relevant to 3-ML1-1(Trunk1) as follows: l Available Boards: 3-ML1 l Configurable Ports: 3-ML1-1(Trunk1) l Level: E1 E1: For the E1 card, when the E1 level is selected, the entire E1 channel is used to transmit ATM IMA signals. Fractional E1: For the E1 card, when the fractional E1 level is selected, certain 64 kbit/s timeslots of an E1 channel are used to transmit ATM IMA signals. For the ATM STM-1 card, when the fractional E1 level is selected, certain 64 kbit/s timeslots of a VC12 lower order path are used to transmit ATM IMA signals. Before selecting the fractional E1 level, ensure that the serial port for the 64 kbit/s timeslot is created. l Direction: Bidirectional (default) l Optical Interface: l Available Resources: ports from 3-ML1-9(Port-9) to 3-ML1-1(Port-10) l Available Timeslots: Set the parameters relevant to 3-ML1-2(Trunk2) as follows: l Available Boards: 3-ML1 l Configurable Ports: 3-ML1-2(Trunk2) l Level: E1 l Direction: Bidirectional (default) l Optical Interface: l Available Resources: ports from 3-ML1-11(Port-11) to 3-ML1-12(Port-12) l Available Timeslots: 7. On the IMA Group Management tab page, double-click the IMA Protocol Enable Status field to enable the IMA protocol. Set other relevant parameters as required. Click Apply.

Issue 02 (2010-09-24)

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

3-135

3 End-to-End RTN IP Management


NOTE

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

The settings of IMA Protocol Version , IMA Transmit Frame Length , IMA Group Configuration Mode , Maximum Delay Between Links (ms) , Minimum Number of Active Transmitting Links and Minimum Number of Active Receiving Links need to be the same as those on Node B.

8.

On the ATM Interface Management tab page, set the parameters, such as Max VPI and Max VCI. Click Apply.

Set relevant parameters as follows: l Port Type: UNI (A UNI port is used to connect to the client-side equipment, and an NNI port is used to connect the ATM equipment on a core network.) l ATM Cell Payload Scrambling: Enabled l Max. VPI: 255 (Set this parameter according to the networking planning. You can determine the value range of VPIs by setting Max VPI.) l Max. VPI: 127(Set this parameter according to the networking planning. You can determine the value range of VPIs by setting Max VPI.) l VCC-Supported VPI Count: 32 (Set this parameter according to the networking planning.) l Loopback: No Loopback Step 4 Configure ATM ports on RNC. Display the NE Explorer for NE2. Perform Step 3.1 to Step 3.8 to set parameters of relevant RNC-side interfaces. Step 5 Create two UNI-NNI ATM services. 1. Choose Service > PWE3 Service > Create PWE3 Service from the main menu. Create the R99 service from NE1 to NE2.

Table 3-42 Parameters of general attributes Parameter Service Type Example Value ATM Principle for Value Selection Set this parameter according to the network planning.

3-136

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

Issue 02 (2010-09-24)

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

3 End-to-End RTN IP Management

Parameter Service ID

Example Value 1

Principle for Value Selection A service ID uniquely identifies a service on the entire network. Set this parameter according to the network planning. Set this parameter according to the network planning. Set this parameter according to the network planning.

Service Name

ATMService-R99

Protection Type

Protection-free

Link Type

ATM N-to-1 VCC Cell Transport

2.

Click Configure Source And Sink. A dialog box is displayed. On the Physical Topology in the upper left portion of the window, set NE1 as the source NE. Set relevant parameters, click Add Node and click OK. Table 3-43 Parameters of the source node Parameter Name Example Value NE1-3-ML1-1(Trunk1) and NE1-3-ML1-2 (Trunk2) P2MP Principle for Value Selection Set this parameter according to the network planning. There are two UNI ports in this example. P2P: point to point P2MP: point to multi-point SAI Type ATM Set this parameter according to the network planning. Indicates the SAI ID of a port. Set this parameter according to the network planning.

Description

ID

Auto-Assign

3.

Click Configure Source And Sink. A dialog box is displayed. On the Physical Topology in the upper left portion of the window, set NE3 as the sink NE. Set relevant parameters, click Add Node and click OK.

Issue 02 (2010-09-24)

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

3-137

3 End-to-End RTN IP Management

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

Table 3-44 Parameters of the sink node Parameter Name Example Value NE2-3-ML1-1(Trunk1) Principle for Value Selection Set this parameter according to the network planning. P2P: point to point P2MP: point to multi-point SAI Type ATM Set this parameter according to the network planning. Indicates the SAI ID of a port. Set this parameter according to the network planning.

Description

P2MP

ID

Auto-Assign

4.

In PW in the lower left portion of the window, set relevant parameters.

Table 3-45 PW parameters Parameter PW ID Example Value 35 Principle for Value Selection A PW ID uniquely identifies a PW on the entire network. This parameter specifies whether a PW is dynamic or static. In the case of a dynamic PW, services are available after a signaling negotiation is successful. In the case of a static PW, a signaling negotiation is not required. In addition, you need to configure Uplink Label and Downlink Label for a static PW.

Signaling Type

Dynamic

3-138

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

Issue 02 (2010-09-24)

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

3 End-to-End RTN IP Management

Parameter Forward Type

Example Value Static Binding

Principle for Value Selection l If you set Uplink Type to Static Binding, you need to manually specify a tunnel in the Uplink Name area. l If you set Uplink Type to Select Policy, you need to set the tunnel priority in the Uplink Name area so that the system selects a tunnel according to the priority.

Forward Tunnel

Tunnel-0001

Set this parameter according to the network planning. l If you set Downlink Type to Static Binding, you need to manually specify a tunnel in the Downlink Name area. l If you set Downlink Type to Select Policy, you need to set the tunnel priority in the Downlink Name area so that the system selects a tunnel according to the priority.

Reverse Type

Static Binding

Reverse Tunnel

Tunnel-0002

Set this parameter according to the network planning. Set this parameter according to the network planning.

Encapsulation Type

MPLS

5.

Click ATM Link. In the dialog box that is displayed, set the parameters relevant to the connection.

Issue 02 (2010-09-24)

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

3-139

3 End-to-End RTN IP Management

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

Table 3-46 Parameter for configuring a ATM connection Parameter Connection Name Example Value Connection1 and Connection2 Connection1: NE1-3ML1-1(Trunk1) Connection2: NE1-3ML1-2(Trunk2) Source VPI Connection1: 1 Connection2: 1 Source VCI Connection1: 100 Connection2: 100 Source ATM Policy Connection1: RT-VBR Connection2: RT-VBR Principle for Value Selection Set this parameter according to the network planning. Set this parameter according to the network planning.

Source SAI

VPI information carried by the service from a base station. VCI information carried by the service from a base station. Connection1 is an R99 service and you need to select the RT-VBR policy for it. Connection2 is an R99 service and you need to select the RT-VBR policy for it.

Sink SAI

Connection1: NE2-3ML1-1(Trunk1) Connection2: NE2-3ML1-1(Trunk1)

Set this parameter according to the network planning.

Sink VPI

Connection1: 50 Connection2: 60

VPI information carried by the service after a VPI switching. Max VPI of an ATM port is 255 according to the planning and thus the value of the VPI on the sink ranges between 0 and 255. VCI information carried by the service after a VCI switching. Max VCI of an ATM port is 127 according to the planning and thus the value of the VPI on the sink ranges between 32 and 127.

Sink VCI

Connection1: 32 Connection2: 32

3-140

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

Issue 02 (2010-09-24)

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

3 End-to-End RTN IP Management

Parameter Sink ATM Policy

Example Value Connection1: RT-VBR Connection2: RT-VBR

Principle for Value Selection Connection1 is an R99 service and you need to select the RT-VBR policy for it. Connection2 is an R99 service and you need to select the RT-VBR policy for it.

6.

Click Advanced and configure PW QoS, Advanced PW Attribute, and CE. Table 3-47 Parameters of advanced attributes Parameter EXP Example Value 1 Principle for Value Selection Set this parameter according to the network planning. On an MPLS PSN network, a control word carries the packet information. A control word is the encapsulation packet header that consists of four bytes. A control word can be used to identify the packet sequence or used for bit stuffing. A CW control word is used to detect the connectivity of a PW. The VCCV verification mode is used to detect the connectivity of a PW. Set this parameter according to the network planning. Set this parameter according to the network planning. Maximum number of ATM cells that can be encapsulated into a packet.

Control Word

Must use

Control Channel Type

CW

VCCV Verification Mode

Ping

Source ATM CoS Map

1(mapping1)

Sink ATM CoS Map

1(mapping1)

Max. Concatenated Cells Count

10

Issue 02 (2010-09-24)

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

3-141

3 End-to-End RTN IP Management

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

Parameter Packet Loading Time (us)

Example Value 1000

Principle for Value Selection Set this parameter according to the network planning.

7. 8.

Click OK. The ATMService-R99 service is created successfully. Create the ATMService-HSDPA service. For details, refer to the preceding steps. Table 3-48 Parameters of general attributes Parameter Service Type Example Value ATM Principle for Value Selection Set this parameter according to the network planning. A service ID uniquely identifies a service on the entire network. Set this parameter according to the network planning. Set this parameter according to the network planning. Set this parameter according to the network planning.

Service ID

Service Name

ATMService-HSDPA

Protection Type

Protection-free

Link Type

ATM N-to-1 VCC Cell Transport

Table 3-49 Parameters of the source node Parameter Name Example Value NE1-3-ML1-1(Trunk1) and NE1-3-ML1-2 (Trunk2) P2MP Principle for Value Selection Set this parameter according to the network planning. There are two UNI ports in this example. P2P: point to point P2MP: point to multi-point SAI Type ATM Set this parameter according to the network planning.
Issue 02 (2010-09-24)

Description

3-142

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

3 End-to-End RTN IP Management

Parameter ID

Example Value Auto-Assign

Principle for Value Selection Indicates the SAI ID of a port. Set this parameter according to the network planning.

Table 3-50 Parameters of the sink node Parameter Name Example Value NE2-3-ML1-1(Trunk1) Principle for Value Selection Set this parameter according to the network planning. P2P: point to point P2MP: point to multi-point SAI Type ATM Set this parameter according to the network planning. Indicates the SAI ID of a port. Set this parameter according to the network planning.

Description

P2MP

ID

Auto-Assign

Table 3-51 PW parameters Parameter PW ID Example Value 36 Principle for Value Selection A PW ID uniquely identifies a PW on the entire network. This parameter specifies whether a PW is dynamic or static. In the case of a dynamic PW, services are available after a signaling negotiation is successful. In the case of a static PW, a signaling negotiation is not required. In addition, you need to configure Uplink Label and Downlink Label for a static PW.

Signaling Type

Dynamic

Issue 02 (2010-09-24)

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

3-143

3 End-to-End RTN IP Management

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

Parameter Forward Type

Example Value Static Binding

Principle for Value Selection l If you set Uplink Type to Static Binding, you need to manually specify a tunnel in the Uplink Name area. l If you set Uplink Type to Select Policy, you need to set the tunnel priority in the Uplink Name area so that the system selects a tunnel according to the priority.

Forward Tunnel

Tunnel-0001

Set this parameter according to the network planning. l If you set Downlink Type to Static Binding, you need to manually specify a tunnel in the Downlink Name area. l If you set Downlink Type to Select Policy, you need to set the tunnel priority in the Downlink Name area so that the system selects a tunnel according to the priority.

Reverse Type

Static Binding

Reverse Tunnel

Tunnel-0002

Set this parameter according to the network planning. Set this parameter according to the network planning.

Encapsulation Type

MPLS

3-144

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

Issue 02 (2010-09-24)

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

3 End-to-End RTN IP Management

Table 3-52 Parameter for configuring a ATM connection Parameter Connection Name Example Value Connection1 and Connection2 Connection1: NE1-3ML1-1(Trunk1) Connection2: NE1-3ML1-2(Trunk2) Source VPI Connection1: 1 Connection2: 1 Source VCI Connection1: 101 Connection2: 101 Source ATM Policy Connection1: UBR (policy) Connection2: UBR (policy) Principle for Value Selection Set this parameter according to the network planning. Set this parameter according to the network planning.

Source SAI

VPI information carried by the service from a base station. VCI information carried by the service from a base station. Connection1 is an HSDPA service and you need to select the UBR policy for it. Connection2 is an HSDPA service and you need to select the UBR policy for it. Set this parameter according to the network planning.

Sink SAI

Connection1: NE2-3ML1-1(Trunk1) Connection2: NE2-3ML1-1(Trunk1)

Sink VPI

Connection1: 51 Connection2: 61

VPI information carried by the service after a VPI switching. Max VPI of an ATM port is 255 according to the planning and thus the value of the VPI on the sink ranges between 0 and 255. VCI information carried by the service after a VCI switching. Max VCI of an ATM port is 127 according to the planning and thus the value of the VPI on the sink ranges between 32 and 127.

Sink VCI

Connection1: 32 Connection2: 32

Issue 02 (2010-09-24)

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

3-145

3 End-to-End RTN IP Management

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

Parameter Sink ATM Policy

Example Value Connection1: UBR (policy) Connection2: UBR (policy)

Principle for Value Selection Connection1 is an HSDPA service and you need to select the UBR policy for it. Connection2 is an HSDPA service and you need to select the UBR policy for it.

Table 3-53 Parameters of advanced attributes Parameter EXP Example Value 3 Principle for Value Selection Set this parameter according to the network planning. On an MPLS PSN network, a control word carries the packet information. A control word is the encapsulation packet header that consists of four bytes. A control word can be used to identify the packet sequence or used for bit stuffing. A CW control word is used to detect the connectivity of a PW. The VCCV verification mode is used to detect the connectivity of a PW. Set this parameter according to the network planning. Set this parameter according to the network planning. Maximum number of ATM cells that can be encapsulated into a packet. Set this parameter according to the network planning.
Issue 02 (2010-09-24)

Control Word

Must use

Control Channel Type

CW

VCCV Verification Mode

Ping

Source ATM CoS Map

1(mapping1)

Sink ATM CoS Map

1(mapping1)

Max. Concatenated Cells Count Packet Loading Time (us)

20

1000

3-146

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

3 End-to-End RTN IP Management

----End

3.6.8 Example for Configuring an Ethernet Private Line Emulation Service


This topic describes the example of configuring an Ethernet private line emulation service. Specifically, the example description, service planning, and configuration process are provided. 3.6.8.1 Networking Diagram This topic describes the networking topology of the NEs. 3.6.8.2 Service Planning This topic describes parameters that are required for the data configuration. 3.6.8.3 Configuration Process This topic describes how to configure an Ethernet private line emulation service.

3.6.8.1 Networking Diagram


This topic describes the networking topology of the NEs. Between NodeB and RNC, BTS and BSC, the Ethernet service is transported through the RTN equipment, as shown in Figure 3-29. Figure 3-29 Networking diagram of the Ethernet service

Packet Swtiching Network NodeB FE FE RNC FE NE1 NE2 FE BSC

BTS

3.6.8.2 Service Planning


This topic describes parameters that are required for the data configuration.

Issue 02 (2010-09-24)

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

3-147

3 End-to-End RTN IP Management

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

Service Port Planning


Table 3-54 Service port planning Service Source NE FE Port NodeB-side service BTS-side service 2-EF8T-1 2-EF8T-2 Microwave Port 3-IFE2-1 3-IFE2-1 Sink NE Microwave Port 3-IFE2-1 3-IFE2-1 FE Port 2-EF8T-1 2-EF8T-2

Ethernet Service Planning


Table 3-55 Ethernet service planning Parameter NodeB-Side Service NE1 Service ID Service Name Service Direction UNI VLANs BPDU BPDU Bearer Type PW ID PWSignaling Type PW Type Direction Forward Label Reverse Label
3-148

BTS-Side Service

RNC-Side Service NE2

BSC-Side Service

1 E-Line-1 UNI-NNI 2-EF8T-1 (Port-1) 100 Nontransparent transmission PW 35 Static Ethernet tag mode Bidirectional 20 20

2 E-Line-2 UNI-NNI 2-EF8T-2 (Port-2) 200 Non-transparent transmission PW 45 Static Ethernet tag mode Bidirectional 30 30

1 E-Line-1 UNI-NNI 2-EF8T-1 (Port-1) 100 Non-transparent transmission PW 35 Static Ethernet tag mode Bidirectional 20 20

2 E-Line-2 UNI-NNI 2-EF8T-2 (Port-) 200 Non-transparent transmission PW 45 Static Ethernet tag mode Bidirectional 30 30
Issue 02 (2010-09-24)

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

3 End-to-End RTN IP Management

Parameter

NodeB-Side Service NE1

BTS-Side Service

RNC-Side Service NE2

BSC-Side Service

Peer IP Tunnel

10.10.10.2 1(Tunnel-0001)

10.10.10.2 1(Tunnel-0001)

10.10.10.1 2 (Tunnel-00012)

10.10.10.1 2(Tunnel-0002)

3.6.8.3 Configuration Process


This topic describes how to configure an Ethernet private line emulation service.

Prerequisite
You must be an NM user with "NE administrator" authority or higher. You must learn about the networking requirements and service planning described in the example. The network must be created. A tunnel exists between NE1 and NE2.

Procedure
Step 1 Set LSR IDs. 1. 2. In the NE Explorer, select NE1 and choose Configuration > MPLS Management > Basic Configuration from the Function Tree. Set LSR ID, Start of Global Label Space, and other parameters. Click Apply.

Parameter LSR ID

Example Value NE1: 1.0.0.1

Principle for Value Selection Set this parameter according to the network planning. In addition, this value is unique on the entire network. Set this parameter according to the network planning.

Start of Global Label Space

3.

In the NE Explorer of NE2, perform the preceding two steps to set the parameters, such as LSR ID.

Issue 02 (2010-09-24)

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

3-149

3 End-to-End RTN IP Management

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

Parameter LSR ID

Example Value NE2: 1.0.0.2

Principle for Value Selection Set this parameter according to the network planning. In addition, this value is unique on the entire network. Set this parameter according to the network planning.

Start of Global Label Space

Step 2 Configure the tunnel that carries the E-Line service. For details of the configuration, see 3.3.5.3 Configuration Process (Creating a Static CR Tunnel) or 3.3.6.3 Configuration Process (Creating a RSVP TE Tunnel). Step 3 Configure ports. 1. 2. In the NE Explorer, select NE1 and choose Configuration > Interface Management > Ethernet Interface from the Function Tree to configure ports. On the General Attributes tab page, select 2-EF8T-1(Port-1) and 2-EF8T-2(Port-2) and set the parameters, such as Port Mode and Working Mode, for those ports. Click Apply. Set relevant parameters as follows: Port: 2-EF8T-1(Port-1) and 2-EF8T-2(Port-2) l Enable Port: Enabled l Port Mode: Layer 2 (UNI port for accessing services of NodeB-side and BTS-side.) l Encapsulation Type: 802.1Q l Working Mode: Auto-Negotiation l Max Frame Length: 1620 3. Display the NE Explorers of NE2 and set the parameters relevant. For details, refer to Step 3.1 through Step 3.2.

Step 4 Configure an Ethernet private line (EPL) service. 1. 2. Choose Service > PWE3 Service > Create PWE3 Service from the main menu. Set the parameters of the E-Line-1 Ethernet service.

3-150

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

Issue 02 (2010-09-24)

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

3 End-to-End RTN IP Management

Table 3-56 Parameters of general attributes Parameter Service Type Example Value ETH Principle for Value Selection Set this parameter according to the network planning. A service ID uniquely identifies a service on the entire network. Set this parameter according to the network planning. Set this parameter according to the network planning.

Service ID

Service Name

E-Line-1

Protection Type

Protection-free

3.

Click Configure Source And Sink. A dialog box is displayed. On the Physical Topology in the upper left portion of the window, set NE1 as the source NE. Set relevant parameters, click Add Node and click OK. Table 3-57 Parameters of the source node Parameter Name SAI Type Example Value 2-EF8T-1(Port-1) ETH Principle for Value Selection NodeB-side is connected to 2-EF8T-1(Port-1). Set this parameter according to the network planning. Set this parameter according to the network planning.

Connect Type

VLAN Subinterface

4.

Click Configure Source And Sink. A dialog box is displayed. On the Physical Topology in the upper left portion of the window, set NE3 as the sink NE. Set relevant parameters, click Add Node and click OK. Table 3-58 Parameters of the sink node Parameter Name Example Value 2-EF8T-1(Port-1) Principle for Value Selection RNC-side is connected to 2-EF8T-1(Port-1).

Issue 02 (2010-09-24)

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

3-151

3 End-to-End RTN IP Management

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

Parameter SAI Type

Example Value ETH

Principle for Value Selection Set this parameter according to the network planning. Set this parameter according to the network planning.

Connect Type

VLAN Subinterface

5.

In PW in the lower left portion of the window, set relevant parameters.

Table 3-59 PW parameters Parameter PW ID Example Value 35 Principle for Value Selection A PW ID uniquely identifies a PW on the entire network. This parameter specifies whether a PW is dynamic or static. In the case of a dynamic PW, services are available after a signaling negotiation is successful. In the case of a static PW, a signaling negotiation is not required. In addition, you need to configure Uplink Label and Downlink Label for a static PW. An uplink label is attached to the packet header when an Ethernet frame is encapsulated into a PW. An uplink label is used for label switching. A downlink label is attached to the packet header when an Ethernet frame is encapsulated into a PW. A downlink label is used for label switching.

Signaling Type

Static

Forward Label

20

Reverse Label

20

3-152

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

Issue 02 (2010-09-24)

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

3 End-to-End RTN IP Management

Parameter Forward Type

Example Value Static Binding

Principle for Value Selection l If you set Uplink Type to Static Binding, you need to manually specify a tunnel in the Uplink Name area. l If you set Uplink Type to Select Policy, you need to set the tunnel priority in the Uplink Name area so that the system selects a tunnel according to the priority.

Forward Tunnel

Tunnel-0001(Forward)

Set this parameter according to the network planning. l If you set Downlink Type to Static Binding, you need to manually specify a tunnel in the Downlink Name area. l If you set Downlink Type to Select Policy, you need to set the tunnel priority in the Downlink Name area so that the system selects a tunnel according to the priority.

Reverse Type

Static Binding

Reverse Tunnel

Tunnel-0002(Reverse)

Set this parameter according to the network planning. Set this parameter according to the network planning.

Encapsulation Type

MPLS

6.

Click Advanced and configure SAI QoS, PW QoS, Advanced PW Attributes, Service Parameter and CE. Use the default value for SAI QoS.

Issue 02 (2010-09-24)

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

3-153

3 End-to-End RTN IP Management

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

Table 3-60 Service parameters Parameter MTU(byte) Example Value 1526 Principle for Value Selection Set this parameter according to the network planning. Set this parameter according to the network planning. Set this parameter according to the network planning.

BPDU

Not Transparently Transmitted User

Service Tag

Table 3-61 PW QoS parameters Parameter EXP Example Value 4 Principle for Value Selection Set this parameter according to the network planning. The CoS of user packets needs to be restored when the tunnel labels are stripped.

LSP Mode

Uniform

Table 3-62 Parameters of advanced attributes Parameter PW Type Example Value Ethernet tag mode Principle for Value Selection Set this parameter according to the network planning. On an MPLS PSN network, a control word carries the packet information. A control word is the encapsulation packet header that consists of four bytes. A control word can be used to identify the packet sequence or used for bit stuffing.

Control Word

Must Use

3-154

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

Issue 02 (2010-09-24)

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

3 End-to-End RTN IP Management

Parameter Control Channel Type

Example Value CW

Principle for Value Selection A CW control word is used to detect the connectivity of a PW. The VCCV verification mode is used to detect the connectivity of a PW.

VCCV Verification Mode

Ping

7.

Click OK. The E-Line-1 Ethernet service is created.

Step 5 Create the E-Line-2 Ethernet service. For details, refer to Step 4.1 through Step 4.7. Table 3-63 Parameters of general attributes Parameter Service Type Service ID Example Value ETH 2 Principle for Value Selection Set this parameter according to the network planning. A service ID uniquely identifies a service on the entire network. Set this parameter according to the network planning. Set this parameter according to the network planning.

Service Name Protection Type

E-Line-2 Protection-free

Table 3-64 Parameters of the source node Parameter Name SAI Type Connect Type Example Value 2-EF8T-2(Port-2) ETH VLAN Subinterface Principle for Value Selection BTS-side is connected to 2EF8T-2(Port-2). Set this parameter according to the network planning. Set this parameter according to the network planning.

Issue 02 (2010-09-24)

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

3-155

3 End-to-End RTN IP Management

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

Table 3-65 Parameters of the sink node Parameter Name SAI Type Connect Type Example Value 2-EF8T-2(Port-2) ETH VLAN Subinterface Principle for Value Selection BSC-side is connected to 2EF8T-2(Port-2). Set this parameter according to the network planning. Set this parameter according to the network planning.

Table 3-66 PW parameters Parameter PW ID Signaling Type Example Value 45 Static Principle for Value Selection A PW ID uniquely identifies a PW on the entire network. This parameter specifies whether a PW is dynamic or static. In the case of a dynamic PW, services are available after a signaling negotiation is successful. In the case of a static PW, a signaling negotiation is not required. In addition, you need to configure Uplink Label and Downlink Label for a static PW. An uplink label is attached to the packet header when an Ethernet frame is encapsulated into a PW. An uplink label is used for label switching. A downlink label is attached to the packet header when an Ethernet frame is encapsulated into a PW. A downlink label is used for label switching.

Forward Label

30

Reverse Label

30

3-156

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

Issue 02 (2010-09-24)

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

3 End-to-End RTN IP Management

Parameter Forward Type

Example Value Static Binding

Principle for Value Selection l If you set Uplink Type to Static Binding, you need to manually specify a tunnel in the Uplink Name area. l If you set Uplink Type to Select Policy, you need to set the tunnel priority in the Uplink Name area so that the system selects a tunnel according to the priority.

Forward Tunnel Reverse Type

Tunnel-0001(Forward) Static Binding

Set this parameter according to the network planning. l If you set Downlink Type to Static Binding, you need to manually specify a tunnel in the Downlink Name area. l If you set Downlink Type to Select Policy, you need to set the tunnel priority in the Downlink Name area so that the system selects a tunnel according to the priority.

Reverse Tunnel Encapsulation Type

Tunnel-0002(Reverse) MPLS

Set this parameter according to the network planning. Set this parameter according to the network planning.

Table 3-67 Service parameters Parameter MTU(byte) BPDU Service Tag Example Value 1526 Not Transparently Transmitted User Principle for Value Selection Set this parameter according to the network planning. Set this parameter according to the network planning. Set this parameter according to the network planning.

Issue 02 (2010-09-24)

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

3-157

3 End-to-End RTN IP Management

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

Table 3-68 PW QoS parameters Parameter EXP LSP Mode Example Value 4 Uniform Principle for Value Selection Set this parameter according to the network planning. The CoS of user packets needs to be restored when the tunnel labels are stripped.

Table 3-69 Parameters of advanced attributes Parameter PW Type Control Word Example Value Ethernet tag mode Must Use Principle for Value Selection Set this parameter according to the network planning. On an MPLS PSN network, a control word carries the packet information. A control word is the encapsulation packet header that consists of four bytes. A control word can be used to identify the packet sequence or used for bit stuffing. A CW control word is used to detect the connectivity of a PW. The VCCV verification mode is used to detect the connectivity of a PW.

Control Channel Type

CW

VCCV Verification Mode

Ping

----End

3.7 Modifying Configurations


This topic describes how to modify service configurations, which includes modifying and deleting service configurations. 3.7.1 Modifying Tunnel Attributes This topic describes how to modify tunnel attributes, which includes modifying and deleting tunnels. 3.7.2 Modifying PWE3 Attributes This topic describes how to modify PWE3 attributes. When certain existing PWE3 services need to be adjusted, you need to modify the related attributes.
3-158 Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. Issue 02 (2010-09-24)

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

3 End-to-End RTN IP Management

3.7.1 Modifying Tunnel Attributes


This topic describes how to modify tunnel attributes, which includes modifying and deleting tunnels. 3.7.1.1 Modifying a Tunnel This topic describes how to modify a tunnel. 3.7.1.2 Deleting a Tunnel This topic describes how to delete a tunnel.

3.7.1.1 Modifying a Tunnel


This topic describes how to modify a tunnel.

Prerequisite
You must be an NM user with "NM monitor" authority or higher.

Procedure
Step 1 Choose Service > Tunnel > Manage Tunnel from the main menu. Step 2 In the Set Filter Criteria dialog box set the filter criteria. Then, click Filter. The services meeting the filter criteria are displayed in the query result area. Step 3 Select a tunnel, and then click the related tabs to modify the related parameters.
NOTE

If you need to modify only the basic information about a tunnel, right-click the tunnel and choose Details from the shortcut menu.

----End

3.7.1.2 Deleting a Tunnel


This topic describes how to delete a tunnel.

Prerequisite
You must be an NM user with "NM monitor" authority or higher.

Context
Deleting a tunnel is to delete a configured tunnel from the NMS and equipment at the same time.

Procedure
Step 1 Choose Service > Tunnel > Manage Tunnel from the main menu. Step 2 In the Set Filter Criteria dialog box set the filter criteria. Then, click Filter. The services meeting the filter criteria are displayed in the query result area. Step 3 Right-click one or more services and choose Delete from the shortcut menu.
Issue 02 (2010-09-24) Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. 3-159

3 End-to-End RTN IP Management

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

Step 4 In the Confirm dialog box, click Yes. ----End

3.7.2 Modifying PWE3 Attributes


This topic describes how to modify PWE3 attributes. When certain existing PWE3 services need to be adjusted, you need to modify the related attributes. 3.7.2.1 Modifying a PWE3 Service This topic describes how to modify a PWE3 service. When certain existing PWE3 services need to be adjusted, you need to modify the related attributes. 3.7.2.2 Deleting a PWE3 Service This topic describes how to delete a PWE3 service. You can delete a PWE3 service if it is inapplicable, for example, when the network is adjusted. 3.7.2.3 Deleting a PWE3 Service on the Network Side This topic describes how to delete a PWE3 service from the network side. After a PWE3 service is deleted from the network side, the information about the PWE3 service is deleted from the NMS, the VSI in the PWE3 service changes to a discrete service, but the configurations on the NE side are not affected. 3.7.2.4 Undeploying a PWE3 Service This topic describes how to undeploy a PWE3 service. Undeploying a PWE3 service is deleting the PWE3 service from the NE side only. The service data still exists on the NMS side, and the service status changes from Deployed to Undeployed.

3.7.2.1 Modifying a PWE3 Service


This topic describes how to modify a PWE3 service. When certain existing PWE3 services need to be adjusted, you need to modify the related attributes.

Procedure
Step 1 Choose Service > PWE3 Service > Manage PWE3 Service from the main menu. Step 2 In the Set Filter Criteria dialog box set the filter criteria. Then, click Filter. The services meeting the filter criteria are displayed in the query result area. Step 3 Right-click a service and choose Details from the shortcut menu. Step 4 In the details, Set the related parameters as required.. Step 5 Click OK to return to the main user interface. ----End

3.7.2.2 Deleting a PWE3 Service


This topic describes how to delete a PWE3 service. You can delete a PWE3 service if it is inapplicable, for example, when the network is adjusted.

3-160

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

Issue 02 (2010-09-24)

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

3 End-to-End RTN IP Management

Procedure
Step 1 Choose Service > PWE3 Service > Manage PWE3 Service from the main menu. Step 2 In the Set Filter Criteria dialog box set the filter criteria. Then, click Filter. The services meeting the filter criteria are displayed in the query result area. Step 3 Right-click one or more services and choose Delete from the shortcut menu. Step 4 In the Confirm dialog box, click Yes. ----End

3.7.2.3 Deleting a PWE3 Service on the Network Side


This topic describes how to delete a PWE3 service from the network side. After a PWE3 service is deleted from the network side, the information about the PWE3 service is deleted from the NMS, the VSI in the PWE3 service changes to a discrete service, but the configurations on the NE side are not affected.

Procedure
Step 1 Choose Service > PWE3 Service > Manage PWE3 Service from the main menu. Step 2 In the Set Filter Criteria dialog box set the filter criteria. Then, click Filter. The services meeting the filter criteria are displayed in the query result area. Step 3 Right-click one or more services and choose Delete from Network Side from the shortcut menu. Step 4 In the Confirm dialog box, click Yes. ----End

Postrequisite
After a PWE3 service is deleted from the network side, the information about the PWE3 service is deleted from the NMS and cannot be viewed in PWE3 service management. The PW information related to the PWE3 service, however, can be viewed in discrete service management.

3.7.2.4 Undeploying a PWE3 Service


This topic describes how to undeploy a PWE3 service. Undeploying a PWE3 service is deleting the PWE3 service from the NE side only. The service data still exists on the NMS side, and the service status changes from Deployed to Undeployed.

Procedure
Step 1 Choose Service > PWE3 Service > Manage PWE3 Service from the main menu. Step 2 In the Set Filter Criteria dialog box set the filter criteria. Then, click Filter. The services meeting the filter criteria are displayed in the query result area. Step 3 Right-click a service with Deployment Status being Deployed and choose Undeploy from the shortcut menu. Step 4 In the Confirm dialog box, click Yes.
Issue 02 (2010-09-24) Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd. 3-161

3 End-to-End RTN IP Management

iManager U2000 Unified Network Management System Operation Guide for RTN End-to-End Management

After the service is undeployed, the value of Deployment Status changes from Deployed to Undeployed. ----End

Postrequisite
After the service is undeployed, you can redeploy the service. If the service fails to be undeployed, you can modify the service according to the error message, and then undeploy the service again.

3-162

Huawei Proprietary and Confidential Copyright Huawei Technologies Co., Ltd.

Issue 02 (2010-09-24)

You might also like