Professional Documents
Culture Documents
SPECIFICATIONS
Table of Content
Chapter 1.
Chapter 2.
Chapter 3.
Introduction ..............................................................................................................................5
1.1.
1.2.
Operational Requirements.......................................................................................................8
2.1.
2.2.
3.2.
Chapter 4.
Documentation........................................................................................................................28
Chapter 5.
References ...............................................................................................................................29
Chapter 6.
Abbreviations ..........................................................................................................................30
Annexures
List of Annexures....................................................................................................................31
Annexure A
Annexure B
Annexure C
Annexure D
List of Performance Parameters, their Threshold Ranges and Default Threshold ..............
Values ....................................................................................................................................43
Annexure E
H:\HOME\CNMS\CNMSSPEC.DOC
Chapter 1.
Introduction
C-DOT Network Management System (CNMS) shall manage a transport network
consisting of C-DOT SDH network elements. CNMS Ver1.0 shall support a network of
CSAM155. The network topologies supported are point to point, ring and bus. Hubbing
feature shall also be supported.
CNMS shall manage the SDH network via a gateway network element through Q
interface. It shall interact with the SDH hardware and software for information exchange
required for supporting various management functions.
CNMS is a powerful and advanced network management system, which can exploit the
full potential of SDH networks. It is a modular system which provides user friendly
graphical interface and a persistent database.
The CNMS specifications are derived from the overall TMN specifications.
SPECIFICATIONS
Chapter 1
1.1.
CNMS-OS
Q I/F
DCN(OPTIONAL)
Q I/F
ECC(STM-1)
ECC(STM-1)
SDH
NE
TRIBS
GNE
SDH
SDH
SDH
(WITH HUB)
ECC(STM-1)
TRIBS
ECC(STM)
ECC(STM-1)
TRIBS
SDH
NE
SDH
NE
SDH
NE
TRIB
1.2.
Hub network
C-DOT NMS
INTRODUCTION
SPECIFICATIONS
Chapter 2.
Operational Requirements
2.1.
SYSTEM REQUIREMENTS
CNMS-OS shall be a workstation based system with the following requirements:
1.
64MB RAM
1 GB hard disk
DAT drive
17 Colour monitor
3.
The operating system used shall be HP-UX 9.05 . The user interface shall be
developed on X-windows based MOTIF(ver 1.2) widget set.
Printer (Optional): Postscript printer
2.2.
SYSTEM UPGRADABILITY
The system shall have upgrade paths with respect to the following
OPERATIONAL REQUIREMENTS
SPECIFICATIONS
Chapter 3.
10
reference clock
order-wire channels
Alarm logging.
Alarm localisation.
Trouble Administration.
C-DOT NMS
3.2.
CNMS-OSF-MAF
CNMS-OSF-MCFq
CSAM-NEF-MAF
CSAM-NEF-MCFq
CSAM-NEF-MCFecc
SPECIFICATIONS
11
Chapter 3
OSF
MAF
f ref. point
WSF
MCFq
q reference
MCF
MCFecc
MCFecc
NEF
MAF
SDH NETWORK
MCFecc
MCFecc
MCFq
NEF
MCFecc
MAF
MAF
NEF
MCFq
MCFecc
12
C-DOT NMS
3.2.1.1.
CNMS-OSF-MAF
CNMS-OSF-MCFq
3.2.1.1.1.
Configuration management
Fault management
Performance management
Security management
CONFIGURATION MANAGEMENT
The configuration management covers the Management Application
Functions (MAFs) which enable the user to create and modify the
management model for both logical and physical resources within the SDH
network. It provides MAFs to exercise control over, identify, collect data from
and provide data to NEs.
The following functions shall be provided:
SPECIFICATIONS
13
Chapter 3
interfaces
Protection switching:
Following protection switching commands can be initiated by the user
for maintenance purpose-
14
Out of Service
Installation
Provisioning
In service
Reconfiguration
3.2.1.1.2.
FAULT MANAGEMENT
Fault management is a set of functions which enable the detection, reporting
and localization of fault conditions that occur in a SDH network. It shall
provide alarm surveillance and maintenance of a database of alarms
The following functions shall be supported
SPECIFICATIONS
Alarm Surveillance:
15
Chapter 3
Alarm Logging
It facilitates logging of all the reported alarms. Once the log exceeds a
predefined value the alarms are flushed into system log files following
which the user can take back up.
Alarm localisation
Alarm localization shall give a list of alarms, outstanding for the last
24 hours on each card unit of the NE.
Trouble administration
It is concerned with generation of troubles on identification of root
alarms in the network. Each trouble shall be identified by a unique
trouble id. and it contains a brief description of the trouble. The
trouble is automatically deleted on cessation of the root cause.
3.2.1.1.3.
PERFORMANCE MANAGEMENT
Performance Management provides functions to evaluate and report upon the
behavior of telecommunication equipment and the effectiveness of the
network or network element.
It does the function of monitoring the SDH network by collecting the
performance related data (i.e. values of the various performance parameters)
from the NE .The following functions shall be supported:
16
Performance Monitoring :
C-DOT NMS
Performance Control:
It shall involve changing the attributes related to performance
monitoring. The attributes are performance parameter thresholds and
reporting option . The control functions supported shall be :
-
Set Thresholds :
Thresholds for performance parameters shall be set by the user
as per the specified ranges.
Performance Database:
This feature facilitates logging of the reports. The scheduled and
continuous reports are logged into separate databases. Dump reports
SPECIFICATIONS
17
Chapter 3
are not logged as they are displayed online. Following actions can be
taken on the database:
3.2.1.1.4.
SECURITY MANAGEMENT
It deals with the aspects of security access relating to management functions.
The following System Administration functions are supported :
Create User
Delete User
List User
Working User
Change Password
Super-user
Privileged user
Ordinary user
18
C-DOT NMS
3.2.1.2.
CNMS-OSF-MCFq
(CNMS-OSF-MESSAGE
FUNCTION AT Q INTERFACE)
COMMUNICATION
X.212 / X.222
NETWORK LAYER
X.213 / X.223
TRANSPORT LAYER
X.214 / X.224
PHYSICAL LAYER :
It shall form the first layer of the four layer stack. It shall conform to the EIA
RS-232C (ITU V.24 and V.28) standard. The details are given in annexures.
The high speed interface shall be synchronous X.25.
3.2.1.2.2.
FLOW CONTROL :
Data shall be transferred after the connection is established. Flow
control is required to ensure data transfer in proper sequence and to
prevent data loss and buffer overflows.
SPECIFICATIONS
19
Chapter 3
3.2.1.2.3.
NETWORK LAYER :
Network Layer forms the third layer of the four layer stack. It shall support
the following features :
CONNECTION MANAGEMENT :
The Network Layer simulates multiple logical connections over a
single data link connection. It manages each logical connection for its
establishment as well as release.
DATA TRANSFER :
It takes data from Transport Layer (TPDU) and hands it over to the
other end Transport Layer as it is. For each connection, NL store upto
8 TPDUs, each of maximum size 2k.
FLOW CONTROL :
Flow control is required to regulate the information transfer. The
sliding window flow control with a window size 2 shall be used.
ROUTING OF PACKETS :
The network Layer enhanced with Routing and Congestion control is
responsible for submitting the packet to the final destination from the
source, irrespective of the no. of NEs and their connectivity. It utilizes
multiple data link interfaces to support end to end connectivity to the
transport layer.
LINK MANAGEMENT :
NL maintains the status of each link (LAP-B) associated with the NL.
3.2.1.2.4.
TRANSPORT LAYER :
It forms the fourth layer of the protocol stack. The following features shall be
supported.
20
C-DOT NMS
SPECIFICATIONS
21
Chapter 3
and PM there are eternal servers with the global connection numbers
of 1, 2 and 3 in the order. The registration of server is done by invoking
the TP primitive for connection establishment. In this the remote is
not specified and the procedure is called passive opening. Once the
passive open is done then the dynamic connections can be initiated to
the remote end. The initiation of dynamic connection is called active
opening. The transport layer can support any number of eternal
connections and up to nm dynamic connection where n is the number
of network connection and m is the multiplexing factor.
22
C-DOT NMS
connection number is added to the end of the list so it is frozen till all
the elements are allocated from the list.
3.2.2.
3.2.3.
3.2.3.1.
CSAM-NEF-MAF
CSAM-NEF-MCFq
CSAM-NEF-MCFecc
CSAM-NEF-MAF
FUNCTION
(CSAM-NEF-MANAGEMENT
APPLICATION
3.2.3.1.1.
Configuration management
Fault Management
Performance Management
CONFIGURATION MANAGEMENT
The configuration management shall maintain the complete configuration of
the equipment. It shall support following configuration management
functions.
System installation
System installation shall bring the system operational into the
network. It shall be performed after the initialization and boot up is
over. The installation shall also be possible with the help of PC based
LMI. The local manager shall provide the following data required for
installing the system at the request sent by the CM :
SPECIFICATIONS
NE address
23
Chapter 3
Protection Switching
The system shall support Dedicated Protection Ring. The request to
perform protection switching can be initiated either externally or
automatically.
Network synchronisation
-
quality of clocks
holdover time
Payload mapping
deals with mapping of PDH traffic into STM-n frame and crossconnection of traffic between STM-n frames.
3.2.3.1.2.
NE identity
Payload configuration
Switch Matrix
Alarm thresholds
FAULT MANAGEMENT
The fault management function shall comply with ITU-T Recommendation
G.784 and X.733. FM shall be responsible for collection, validation and
reporting of all the alarms occurring in the NE. It shall also maintain the
24
C-DOT NMS
current status of all the alarms. History of 150 alarms shall be provided. The
following functions are supported :
maintain separate condition filters for CNMS, LMI and remote LMI.
These condition filters shall be configurable from the respective
interfaces.
critical
major
minor
warning
indeterminate
clear
The above functions are provided for ITU-T specified as well as some
equipment specific alarms. For tables, refer to CSAM155 System
Specifications Document.
3.2.3.1.3.
PERFORMANCE MANAGEMENT
The performance management function shall comply with ITU-T
Recommendation G.784 and G.826. It shall handle the collection, monitoring
and reporting of performance parameters.
One second window shall be used to collect the accumulated performance
data or performance related information. The performance data shall be
stored for the period of 24 hours in 15 minutes registers and for past one
month in day registers. There shall be threshold values for 15 minute and
one day registers. Crossing of threshold values signify performance
degradation of the system and shall be notified to the user. The threshold
values shall be user configurable.
The reporting on all monitoring functions shall be user configurable through
LMI or CNMS. There shall be no monitoring during unavailable time (UAT).
SPECIFICATIONS
25
Chapter 3
Code Violation
ES count
SES count
UAS count
The threshold values for these counters is calculated section wise as per
G.784. Refer to CSAM155 System Specifications Document for performance
parameters and related thresholds.
3.2.3.2.
CSAM-NEF-MCFq
(CSAM-NEF-MESSAGE
FUNCTION AT Q INTERFACE)
COMMUNICATION
CSAM-NEF-MCFecc
(CSAM-NEF-MESSAGE
FUNCTION AT ECC INTERFACE)
COMMUNICATION
X.212 / X.222
NETWORK LAYER
X.213 / X.223
TRANSPORT LAYER
X.214 / X.224
26
C-DOT NMS
3.2.3.3.2.
D1 - D3
192 kbps
D4 - D12
576 kbps
3.2.3.3.3.
3.2.3.3.4.
SPECIFICATIONS
27
Chapter 4.
Documentation
The documentation provided shall be :
CNMS Users manual and Installation procedure.
28
C-DOT NMS
Chapter 5.
References
X.733
V.24/V.28
SPECIFICATIONS
CSAM155
software
requirement
29
Chapter 6.
Abbreviations
The following provides the expanded forms of the abbreviations used in the document,
along with the main references.
30
SDH
STM-n
TMN
CNMS
OS
Operations System
DCN
NE
Network Element
GNE
MF
Mediation Function
CM
Configuration Management
PM
Performance Management
FM
Fault Management
MAF
MCF
ECC
DCC
UAT
Unavailable Time
ES
Error Seconds
SES
UAS
Unavailable Seconds
EOW
APS
DPR
ITU-T
C-DOT NMS
Annexures
List of Annexures
A
SPECIFICATIONS
31
Annexure A
RESOURCE CUSTOMISATION
Concerned with customising HP-VUE environment to suit the graphical
environment of CNMS.
2.
ETERNAL PROCESSES
Creation of daemon processes (protocol, CM_main, FM_main, FM_log_server,
RM_startup )
3.
BOOTUP RECOVERY
Ensures successful booting up of CNMS.
4.
SYSTEM ADMINISTRATION
Assuming the default user to be super-user, provides for addition/deletion and other
miscellaneous system admin functions:
1.
Add user
Delete user
List users
Current user
Change password
32
Addition of NEs
C-DOT NMS
Select a connection to display connection details like VC-4 path trace, signal
label etc.
2.
3.
4.
Clock configuration/reconfiguration
5.
6.
Fault management
1.
2.
Alarm reporting filter : four types of filter support for controlling alarm reporting
mechanism of NEs
3.
4.
5.
6.
7.
Performance management
1.
2.
3.
4.
SPECIFICATIONS
33
Annexure A
5.
34
C-DOT NMS
Annexure B
CA01-2F
This equipment shall be used for the two fibre DP ring topology.
FE1
FE
N
LINE2
P
LINE 1
6
2.
CA01-4F
This equipment shall be used for the linear case with protection.
N
LINE 1
LINE 3
LINE 4
LINE 2
6
10
11
SPECIFICATIONS
35
Annexure B
CH01(2F)
This equipment shall be used to provide hub connectivity to a two fibre DP ring.
N
LINE 2
N
LINE 1
10
11
LINE 4
LINE 3
For this configuration, cards 6 and 7 shall have DP Ring protection and cards 10 and 11
shall be configured for linear protection.
4.
CH01-4F
N
LINE 1
LINE 2
LINE 3
10
11
12
Line 5
13
LINE 4
LINE 6
36
C-DOT NMS
5.
CM01
N
LINE 1
LINE 2
CR01
N
LINE 1 Rx
LINE 1 Tx
LINE 2 Rx
LINE 2 Tx
LINE 3 Rx
LINE 3 Tx
LINE 4 Rx
LINE 4 Tx
6
10
11
FE1 cards are in slots 6 and 7. The signal from each line shall enter and be regenerated
from the same card.
A pair of optical fibre/cable coming from a FE1 card shall be designated with a line no.
FE1
Slot 6
Line1
Slot 7
Line2
Slot 10
Line3
Slot 11
Line 4
Slot 12
Line 5
Slot 13
Line 6
SPECIFICATIONS
37
Annexure B
Type of Connection
Two types of connection are defined for a TU.
Unidirectional connection -A TU is dropped and added from different FE1 Cards
Bi-directional Connection - Same Number of TU is added and dropped from the same FE1
card .
For each connection type the modes possible are unidirectional
bi-directional
- add
-add drop
- drop
- pass
38
C-DOT NMS
Annexure C
LIST OF ALARMS
SPECIFICATIONS
39
Annexure C
The presence of the pattern 110 in 6,7 & 8 bit positions of K2 byte is flagged
as MS-FERF. This pattern is received whenever the sink of this multiplex
section detects a SD.
40
C-DOT NMS
Lower Order Path Far End Receive Failure (LP-FERF) or Lower Order Path
Remote Defect Indication (LP-RDI) :
This alarm is raised whenever bit 8 of V5 byte is set. This bit is set by the
path termination function of the sink on finding a TU-AIS.
2.
3.
SEVERITY LEVELS :
Severity characterises the enormity of an alarm. Following severity levels are
defined :
Critical
Major
SPECIFICATIONS
41
Annexure C
42
Minor
Warning
Clear
Indeterminate
C-DOT NMS
Annexure D
Monitored
Section
R sec
M sec
HVC-VC4
Performan
ce
Parameter
Defects / Automobiles
Threshold
15 min.
Threshold
1 day
CV
B1 error count
1-13997
1-1343693
ES
B1 error
1-900
1-65535
SES
B1 error
1-255
1-4095
OFS
OOF
1-255
1-4095
UAS
As per G.826
1-255
1-4095
CV
B2 error
1-13997
1-1343693
ES
B2 error, MS-IS,MS_FREF
1-900
1-65535
SES
B2 error, MS-IS,MS_FREF
1-255
1-4095
PJC
PJE,NJE
--
--
PSC
Protection Switching
--
--
PSD
Protection Switching
--
--
UAS
As per G.826
1-255
1-4095
CV
B3 error count
1-13531
1-1298903
ES
B3,LOP,J1mm,C2mm,HP-FEBE.
1-900
1-65535
1-255
1-4095
1-255
1-4095
HP-FREF,AIS
HVC-VC4
SES
B3 error,LOP,J1mm,C2mm,
HP-FEBE,HP-FERF,AIS
UAS
SPECIFICATIONS
As per G.826
43
Annexure D
Monitored
Section
LVCVC3,VC12
Performan
ce
Parameter
Defects / Automobiles
CV
Threshold
15 min.
Threshold
1 day
1-202
1-19354
(VC12)
(VC12)
1-4407
1-423015
(VC3)
(VC3)
ES
SES
B3,FEBE,FERF,TU-LOP,TU-AIS,J1J2mm,C2/V5mm,H4
1-255
1-4095
UAS
As per G.826
1-255
1-4095
Section / Parameter
Rsect
LOS
LOF
Msect
UAT AIS LOP
HVC path
UAT AIS LOP
LVC path
UAT AIS
RSect
CV
ES
SES
OFS
UAS
CV
ES
SES
PSC
PSD
UAS
CV
ES
SES
UAS
MSect
HVC path
LVC path
44
C-DOT NMS
List of Performance Parameters, their Threshold Ranges and Default Threshold Values
Section / Parameter
Rsect
LOS
LOF
Msect
UAT AIS LOP
HVC path
UAT AIS LOP
LVC path
UAT AIS
CV
ES
SES
UAS
I -Inhibited
M-Monitored
Parameters during UAT will be inhibited in CMF-PM and monitored by LCU-PM.
Similarly parameters during alarm conditions shall be inhibited in LCU-PM
SPECIFICATIONS
45
Annexure E
SUPER-USER
PRIVELEGED
ORDINARY
Network # New
Network # Open
Network # Close
Network # Delete
Network # Save
Edit # Add NE
Edit # Delete NE
Mgmt # CM
Mgmt # FM
Mgmt # PM
Install
Connect to N/W
Reconfiguration
46
C-DOT NMS
SUPER-USER
PRIVELEGED
ORDINARY
Payload # Add/Drop
Order-wire # Set
Order-wire # View
ALS # Set
ALS # View
Exit # CM exit
SUPER USER
PRIVELEGED
USER
Reporting#History#Get parameters
Reporting#History#Set parameters
Reporting#History#Request History
Thresholds # Set
Thresholds # Get
SPECIFICATIONS
ORDINARY
USER
47
Annexure E
FEATURE NAME
SUPER USER
PRIVELEGED
USER
ORDINARY
USER
Log # View
Log # Summary
Localise # Localise
View History
View Surveillance
FM Exit # Exit
SUPER
USER
PRIVELEGED
USER
Threshold # View
Schedules # View
Schedules # Cancel
Log # Backup
PM Exit # Exit
48
ORDINARY
USER
C-DOT NMS