iManager U2000 Unified Network Management System V100R001C00

Operation Guide for WDM End-to-End Management

Issue Date

02 2009-10-23

Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd.

Huawei Technologies Co., Ltd. provides customers with comprehensive technical support and service. For any assistance, please contact our local office or company headquarters.

Huawei Technologies Co., Ltd.
Address: Huawei Industrial Base Bantian, Longgang Shenzhen 518129 People's Republic of China http://www.huawei.com support@huawei.com

Website: Email:

Copyright © Huawei Technologies Co., Ltd. 2009. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means without prior written consent of Huawei Technologies Co., Ltd.

Trademarks and Permissions
and other Huawei trademarks are the property of Huawei Technologies Co., Ltd. All other trademarks and trade names mentioned in this document are the property of their respective holders.

Notice
The purchased products, services and features are stipulated by the contract made between Huawei and the customer. All or part of the products, services and features described in this document may not be within the purchase scope or the usage scope. Unless otherwise specified in the contract, all statements, information, and recommendations in this document are provided “AS IS” without warranties, guarantees or representations of any kind, either express or implied. The information in this document is subject to change without notice. Every effort has been made in the preparation of this document to ensure accuracy of the contents, but the statements, information, and recommendations in this document do not constitute a warranty of any kind, express or implied.

Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd.

iManager U2000 Operation Guide for WDM End-to-End Management

Contents

Contents
About This Document.....................................................................................................................1 1 Customer Management.............................................................................................................1-1
1.1 Creating a Customer........................................................................................................................................1-3 1.2 Browsing Customer Information.....................................................................................................................1-3 1.3 Viewing Relevant Trails of a Customer..........................................................................................................1-3 1.4 Browsing Current Alarms of a Customer........................................................................................................1-4 1.5 Browsing History Alarms of a Customer........................................................................................................1-5 1.6 Modifying Customer Information...................................................................................................................1-6 1.7 Deleting a Customer........................................................................................................................................1-6 1.8 Viewing the Customers Affected by an Alarm...............................................................................................1-6 1.9 Specifying the Customer of a Service.............................................................................................................1-7

2 Managing WDM Protection Subnets.....................................................................................2-1
2.1 Basic Concepts................................................................................................................................................2-2 2.1.1 Protection Subnet...................................................................................................................................2-2 2.1.2 Isolated Node..........................................................................................................................................2-2 2.2 Searching for Protection Subnets....................................................................................................................2-2 2.3 Configuring 1:N Wavelength Protection.........................................................................................................2-3 2.3.1 Creating 1:N Optical Channel Protection...............................................................................................2-3 2.3.2 Searching for 1:N Wavelength Protection Subnet.................................................................................2-5 2.3.3 Setting 1:N Wavelength Protection Subnet Parameters.........................................................................2-6 2.3.4 Verifying the 1:N Wavelength Protection Switching............................................................................2-7 2.4 Configuring Protection for an ODUk SPRing.................................................................................................2-8 2.4.1 Creating an ODUk SPRing Protection Group........................................................................................2-8 2.4.2 Searching for an ODUk SPRing Protection Subnet.............................................................................2-10 2.4.3 Setting Parameters of an ODUk SPRing Protection Subnet................................................................2-11 2.4.4 Verifying the ODUk SPRing Protection Switching.............................................................................2-11 2.4.5 ODUk Ring Network Protection..........................................................................................................2-13 2.5 Maintaining Protection Subnets....................................................................................................................2-17 2.5.1 Finding Protection Subnets..................................................................................................................2-17 2.5.2 Querying Protection Subnet Resources................................................................................................2-18 2.5.3 Performing the Protection Switching for a 1:N Wavelength Protection Subnet..................................2-18 2.5.4 Performing ODUk Ring Protection Switching.....................................................................................2-19 Issue 02 (2009-10-23) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. i

................................8 Deleting a WDM Trail.............3-31 3..1................................................3-37 3........................................................................................................................1 Collecting Statistics on Client-Side Port Resources................................1......................................1.3 Modifying Trail Names in Batches...........................2 Modifying WXCP/SNCP Protection............2-21 3 End-to-End WDM Management..........................................................4..................................................................................1.................................5....3-28 3..........1........3-23 3...................1.................................................7 Deleting Protection Subnets...................................................................7...................................3-32 3..2 Discrete Service Causes and Handling Measures.................................2.........................................1 Basic Concepts......1...........3-30 3........3................3-34 3.............................................5..5..........3-9 3.......3-32 3............................1.....2...............1.............3-25 3.......................4 Process for Creating a Trail..................................................................7 Viewing the Connectivity of WDM Services Networkwide.......1...............................5............3-22 3........................................4..............7......1.......................1................3 Querying the 1+1 Protection for a WDM Trail..........................................................1...................................6......1............3-33 3........................................................1.......1...1 Viewing Route Information of WDM Trail................................................1 Activating/Deactivating WDM Trails....3...........3 Configuring WDM Trails..3-15 3..............3-29 3....4.............................3 Creating Client Trails..3-37 3.......................................................................2 Conflict Trail..................................3-7 3.............................6 Deleting Isolated Nodes........4 Browsing Related Server Trails............Contents iManager U2000 Operation Guide for WDM End-to-End Management 2.....................................................................1................................1...........3-21 3................................................................................ Issue 02 (2009-10-23) .............................3-3 3.......................................................................... Ltd................1...............................................1........................................................................................8 Browsing Associated Working and Protection Trails......................................5 Maintaining WDM Trails.............................3-17 3...............1..................3-24 3.....4......................6 Analyzing the WDM Trail Fault.............................1................3-20 3....1.....3-40 ii Huawei Proprietary and Confidential Copyright © Huawei Technologies Co....................................................2 Creating an ODUk Trail..........................................................................3-36 3.....................................................................1 WDM Trail................1.............................1..............6.....1.....3-39 3....3-11 3........6 Collecting Resource Statistics...3 Viewing Relevant Client Trails.................................3-27 3....................................1.............................2 Collecting Statistics on Inter-Station Wavelength Resources.........................................................................................................................................3-33 3..................................1 Creating an OCh Trail............................................................................................................................4...........6 Performing the WXCP/SNCP Protection Switching for a WDM Trail..1...........................3-2 3..........3-38 3...............3-12 3............................................................3-23 3.........................................3-27 3......................................1..........2 Configuring OTU Overhead on the OCh Trail....................................................................................................5......1......4 Viewing WDM Trails....................3-19 3...................................................3-13 3.........................................4.4 Performing 1+1 Protection Switching for a WDM Trail............1 Managing WDM Trails..............................................6.............3-35 3...7.5 Querying the WXCP/SNCP Protection of a WDM Trail..........5 Viewing the Optical Power for the Trails.3-26 3.........1 Modifying the Source and Sink of a Client Trail.......................5.......3-2 3.......................................................3 Collecting Statistics on WDM Link Resources.....................................................1...............................................1...............3......................3-10 3............................................3-14 3......1..........................................3 Trail Creation Method..................1..7 Querying the DPPS Protection of a WDM Trail..............................................1...........................1..............................4........................4........1..............1..............................1.................................................1 Searching for WDM Trails..............................2 Viewing the Signal Flow Diagram for WDM Trails.................................7 Modifying WDM Trails........1............5.........3-1 3..................................................2 Creating WDM Trails by Trail Search.............................................1..........................1..2-21 2..........................................

.........A-1 A.......................................................................A-15 A.......................................A-17 A...........................3-60 3...A-2 A.......................................2 Browsing the History Performance of WDM Trails..................................................................................................................................................1................................A-8 A..4..............................................................................3-50 3..................................................................................A-2 A.....................1 EAPE........8 G.......2................................................................................................................4 C..........20 U....................................................................................A-13 A..................................................................................................................................................................................3-58 3................................3-45 3........................................................................................iManager U2000 Operation Guide for WDM End-to-End Management Contents 3.................................................A-21 A.............................................................................................................................7 F............................2..........................12 M........10 I................4 Starting EAPE Adjustment...................................................................................10 Sample Application: Configuring an OCh Trail............................................................3-59 3.......................................................................................................................3.....3-56 3...............................A-18 A................................................................4 Setting WDM Trail Performance Threshold.............................3-57 3...............................1 Numerics.......4..23 X.....................A-28 A...15 P........................A-22 A............. iii ..........................3 B.......3-41 3...........2 Configuring EAPE...................................................3 Setting Performance Monitoring Parameters of an WDM Trail........................................................6 E..........................A-9 A...................................3.................................................................................................................................................A-29 A...........2.........................................3-58 3..........................................................................................................9 Sample Application: Configuring GE Services with the WXCP Protection in End-to-End Mode................. Ltd....................................................................................................................................................3-59 3....................................................................................................................................................................3-62 3....4...............1 Viewing Current Alarms of a WDM Trail...................................................................11 L............................3-54 3..................A-20 A................................................................................................................................2 Viewing History Alarms of a WDM Trail........................................................................................................................................2...............................19 T..........................................................................................................13 N.......................................................................................1..............................3 Creating EAPE Objects..............3 Managing Networkwide WDM Alarm Trails in Real Time..................................5 D...............................................................................3-63 A Glossary and Abbreviations.......2.........A-6 A...........................................................................................................................................A-12 A................A-12 A............................A-26 A.................................................................................................................................................................................4 Managing the Performance of WDM Trails............................................................22 W........................................................................................................4...................9 H........................................................................................................................................A-21 A.......................................................3-60 3......1 Querying Current Performance of WDM Trails.............A-30 A................A-7 A.......................................................................................3-61 3.................................................2 A...................16 Q......................................5 Deleting EAPE Objects.18 S...................................................................................................................................A-31 Issue 02 (2009-10-23) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co............................................A-15 A...............................3 Managing Alarms on WDM Trails................................................................14 O................................................................................................................................A-11 A.............................................................................................................................................................17 R...................................................................................................................3.........................................................................................3-50 3.........................................3-61 3..............................2 Creating an OCh Trail............................21 V....................................................................................................................................................................................................

.

.......................................................................................................................................................................................................................................................................................................................3-8 Figure 3-8 A conflict trail generated because a single station cross-connection is lost...........................................3-42 Figure 3-14 Station B...........................................................................................................................................................................3-43 Figure 3-16 Station D............................................................................................................................................................................................................................................................................................ Ltd...............................................................................................................3-43 Figure 3-17 Network design.......................3-47 Figure 3-19 Signal flow of the trail from station B to station C......3-53 Figure 3-24 Scenario of the dual VOA units with the OLP protection units.3-48 Figure 3-21 Signal flow of the trail from station D to station B......3-7 Figure 3-7 A conflict trail generated because a fiber is added.............................................................3-10 Figure 3-11 Creating trails in the automatic mode........................................ ..................................................................) trail..........................iManager U2000 Operation Guide for WDM End-to-End Management Figures Figures Figure 3-1 Trail........................................................................................................................................................................3-46 Figure 3-18 NE panel on station A..........................................................3-6 Figure 3-6 10G inverse multiplexing trail ...........................) trail...............3-4 Figure 3-3 ODUk (k = 1... v ............................................................................................................................................................................................................................................................................................................................................................................................................... 2............3-43 Figure 3-15 Station C......................................................... ..............................3-11 Figure 3-12 Network Design................................................................................3-8 Figure 3-10 Creating trails by trail search................................................................................................................................3-4 Figure 3-2 OSC Trail...............................................................................................3-52 Figure 3-23 Scenario of the dual VOA units that take the dual-fed and selective-receiving OTUs as the sources ......................................... 2.3-5 Figure 3-5 40G inverse multiplexing trail ......................3-53 Issue 02 (2009-10-23) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co...........................3-42 Figure 3-13 Station A..............................................3-48 Figure 3-22 Scenario of the single VOA unit that takes the common OTU as the source.....3-5 Figure 3-4 ODUk (k = 0....................................... 1.........................................3-8 Figure 3-9 A conflict trail generated because a protection service is deleted on a per-NE basis....3-47 Figure 3-20 Signal flow of the trail from station B to station D................................

iManager U2000 Operation Guide for WDM End-to-End Management

Tables

Tables
Table 3-1 ODUk rate level...................................................................................................................................3-3 Table 3-2 Comparison of methods for creating trails...........................................................................................3-9 Table 3-3 Network data table.............................................................................................................................3-46 Table 3-4 The versions of the equipment and U2000 that support the EAPE function.....................................3-51

Issue 02 (2009-10-23)

Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd.

vii

Chapter 1 Customer Management 2 Managing WDM Protection Subnets Description This chapter describes how to manage and maintain the customer information. This chapter describes how to manage WDM protection subnets. Related Version The following table lists the product version related to this document. This document also provides the glossary. and the acronyms and abbreviations.iManager U2000 Operation Guide for WDM End-to-End Management About This Document About This Document Purpose The iManager U2000 Operation Guide for WDM End-to-End Management describes the operation tasks of managing WDM network in the trail mode. . Product Name iManager U2000 Version V100R001C00 Intended Audience The intended audiences of this document are: l l l l Network Monitoring Engineer Data Configuration Engineer NM Administrator System Maintenance Engineer Organization This document is organized as follows.. Ltd. 1 Issue 02 (2009-10-23) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co.

Indicates a potentially hazardous situation that.About This Document iManager U2000 Operation Guide for WDM End-to-End Management Chapter 3 End-to-End WDM Management A Glossary and Abbreviations Description This chapter describes end-to-end WDM management. could cause equipment damage. if not avoided. Names of files. Italic Courier New 2 Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. They are defined as follows. and performance degradation. log in as user root. Terminal display is in Courier New. This part lists the glossary and abbreviations used in the document. WARNING CAUTION NOTE TIP General Conventions Convention Times New Roman Boldface Description Normal paragraphs are in Times New Roman. Ltd. For example. Conventions Symbol Conventions The following symbols may be found in this document. Indicates a hazard with a medium or low level of risk which. Issue 02 (2009-10-23) . Provides additional information to emphasize or supplement important points of the main text. if not avoided. Book titles are in italics. data loss.. will result in death or serious injury. folders. if not avoided. Indicates a tip that may help you solve a problem or save you time. Symbol Description DANGER Indicates a hazard with a high level of risk which. and users are in boldface. could result in minor or moderate injury. directories. or unexpected results.

For example.. 3 . A minimum of one or a maximum of all can be selected. Ltd. > Keyboard Operation Format Key Key 1+Key 2 Description Press the key. parameters. For example. Items (keywords or arguments) in square brackets [ ] are optional...iManager U2000 Operation Guide for WDM End-to-End Management About This Document Command Conventions Convention Boldface Italic [] { x | y | . menus. window. For example. press Enter and press Tab. Issue 02 (2009-10-23) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co.. Alternative items are grouped in braces and separated by vertical bars. Optional alternative items are grouped in square brackets and separated by vertical bars.. For example. Multi-level menus are in boldface and separated by the ">" signs. and dialog titles are in boldface.. pressing Ctrl+Alt+A means the three keys should be pressed concurrently. Press the keys concurrently. } [ x | y | . } * [ x | y | . A maximum of all or none can be selected. choose File > Create > Folder. One or none is selected. ] * GUI Conventions Convention Boldface Description Buttons... One is selected. { x | y | . Optional alternative items are grouped in square brackets and separated by vertical bars.. ] Description The keywords of a command line are in boldface. Alternative items are grouped in braces and separated by vertical bars. tabs. Command arguments are in italic. click OK.

For example. 4 Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. Press the primary mouse button twice continuously and quickly without moving the pointer. Updates in Issue 01 (2009-09-25) Based on Product Version V100R001C00 Initial release. Press and hold the primary mouse button and move the pointer to a certain position. Drag Update History Updates between document versions are cumulative. A means the two keys should be pressed in turn. pressing Alt. Mouse Operation Action Click Double-click Description Select and release the primary mouse button without moving the pointer. Issue 02 (2009-10-23) . Therefore.. Ltd.About This Document iManager U2000 Operation Guide for WDM End-to-End Management Format Key 1. Key 2 Description Press the keys in turn. Updates in Issue 02 (2009-10-23) Based on Product Version V100R001C00 The updated contents are as follows. Some bugs in the manual of the previous version are fixed. the latest document version contains all updates made to previous versions.

In the network management. 1-1 .1 Creating a Customer You can create customer information as required. Ltd. you can learn about the long-term status of the services that run in the network. knowing the trails of different customers is very helpful to take care of the interests of different customers.5 Browsing History Alarms of a Customer By querying the history alarms of a customer. 1.4 Browsing Current Alarms of a Customer Each customer has a number of services that can report alarms when they run in the network.8 Viewing the Customers Affected by an Alarm Issue 02 (2009-10-23) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co.iManager U2000 Operation Guide for WDM End-to-End Management 1 Customer Management 1 About This Chapter Customer Management By using the U2000. For this reason.7 Deleting a Customer The information of customers with whom contracts are fulfilled must be deleted..6 Modifying Customer Information If the customer information such as contact mode is changed. 1. legal representative and contact modes of the relevant customer of the service. so that you can set a specific customer and a maintenance network for the trail. 1. you need to modify the customer information in time. 1.3 Viewing Relevant Trails of a Customer In a normally running network. you can manage and maintain the customer information as required. 1.2 Browsing Customer Information By browsing customer information. 1. When maintaining the services of the customer. you can know the name. 1. 1. and decreases the redundant information in the database. This operation ensures that the customer information is not disclosed. you can use the history alarm information for reference. These alarms show the current status of the service. the trail is the carrier of the customer service and is the resource of the customer. you must query the current alarms of the customer.

1 Customer Management iManager U2000 Operation Guide for WDM End-to-End Management When an alarm occurs on a service. 1. you need to specify the customer that the service belongs to. you can determine whether to notify the customer of the alarm. Issue 02 (2009-10-23) . Ltd.. you need to query the customers that are affected by the alarm. According to the query result.9 Specifying the Customer of a Service When creating and modifying a service. 1-2 Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. This can facilitate the trail management.

The Customer Management window is displayed.1 Creating a Customer You can create customer information as required. Prerequisite You must be an NM user with "network monitor" authority or higher. ----End 1. and Phone. Step 2 Click Create. such as Customer Name. the new customer information field is displayed in the customer list. so that you can set a specific customer and a maintenance network for the trail.iManager U2000 Operation Guide for WDM End-to-End Management 1 Customer Management 1. you can click Refresh to browse the changed customer information. Procedure Step 1 Choose Service > Customer Management from the Main Menu. the trail is the carrier of the customer service and is the resource of the customer. you can know the name. Prerequisite You must be an NM user with "network operator" authority or higher. the Create Customer window is displayed. In the Customer Management window. Legal Representative. all customer information is displayed.. Procedure Step 1 Choose Service > Customer Management from the Main Menu.2 Browsing Customer Information By browsing customer information. Ltd.3 Viewing Relevant Trails of a Customer In a normally running network. Step 2 Optional: If the customer information is changed. Issue 02 (2009-10-23) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. 1-3 . ----End 1. In the network management. fill in the new customer information. Prerequisite You must be an NM user with "network monitor" authority or higher. legal representative and contact modes of the relevant customer of the service. Step 4 Click OK. Step 3 According to actual requirements. knowing the trails of different customers is very helpful to take care of the interests of different customers.

Ltd. and choose Browse Relevant Trails > Ethernet Trail from the shortcut menu. Right-click a record of customer information. select the Display latest alarms check box in the bottom-left corner. Issue 02 (2009-10-23) . The current SDH/WDM/Ethernet/ATM service alarms of the customer are displayed in the Current Alarms dialog box. theRefresh button is unavailable. and choose Browse Relevant Trails > WDM Trail from the shortcut menu. After you select this check box. Step 2 You can view the SDH/WDM/Ethernet/ATM current alarms separately. l l l l Right-click a record of customer information. Right-click a record of customer information. you must query the current alarms of the customer. The Customer Managementdialog box displays the information about all the customers..1 Customer Management iManager U2000 Operation Guide for WDM End-to-End Management Procedure Step 1 Choose Service > Customer Management from the Main Menu. The information of all customers is displayed in the Customer Management window. For this reason. l l l l Right-click a customer and choose Browse Relevant Alarms > SDH Current Alarm. Step 3 To display the latest alarms. NOTE This check box is similar to the refresh function. and choose Browse Relevant Trails > SDH Trail from the shortcut menu. Right-click a customer and choose Browse Relevant Alarms > Ethernet Current Alarm.4 Browsing Current Alarms of a Customer Each customer has a number of services that can report alarms when they run in the network. Procedure Step 1 Choose Service > Customer Management from the Main Menu. Step 2 You can view the SDH/WDM/Ethernet/ATM trails seperately. Prerequisite You must be an NM user with "network monitor" authority or higher. The SDH/WDM/Ethernet/ATM trails of the customer are displayed in the SDH/WDM/ Ethernet/ATM Trail Management window. Right-click a record of customer information. Right-click a customer and choose Browse Relevant Alarms > ATM Current Alarm. and select Check from the short menu to check the selected alarms. Step 4 Optional: Right-click one or more alarms. ----End 1. and choose Browse Relevant Trails > ATM Trail from the shortcut menu. These alarms show the current status of the service. 1-4 Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. Right-click a customer and choose Browse Relevant Alarms > WDM Current Alarm.

click Yes.5 Browsing History Alarms of a Customer By querying the history alarms of a customer. In the Delete the Alarms prompt box. 1-5 . Step 7 Optional: Click Yes. Otherwise. Step 9 Optional: Click Print or Save As to output the alarm data. If the alarm is found among the current alarms on the NE side. When maintaining the services of the customer.iManager U2000 Operation Guide for WDM End-to-End Management NOTE 1 Customer Management The check function means that one or more currently unterminated alarms on the U2000 are compared with those on the NE side. terminate it on the U2000 side. Right-click a customer and choose Browse Relevant Alarms > ATM History Alarm. Right-click a customer and choose Browse Relevant Alarms > Ethernet History Alarm. The history alarms of the SDH/WDM/Ethernet/ATM service are displayed in the History Alarms dialog box. ----End Issue 02 (2009-10-23) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. Prerequisite You must be an NM user with "network monitor" authority or higher. The Customer Management dialog box displays the information about all the customers. you can learn about the long-term status of the services that run in the network. Step 4 Optional: Click Print or Save As to output the alarm data. and then click Delete. Right-click a customer and choose Browse Relevant Alarms > WDM History Alarm. Click Acknowledge to display the Acknowledge Alarms dialog box. Step 2 You can view the SDH/WDM/Ethernet/ATM history alarms separately. The progress bar is displayed for the operation of deleting the alarms. Ltd. you can use the history alarm information for reference.. Step 5 Select an alarm. Ack Status and Ack User columns of the selected alarm shows the relevant values. l l l l Right-click a customer and choose Browse Relevant Alarms > SDH History Alarm. The Ack Time. Step 3 Optional: Select an alarm. Step 8 Optional: Select one or more alarms. Step 6 Optional: Select one or more alarms. ----End 1. NOTE The confirmed and terminated alarms are changed to history alarms. The detail information and reason of the alarm are displayed in the following list. it is not modified on the U2000 side. The detail information and reason of the alarm are displayed in the following list. Procedure Step 1 Choose Service > Customer Management from the Main Menu.

6 Modifying Customer Information If the customer information such as contact mode is changed. edit the customer information.1 Customer Management iManager U2000 Operation Guide for WDM End-to-End Management 1.7 Deleting a Customer The information of customers with whom contracts are fulfilled must be deleted. you need to modify the customer information in time.. you need to query the customers that are affected by the alarm. you can determine whether to notify the customer of the alarm. Procedure Step 1 Choose Service > Customer Management from the Main Menu to display the Customer Management dialog box. In the Warningdialog box. Click Delete. Step 3 The Operation Result prompt box is displayed. select Yes. Step 2 Select a customer from the customer list. ----End 1. Issue 02 (2009-10-23) . Procedure Step 1 Choose Service > Customer Management from the Main Menu to display the Customer Management dialog box. Step 3 The Operation Result prompt box is displayed. ----End 1. Click Close. This operation ensures that the customer information is not disclosed. According to the query result. Click Close. NOTE Deleting the customer does not affect the information of the trails and alarms that are related to the customer. Prerequisite You must be an NM user with "network operator" authority or higher.8 Viewing the Customers Affected by an Alarm When an alarm occurs on a service. Prerequisite You must be an NM user with "network operator" authority or higher. Prerequisite You must be an NM user with "network monitor" authority or higher. Step 2 Select the customer to be deleted. Ltd. 1-6 Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. and then click Apply. and decreases the redundant information in the database.

This can facilitate the trail management. OMS. view the information about the customers that are affected by the alarm. or Service > PTN Service > ATM Service Management from the main menu. you need to specify the customer that the service belongs to. Service > PTN Service > L3VPN Service Management. ----End 1. 1-7 . Prerequisite You must be an NM user with "network operator" authority or higher. you can not specify the customers of OTS. Service > MSTP Ethernet Trail > Ethernet Trail Management.9 Specifying the Customer of a Service When creating and modifying a service. NOTE You can query the customers affected by only the alarms that occur on trails. select the required customer.. Service > MSTP ATM Trail > ATM Trail Management. Step 3 In the Customer Management window. Step 2 In the trail management window. double-click a trail. The window of viewing alarms is displayed. OSC level trails. Procedure Step 1 Choose Service > SDH Trail > SDH Trail Management. Service > PTN Service > L2VPN Service Management. Ltd. Step 3 Click OK. Service > WDM Trail > WDM Trail Management.iManager U2000 Operation Guide for WDM End-to-End Management 1 Customer Management Procedure Step 1 Choose Fault > Browse Current Alarm or Fault > Browse History Alarm from the main menu. In the Details window. Service > PTN Service > CES Service Management. ----End Issue 02 (2009-10-23) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. Context For WDM trails. Step 2 Right-click an alarm and choose Alarm Affected Customers from the shortcut menu.

.

belonging to the network layer. modifying and searching for protection subnets. The purpose of managing protection subnets is to configure and display network protection. the configured protection attributes at the NE layer on the U2000 are synchronized to the network layer on the U2000 to create protection subnets automatically. 2-1 . 2.1 Basic Concepts According to the layered structure of transport network.. Issue 02 (2009-10-23) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co.3 Configuring 1:N Wavelength Protection On the U2000. Ltd.2 Searching for Protection Subnets By searching for a protection subnet.6 Deleting Isolated Nodes To release protection resources that are used by isolated nodes. you can query the protection subnet resources for an ODUk SPRing.5 Maintaining Protection Subnets On the U2000. you can delete the protection subnet. 2. deleting. perform data consistency check on the ODUk SPRing. To have a good understanding of the protection subnet. 2. for example.iManager U2000 Operation Guide for WDM End-to-End Management 2 Managing WDM Protection Subnets 2 Managing WDM Protection Subnets About This Chapter A protection subnet has a structure of providing complete self-protection functions. and perform an external switch from 1:N wavelength protection subnets. 2. search for 1:N wavelength protection subnets. 2.7 Deleting Protection Subnets When an existing protection subnet is not suitable. 2. set the protection subnet parameters for the ODUk SPRing. 2. managing isolated nodes. and delete an ODUk SPRing. you need to learn some basic concepts of the network layer. protection subnet. browsing. you can create 1:N wavelength protection groups. refers to a network structure that has a comprehensive self-protection function. search for the ODUk SPRing. you can maintain protection subnets. you need to delete isolated nodes. create an ODUk protection group. The protection subnet is a network unit of composing the optical transport network.4 Configuring Protection for an ODUk SPRing By using the U2000.

1. you need to learn some basic concepts of the network layer. a protection subnet is a network level concept. The protection subnet is a network unit of composing the optical transport network. In the U2000.1.1. 2. 2. NEs and fiber connections are the basic elements required to construct a protection subnet. 2. refers to a network structure that has a comprehensive self-protection function. and then properly create fiber connections between the NEs. Currently. 2. An isolated node refers to a special logical system that is independent from any protection subnet. An isolated node refers to a special logical system that is independent from any protection subnet. An isolated node does not belong to any protection subnet.2 Managing WDM Protection Subnets iManager U2000 Operation Guide for WDM End-to-End Management 2.. Ltd. Issue 02 (2009-10-23) .1 Protection Subnet A protection subnet refers to a network architecture that has a comprehensive self-protection function.2 Isolated Node An isolated node is not equal to an isolated NE. An isolated node does not belong to any protection subnet. 2-2 Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. To have a good understanding of the protection subnet. the WDM equipment supports the 1:N optical path protection subnet and the ODUk SPRing protection subnet. The reason for the existence of any isolated nodes can be as follows: l l The configuration is incorrect at the NE side. The network node that is configured with the 1:N optical path protection group or the ODUk SPRing protection group but does not belong to any protection subnet is an isolated node.1 Protection Subnet A protection subnet refers to a network architecture that has a comprehensive self-protection function. You should create NEs. It is a network that composes the optical transmission network. perform basic configurations for them. You should have access to sufficient resources to create a protection subnet. It is a network that composes the optical transmission network.1 Basic Concepts According to the layered structure of transport network. protection subnet. An isolated node is a node that is configured at NEs but cannot or does not compose a protection subnet with other nodes.2 Searching for Protection Subnets By searching for a protection subnet. The fiber that should be connected to the node is not created on the U2000.2 Isolated Node An isolated node is not equal to an isolated NE. belonging to the network layer.1. 2. An isolated node should not exist in a transmission network that runs normally. the configured protection attributes at the NE layer on the U2000 are synchronized to the network layer on the U2000 to create protection subnets automatically.

NOTE If the verification is unsuccessful and the subnet becomes abnormal. 2. you need to create a 1:N (N≤8) optical channel protection group for each node. Consistent Status and Subnet Type parameters of the searched protection subnet are automatically displayed.4 Verifying the 1:N Wavelength Protection Switching After you search out the 1:N wavelength protection subnet and set the related parameters. you need to search for the 1:N wavelength protection subnet. 2.3. To create 1:N (N≤8) optical channel protection. Step 3 Click Search to start the search. Issue 02 (2009-10-23) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co.1 Creating 1:N Optical Channel Protection 1:N (N≤8) optical channel protection is created based on 1:N (N≤8) optical channel protection group. you can delete the nodes that do not form any protection subnet.2 Searching for 1:N Wavelength Protection Subnet After creating 1:N wavelength protection groups and searching for WDM trails. you can manage the 1:N wavelength protection as a protection subnet. To create 1:N (N≤8) optical channel protection. Refer to 2. Step 4 Click Finish. The Subnet Name.iManager U2000 Operation Guide for WDM End-to-End Management 2 Managing WDM Protection Subnets Prerequisite l l You must be an NM user with "network maintainer" authority or higher. 2. search for 1:N wavelength protection subnets. select the protection subnet and click Next. and fibers must be properly created. you need to delete the abnormal subnet from the network layer and then re-search for the subnet. 2. 2.3 Setting 1:N Wavelength Protection Subnet Parameters You can set parameters for a 1:N wavelength protection subnet. you can create 1:N wavelength protection groups.3.3.6 Deleting Isolated Nodes. ----End 2.3 Configuring 1:N Wavelength Protection On the U2000. you need to create a 1:N (N≤8) optical channel protection group for each node. The searched protection subnet is displayed in the Main Topology.1 Creating 1:N Optical Channel Protection 1:N (N≤8) optical channel protection is created based on 1:N (N≤8) optical channel protection group. and perform an external switch from 1:N wavelength protection subnets. you can verify whether the subnet works properly by performing the switching and querying the switching status.3. Procedure Step 1 Choose Service > WDM Protection Subnet > WDM Protection Subnet Search from the Main Menu. Ltd. In this way. In this case.3. 2-3 . the search menu is unavailable. The NE data must be configured. Step 2 In the Consistency Verification of Existing Subnet screen.. NOTE If there are isolated nodes searched out.

The Create dialog box is displayed. Step 4 Double-click the Number of Working Channels field. Step 2 Click Query to query the information about the protection from the NE. Step 5 Double-click the OTU Optical Interface Number field corresponding to the Protection Channel of the Working Channel-1. select an NE and choose Configuration > 1:N Optical Channel Protection from the Function Tree. OptiX BWS 1600G OLA and OptiX BWS 1600S. and set the priority based on the actual requirement. Issue 02 (2009-10-23) . Applies to the OptiX BWS 1600A and OptiX BWS 1600G (NA). and all internal and external fibers must be correctly connected. Applies to the OptiX BWS 1600G. Step 3 Click New. Double-click Protection Priorities of Protection Channel. Fibers must be correctly created.2 Managing WDM Protection Subnets iManager U2000 Operation Guide for WDM End-to-End Management Prerequisite l l l l l You must be an NM user with "NE operator" authority or higher. and choose the proper number from the drop-down list. Ltd.. refer to 1:N Optical Channel Protection. Procedure Step 1 In the NE Explorer. OptiX BWS 320GV3. For other parameters. An OCP board and two or more OTU boards of same kind must be created. Set the optical interface number of each working channel in a similar way. 2-4 Huawei Proprietary and Confidential Copyright © Huawei Technologies Co.

OptiX BWS 1600G OLA. The created 1:N (N≤8) optical channel protection group is displayed. Prerequisite l l You must be an NM user with "network operator" authority or higher. Fibers must be created properly. Ltd. LBE. LWS. LWFS. The existing 1:N wavelength protection subnet is displayed in the Protection View. you can manage the 1:N wavelength protection as a protection subnet. LBES. Issue 02 (2009-10-23) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. LWC1. Applies to the OptiX BWS 1600G. Step 3 Click Search to search for the protection subnet. OptiX BWS 1600S and the OptiX BWS 320GV3. If you need to check the consistency of the parameters. The WDM trail must be created and the bidirectional client trail must be searched out.2 Searching for 1:N Wavelength Protection Subnet After creating 1:N wavelength protection groups and searching for WDM trails. LBF. Step 2 Click Next to perform the consistency check of the subnet. the protection group IDs of the WDM protection groups on the NEs must be consistent. l l l l Background Information For two NEs that are preconfigured as a 1:N WDM protection subnet.iManager U2000 Operation Guide for WDM End-to-End Management NOTE 2 Managing WDM Protection Subnets l l l OTUs that serve as the working and protection channels must be configured on the same NE. Step 7 Repeat Step 1 through Step 6 to configure a 1:N (N≤8) wavelength protection group of the opposite NE.. LWC. 2-5 . Applies to the LWF.3. In this way. Procedure Step 1 Choose Service > WDM Protection Subnet > WDM Protection Subnet Search from the Main Menu. Every board in this protection group and the OCP board must be set in the same shelf. LBFS boards. you need to search for the 1:N wavelength protection subnet. The 1:N wavelength protection group must be created. Step 6 Click OK. you need to set Parameter Consistency Check Flag to a proper value. ----End 2.

Step 2 Select a protection link. Procedure Step 1 Choose Service > WDM Protection Subnet > WDM Protection Subnet Management from the Main Menu.2 Managing WDM Protection Subnets iManager U2000 Operation Guide for WDM End-to-End Management Step 4 Optional: Click Next to query the information of the isolated nodes that are searched out. 2-6 Huawei Proprietary and Confidential Copyright © Huawei Technologies Co.. Ltd. The 1:N wavelength protection subnet must be searched out.3.&nbsp. Step 5 Click Finish. Context CAUTION Changing the protection mode may interrupt services. The Protection Subnet Attributes user interface is displayed. and choose Protection Subnet Attributes from the shortcut menu. ----End 2. Exercise caution when you perform this operation. Prerequisite l l l You must be an NM user with "network operator" authority or higher. OptiX BWS 1600S and the OptiX BWS 320GV3. Applies to the OptiX BWS 1600G.3 Setting 1:N Wavelength Protection Subnet Parameters You can set parameters for a 1:N wavelength protection subnet. Click the Protection Subnet Parameters tab. Issue 02 (2009-10-23) . right-click.

select the channel that services are switched to according to the OCP optical swtich number.3. Prerequisite l l You must be an NM user with "network operator" authority or higher. enable the protocol first. maintenance or lockout on a node. Context CAUTION Performing protection switching may interrupt services. NOTE l When performing the switching. indicating that the operation is successful. Then. The 1:N wavelength protection group must be searched out. Procedure Step 1 Choose Service > WDM Protection Subnet > WDM Protection Subnet Maintenance from the Main Menu. A prompt is displayed. select the channel that services are switched to according to the OCP optical swtich number. click East or West and select Forced Switching from the drop-down menu. Click OK. Step 5 Click Yes in the Protection Attributes dialog box. Step 2 The Protection Subnet Attributes window is displayed. Then. Step 3 Click Query to query whether the nodes are switched and whether the protocols are enabled in the 1:N wavelength protection subnet. ----End 2.4 Verifying the 1:N Wavelength Protection Switching After you search out the 1:N wavelength protection subnet and set the related parameters.iManager U2000 Operation Guide for WDM End-to-End Management 2 Managing WDM Protection Subnets Step 3 Set parameters for the protection subnet. Select the protection subnet and click the Protection Subnet Maintenance tab. 2-7 . you can verify whether the subnet works properly by performing the switching and querying the switching status. Issue 02 (2009-10-23) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. NOTE If the protocol on a node is disabled. l To perform a manual switching. Step 4 Perform the manual or forced switching on all nodes in the protection subnet one by one in the corresponding direction. you cannot select East and West at the same time. To perform a forced switching. Ltd.. Step 4 Click Apply. click East or West and select Manual Switching from the drop-down menu.

ODUk SPRing networks can be managed as protection subnets.4. the Service Mode of the port on the line board should be set to ODU1 or ODU2. indicating that the operation is successful.4. Currently.4 Configuring Protection for an ODUk SPRing By using the U2000. Click East or West.3 Setting Parameters of an ODUk SPRing Protection Subnet This section describes how to set parameters of an ODUk SPRing protection subnet. Step 8 Click Yes in the Protection Attributes dialog box. 2. Click OK. the external switching is performed to test whether the ODUk SPRing protection functions normally and provides protection. A prompt is displayed. realizing the protection for multiple services among all stations. perform data consistency check on the ODUk SPRing.4 Verifying the ODUk SPRing Protection Switching This topic describes how to perform the external switching for an ODUk SPRing protection on the U2000. realizing the protection for multiple services among all stations. During the deployment commissioning. 2-8 Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. create an ODUk protection group. 2. you need to search for ODUk SPRing protection subnets. The ODU1/ODU2-level protection can be achieved.. set the protection subnet parameters for the ODUk SPRing.1 Creating an ODUk SPRing Protection Group The ODUk SPRing protection is used in a ring network that is configured with distributed services. search for the ODUk SPRing. Issue 02 (2009-10-23) .4. After you create an ODUk SPRing protection group or search for WDM trails. and then select Clear from the drop-down menu to clear the switching on each node. and delete an ODUk SPRing. Ltd. protection channel. 2.4. Prerequisite You must be an NM user with "NE operator" authority or higher. you can configure the east working channel. span ID and management node of the ODUk ring network protection.2 Searching for an ODUk SPRing Protection Subnet The U2000 can search for and form ODUk SPRing protection subnets according to the created fiber cables and ODUk SPRing protection groups. ----End 2.4.2 Managing WDM Protection Subnets iManager U2000 Operation Guide for WDM End-to-End Management Step 6 Click Query to query whether the services on all nodes are already switched to the protection paths in the 1:N wavelength protection subnet. west working channel.1 Creating an ODUk SPRing Protection Group The ODUk SPRing protection is used in a ring network that is configured with distributed services. When configuring the ODUk SPRing protection of ODU1 or ODU2 levels. 2. It occupies two ODUk channels.5 ODUk Ring Network Protection In this user interface. It occupies two ODUk channels. In this way.4. Step 7 Select all nodes in the protection subnet one by one. 2. 2. you can query the protection subnet resources for an ODUk SPRing.

In the Select Mapping Direction area. and East Protection Unit.. and select Bound Span ID. Step 2 Click New. l Procedure Step 1 In the NE Explorer. In the case of those stations that do not add or drop services. click Close in the Operation Result dialog box. Span ID will be updated. East Working Unit. After successful operation. The working and protection channels in the east and west directions of an ODUk protection group can be on different NS2/ND2 boards. Issue 02 (2009-10-23) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. In Channel Mapping Relation. Step 5 Select one protection group. you can search out an ODUk protection subnet at the network layer. Ltd. Step 6 In the Bound Span ID window. you need not perform such an operation. Step 3 Set Protection Group ID and Level as required. The ODUk SPRing protection of the ODU1 and ODU2 levels is supported currently. select West Working Unit and East Working Unit. and then click OK. NOTE l l Before binding the span IDs. NOTE l l l The services in the east and west directions must be configured on different NS2/ND2 boards.iManager U2000 Operation Guide for WDM End-to-End Management 2 Managing WDM Protection Subnets Background Information l When the protection channel forms a ring. set the West Working Unit. Step 4 Click OK. select an NE and choose Configuration > ODUk SPRing from the Function Tree. The span IDs need be bound only on the stations that add or drop services. The New ODUk Ring Network Protection dialog box is displayed. 2-9 . West Protection Unit. To set a unit. You can create a protection group when the Selected Channel contains at least East Protection Unit and West Protection Unit. ensure that a bidirectional cross-connection is created successfully between the working unit in the protection group in the corresponding direction and the add/drop board. set Span ID. select one channel from the Available Channel and click . Right-click them.

Step 2 Click Next to check consistency of the protection subnet. and select YES. Click OK on the Confirm dialog box displayed. refer to 2. Right-click the Management Node. there must be only one management node.5 ODUk Ring Network Protection. The ODUk SPRing protection subnet that is searched out is displayed.2 Managing WDM Protection Subnets iManager U2000 Operation Guide for WDM End-to-End Management Step 7 Select one protection group. After you create an ODUk SPRing protection group or search for WDM trails. Issue 02 (2009-10-23) . Prerequisite l l l l l You must be an NM user with "network operator" authority or higher. The bidirectional server trail must be searched out. 2-10 Huawei Proprietary and Confidential Copyright © Huawei Technologies Co.. NOTE The hold-off time of the protection unit should be longer than that of the working unit. ODUk SPRing networks can be managed as protection subnets.4. NOTE In a ODUk SPRing protection group. Step 10 After the protection ring is created. Ltd. Step 11 Optional: Select one protection group and click Delete. Procedure Step 1 Choose Service > WDM Protection Subnet > WDM Protection Subnet Search from the Main Menu. to complete the creation of the protection ring.4. An ODUk protection group must be created. and click Start Protocol to make the protection group take effect. Step 8 Select one protection group. and you can set parameters such as WTR Time(s) and Enable SD. The protection group is deleted. For related parameters. Step 3 Click Search to search for the protection subnet.2 Searching for an ODUk SPRing Protection Subnet The U2000 can search for and form ODUk SPRing protection subnets according to the created fiber cables and ODUk SPRing protection groups. Management Node will be updated. start the NE Explorer. select one protection group. OptiX OSN 6800 and OptiX OSN 8800 I. you need to search for ODUk SPRing protection subnets. Context NOTE The search of an ODUk SPRing protection subnet supports only the scenario in which an ODU1 or ODU2 trail exists between the ports of adjacent protection groups. refer to Steps 1 through 8 to create the ODUk SPRing protection on the local NE. ----End 2. Then click Apply. double-click the Hold-Off Time(s) and set the hold-off time. Then. In this way. In Channel Mapping Relation. Applies to the OptiX OSN 3800. Step 9 In the case of the NEs in other stations on the ring. Fiber connections must be created. All internal and external fibers are correctly connected.

The Protection Subnet Attributes user interface is displayed. Step 7 Click Close to return to the Protection View. 2-11 . Exercise caution when you perform this operation. The ODUk SPRing protection subnet must be searched out. OptiX OSN 6800 and OptiX OSN 8800 I.4. SD Condition. and Management Node as required. Step 6 Click Apply. Applies to the OptiX OSN 3800.iManager U2000 Operation Guide for WDM End-to-End Management 2 Managing WDM Protection Subnets Step 4 Optional: Click Next to query the information of the isolated nodes that are searched out. Ltd. After the operation succeeds. ----End 2. Issue 02 (2009-10-23) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. Step 5 Click Finish. Prerequisite l l l You must be an NM user with "network operator" authority or higher. During the deployment commissioning. Step 5 Optional: Click Calculate Span ID.4. Step 2 Right-click a protection link and choose Protection Subnet Attributes from the shortcut menu. Click the Protection Subnet Parameters tab.3 Setting Parameters of an ODUk SPRing Protection Subnet This section describes how to set parameters of an ODUk SPRing protection subnet.. Procedure Step 1 Choose Service > WDM Protection Subnet > WDM Protection Subnet Management from the Main Menu. Step 3 Click Query to query the parameters of the protection subnet from the NE side. Context CAUTION Changing the protection mode may interrupt services.4 Verifying the ODUk SPRing Protection Switching This topic describes how to perform the external switching for an ODUk SPRing protection on the U2000. The calculated span ID is displayed in the Span ID field. the external switching is performed to test whether the ODUk SPRing protection functions normally and provides protection. Step 4 Set the WTR Time(s). ----End 2. click Close in the Operation Result dialog box.

click East or West and select Exercise-Ring from the drop-down menu. Click East or West. Select the protection subnet and click the Protection Subnet Maintenance tab. Step 8 Click Yes in the Protection Attributes dialog box. indicating that the operation is successful. Step 6 Click Query to query whether the services on all nodes are already switched to the protection paths in the ODUk SPRing protection subnet. Context CAUTION The protection switching may affect the services or the functions that are already configured. Step 5 Click Yes in the Protection Attributes dialog box. Step 3 Click Query to query the statuses of protocol controller. Click OK. enable the protocol first. Step 7 Select all nodes in the protection subnet one by one. The ODUk SPRing protection subnet must be searched out. click East or West and select Forced Switch to ProtectionRing from the drop-down menu. ----End 2-12 Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. Click OK. and west of the protection subnet from the NE. l l l To perform a manual switching. Step 2 The Protection Subnet Attributes window is displayed. indicating that the operation is successful. Ltd. and then select Clear All from the drop-down menu to clear the switching on each node. To perform a exercise switching. A prompt is displayed. click East or West and select Manual Switch to Protection-Ring from the drop-down menu. Procedure Step 1 Choose Service > WDM Protection Subnet > WDM Protection Subnet Maintenance from the Main Menu. NOTE If the protocol on a node is disabled. east. you cannot select East and West at the same time.. Issue 02 (2009-10-23) . To perform a forced switching. maintenance or lockout on a node. Step 4 Perform the manual. A prompt is displayed. forced or exercise switching on all nodes in the protection subnet one by one in the corresponding direction. NOTE When performing the switching.2 Managing WDM Protection Subnets iManager U2000 Operation Guide for WDM End-to-End Management Prerequisite l l You must be an NM user with "network operator" authority or higher.

Deletes working units of the ODUK ring network protection.4.. Locks out the switching. Manual Switching-Ring Issue 02 (2009-10-23) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. 2-13 . Creates an ODUK ring network protection. west working channel. This switching does not consider the status of the protection channel. unless the protection channel must satisfy higher priority bridge request. Applies the configuration of the ODUk protection group to the NE. Forcibly switches the service from the working channel to the protection channel.iManager U2000 Operation Guide for WDM End-to-End Management 2 Managing WDM Protection Subnets 2. Stops the automatic protection switching protocol. Deletes the protection group. If the protection channel is normal. you can configure the east working channel.5 ODUk Ring Network Protection In this user interface. Navigation Path In the NE Explorer. Buttons Button Start Protocol Stop Protocol Query New Add Working Unit Delete Working Unit Delete Apply Description Starts the automatic protection switching protocol. Ltd. If the protection channel has a failure or must satisfy higher priority switching. protection channel. Performs manual switching from the working channel to the protection channel. Deletes the span ID for the protection unit. Adds working units of the ODUK ring network protection. the switching takes place. Queries the ODUk protection group from the NE. Shortcut Menu Items Shortcut Menu Item Bound Span ID Unbound Span ID Lockout Forced Switching-Ring Description Sets the span ID for the protection unit. select an NE and choose Configuration > ODUk SPRing from the Function Tree. span ID and management node of the ODUk ring network protection. the switching does not take place.

The protocol is not started. you can test the multiplex section protection function of the ring network. Displays the level of the protection group.2 Managing WDM Protection Subnets iManager U2000 Operation Guide for WDM End-to-End Management Shortcut Menu Item Exercise Switching-Ring Description Simulates the switching operation. East Switching. Displays the switching status of the protection group. Ltd. ODU2 Unknown.. The protocol is to be started. By simulating the switching. without interrupting services. Idle. APS Byte Pass-Through Description Displays the ID of the protection group. Full Pass-Through. Issue 02 (2009-10-23) . 2-14 Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. Clear Parameters Field Protection Group ID Level Switching Status Value 1-65535 ODU1. It is not a real switching. West Switching. Clears all the switching.

Unknown Locked Protection SF SF Ring Switching Working SF Protection SF SF Ring Switching Working SD Protection SF SF Ring Switching Working SF Protection SD SF Ring Switching Working SF Protection OK Forced Switching . that is. l Near-End: Indicates the local node. Remote-End: Indicates the west adjacent node..iManager U2000 Operation Guide for WDM End-to-End Management 2 Managing WDM Protection Subnets Field West Switching Request/ East Switching Request Value l l l l Description Displays the status of east and west switching requests. that is. the respond end of the service.Ring Protection SD SD Ring Switching Working SD Protection SD SD Ring Switching Working SD Protection OK Manual Switching . Remote-End.Ring Switching Exercise Switching .Ring WTR . 2-15 . Ltd. Near-End Displays the west remote and local ends indication.Ring No Request l l l l l l l l l l l West Remote/Near-End Indication Unknown. l Issue 02 (2009-10-23) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. the transmit end of the service.

Unknown Working Unit: 0. West Protection Unit. SD. East Protection Unit For example: 12-NS2-1(IN/ OUT)-ODU1:1 Displays whether it is the management node.0-10 Protection Unit: 0. Management Node Protection Unit Yes.. Near-End Description Displays the east remote and local ends indication. that is. the respond end of the service. Displays the east working channel. Ltd. Displays the hold-off time.2 Managing WDM Protection Subnets iManager U2000 Operation Guide for WDM End-to-End Management Field East Remote/Near-End Indication Value Unknown.5-10 Default value: Working Unit: 0. Issue 02 (2009-10-23) . east protection unit and west protection unit. Unmonitored. Displays the span ID. Click WTR Time (ODUk SPRing Protection) for more information. l WTR Time(s) 300-720 Default value: 300 Indicates the time interval between the time when the working service is detected to be normal after switching and the time when the service is switched back to the working path. Remote-End. Click Enable SD (ODUk SPRing Protection) for more information. East Working Unit. Displays the channel status. Disabled Displays whether the SD enable flag is enabled. that is. Remote-End: Indicates the west adjacent node.5 2-16 Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. Protection Unit: 0. No West Working Unit. east protection channel and west protection channel. the transmit end of the service. west working unit. Channel Mapping Span ID Channel Status Hold-Off Time(s) 1-31 Normal. l Near-End: Indicates the local node. Displays the east working unit. west working channel. Enable SD Enabled. SF.

Ltd.1 Finding Protection Subnets When there are a number of protection subnets in a network.3 Performing the Protection Switching for a 1:N Wavelength Protection Subnet You can run an external switching command to perform or clear the switching for a 1:N wavelength protection subnet. In the fault maintenance. you can perform this operation for fault location. you can maintain protection subnets. 2. you can perform this operation to locate faults. The protection subnet must be created.5.4 Performing ODUk Ring Protection Switching On the U2000. and lockout.. 2-17 . The Search Protection Subnet dialog box is displayed. you can perform switching to test whether the 1:N wavelength protection switching works properly. During the fault maintenance. you use the search function to quickly find the desired protection subnet.5. so that you can plan and manage the subnet in a better way. you can perform external switching to test whether ODUk ring switching works properly. manual switching. Prerequisite l l You must be an NM user with "network monitor" authority or higher. Procedure Step 1 Right-click in the Main Topology and choose Search WDM Protection Subnet.5 Maintaining Protection Subnets On the U2000.5. you can perform or clear external switching for an ODUk ring network. During the deployment and commissioning.5.1 Finding Protection Subnets When there are a number of protection subnets in a network. you can query the usage of subnet resources.5. you use the search function to quickly find the desired protection subnet. 2.iManager U2000 Operation Guide for WDM End-to-End Management 2 Managing WDM Protection Subnets 2. 2. In the deployment and commissioning. 2. 2. Issue 02 (2009-10-23) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co.2 Querying Protection Subnet Resources After you search out a protection subnet. External switching commands include: forced switching.

5. Applies to the LWF. LBF and LBFS boards. The Protection Subnet Attributes window is displayed. Applies to the OptiX BWS 1600G. you can perform switching to test whether the 1:N wavelength protection switching works properly. Step 3 Click Search and the protection subnet that is searched out is highlighted in the Network View. Step 2 Set the search condition and enter the keyword. Step 3 Click Query to query the usage of the protection subnet resources. LWFS. LBE and LBES boards. you can query the usage of subnet resources. manual switching.. 2-18 Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. The protection subnet must be searched out. Step 2 Right-click a protection link. Applies to the LWF. OptiX BWS 1600S and OptiX BWS 320GV3. you can perform this operation to locate faults. LBES. Issue 02 (2009-10-23) . Ltd. External switching commands include: forced switching. ----End 2. The 1:N wavelength protection group must be searched out.3 Performing the Protection Switching for a 1:N Wavelength Protection Subnet You can run an external switching command to perform or clear the switching for a 1:N wavelength protection subnet. Click the Resource Description tab. Procedure Step 1 Choose Service > WDM Protection Subnet > WDM Protection Subnet Management from the Main Menu. Prerequisite l l l l l l You must be an NM user with "network operator" authority or higher. LWC1. LBE. LWC1.2 Managing WDM Protection Subnets NOTE iManager U2000 Operation Guide for WDM End-to-End Management You need to select the Protection check box on the upper right corner of the Main Topology in advance. Prerequisite l l You must be an NM user with "network operator" authority or higher. In the deployment and commissioning. so that you can plan and manage the subnet in a better way. LWFS. In the fault maintenance.5.2 Querying Protection Subnet Resources After you search out a protection subnet. ----End 2. Applies to the OptiX BWS 1600A and OptiX BWS 1600G (NA). and lockout. and choose Protection Subnet Attributes from the shortcut menu.

you cannot select east and west direction at the same time. Click OK. select Start the Protocol Networkwide or Stop the Protocol Networkwide from the drop-down menu. Step 8 Click Yes in the Protection Attributes dialog box. Select the protection subnet and click the Protection Subnet Maintenance tab.iManager U2000 Operation Guide for WDM End-to-End Management 2 Managing WDM Protection Subnets Context CAUTION Force switching and manual switching may interrupt services. Procedure Step 1 Choose Service > WDM Protection Subnet > WDM Protection Subnet Maintenance from the Main Menu. click East or West. maintenance or lockout on a node.5. A prompt is displayed. click Lock East or Lock West.4 Performing ODUk Ring Protection Switching On the U2000. and select Lockout of Protection. you can perform or clear external switching for an ODUk ring network.. Click OK. Step 4 To enable or disable the protocol. you can perform external switching to test whether ODUk Issue 02 (2009-10-23) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. 2-19 . NOTE When performing the switching. click East or West and select Forced Switching from the drop-down menu. indicating that the operation is successful. Ltd. select a node. NOTE If you want to enable or disable the protocol for the entire protection subnet. To perform a forced switching. A prompt is displayed. click Start Protocol and select Start or Stop from the dropdown menu. ----End 2. A prompt is displayed. Step 7 Optional: Perform the lockout operation. Step 2 The Protection Subnet Attributes window is displayed. l l To perform a manual switching. During the deployment and commissioning. Click OK. Step 9 Optional: To clear protection switching. and then select Clear from the drop-down menu. Step 10 Optional: Click Yes in the Protection Attributes dialog box. indicating that the operation is successful. Step 6 Click Yes in the Protection Attributes dialog box. click East or West and select Manual Switching from the drop-down menu. Step 3 Click Query to query whether the nodes are switched and whether the protocols are enabled in the 1:N wavelength protection subnet. indicating that the operation is successful. Step 5 Perform the manual or forced switching on all nodes in the protection subnet one by one in the corresponding direction. Select a desired node.

Step 8 Click Yes in the Protection Attributes dialog box. Prerequisite l l You must be an NM user with "network operator" authority or higher. click Lock East or Lock West. select Start the Protocol Networkwide or Stop the Protocol Networkwide from the drop-down menu. maintenance or lockout on a node. A prompt is displayed. Step 3 Click Query to query the statuses of protocol controller. During the fault maintenance. and select Lockout of Protection-Ring. A prompt is displayed. l l l To perform a manual switching. Select the protection subnet and click the Protection Subnet Maintenance tab. To perform a exercise switching. click Start Protocol and select Start or Stop from the dropdown menu. you can perform this operation for fault location. Step 4 To enable or disable the protocol.2 Managing WDM Protection Subnets iManager U2000 Operation Guide for WDM End-to-End Management ring switching works properly.. Context CAUTION The protection switching may affect the services or the functions that are already configured. Step 7 Optional: Perform the lockout operation. Step 2 The Protection Subnet Attributes window is displayed. forced or exercise switching on all nodes in the protection subnet one by one in the corresponding direction. Step 6 Click Yes in the Protection Attributes dialog box. indicating that the operation is successful. you cannot select East and West at the same time. Select a desired node. Click OK. click East or West and select Exercise-Ring from the drop-down menu. and west of the protection subnet from the NE. Procedure Step 1 Choose Service > WDM Protection Subnet > WDM Protection Subnet Maintenance from the Main Menu. east. indicating that the operation is successful. click East or West and select Manual Switch to Protection-Ring from the drop-down menu. To perform a forced switching. NOTE If you want to enable or disable the protocol for the entire protection subnet. Step 5 Perform the manual. NOTE When performing the switching. The ODUk ring protection subnet must be searched out. Ltd. Issue 02 (2009-10-23) . click East or West and select Forced Switch to ProtectionRing from the drop-down menu. 2-20 Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. Click OK.

and then select Clear All from the drop-down menu. Step 10 Optional: Click Yes in the Protection Attributes dialog box. right-click and choose Delete. Context CAUTION Deleting isolated nodes may interrupt services. click East or West. Step 3 Click Yes in the confirmation dialog box. Prerequisite You must be an NM user with "network maintainer" authority or higher. One or more isolated nodes must exist.6 Deleting Isolated Nodes To release protection resources that are used by isolated nodes. you need to delete isolated nodes. exercise caution before this operation. indicating that the operation is successful. Issue 02 (2009-10-23) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. Hence. ----End 2. Context NOTE The deletion of a protection subnet will leave the equipment or services unprotected. Procedure Step 1 Choose Service > WDM Protection Subnet > WDM Isolated Node Management from the Main Menu. Exercise caution when you perform this operation. ----End 2. Step 2 Select the isolated node you want to delete. you can delete the protection subnet. Applies to the isolated node which node type is ODUk SPRing. select a node..iManager U2000 Operation Guide for WDM End-to-End Management 2 Managing WDM Protection Subnets Step 9 Optional: To clear protection switching. Click OK. A prompt is displayed.7 Deleting Protection Subnets When an existing protection subnet is not suitable. Ltd. 2-21 . Prerequisite l l l You must be an NM user with "network operator" authority or higher.

and so on. l l Step 3 In the Operation Prompt dialog box.2 Managing WDM Protection Subnets iManager U2000 Operation Guide for WDM End-to-End Management Procedure Step 1 Choose Service > WDM Protection Subnet > WDM Protection Subnet Management from the Main Menu. The deleted protection subnet cannot be restored without being created again. NOTE If Delete from the NE is selected. NOTE The methods to delete a protection subnet are as follows: l Delete from the NM: Deletes the relation between the protection subnet and logical systems at the NE side. Step 4 After completion. Step 2 Right-click the protection subnet to be deleted and choose Delete from the NM or Delete from the NE or Delete All from the NM from the short-cut menu. The deleted protection subnet can be located by using the search feature. This command is not delivered to the NE and does not affect the services. Ltd. you need to confirm the operation once more. It is recommended that you do not select this option. The deleted protection subnet can be located by using the search feature. ----End 2-22 Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. logical systems at the NE side.. as a large amount of data can be deleted. click Yes. Delete All from the NM: Deletes data other than fibers in the network layer. Issue 02 (2009-10-23) . and all traffic in the protection subnet. The U2000 locates it according to the NE layer protection information. click Close in the dialog box displayed to complete the operation. to allow deleting of fibers. re-uploading. Delete from the NE: Deletes the protection subnet.

Ltd. Issue 02 (2009-10-23) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. 3.iManager U2000 Operation Guide for WDM End-to-End Management 3 End-to-End WDM Management 3 Prerequisite End-to-End WDM Management About This Chapter You can configure WDM services using the trail management function.1 Managing WDM Trails This section describes how to manage end-to-end WDM services based on the trail management function of the U2000.4 Managing the Performance of WDM Trails You can use the network layer function of the U2000 to perform end-to-end performance management on WDM trails. The trail management license must be provided for the U2000.2 Configuring EAPE The U2000 supports configuring the enhanced automatic power equalization (EAPE) for a trail.. 3. By adjusting the optical power of a WDM trail. 3-1 . the EAPE can reduce or even eliminate bit errors of services on the trail. 3.3 Managing Alarms on WDM Trails You can use the U2000 function of end-to-end trail management to manage the alarms generated on WDM trails at the network layer. 3.

1. 3.1. You need to delete the trails if the network will be adjusted or rebuilt. 3. This greatly simplifies the operations. the administrator and maintainer must find out the status of the trails to ensure that all the services are transmitted correctly.6 Collecting Resource Statistics You can collect statistics on resources to learn the existing inventory of a network.1.1. 3.1.2 Conflict Trail 3-2 Huawei Proprietary and Confidential Copyright © Huawei Technologies Co.5 Maintaining WDM Trails The end-to-end trails are carriers of services of the customers. 3. U2000 supports manually modifying the source and sink of an exisiting WDM trail and the trail names in batches.1.4 Viewing WDM Trails This section describes how to view the connection relation of all boards on a WDM NE. Ltd.2 Creating WDM Trails by Trail Search After a new network is set up or services are configured on a per-NE basis.1. you need to perform an WDM trail search so that you can manage configured services by using the trail management function. 3.1.1 WDM Trail The concept. 3.7 Modifying WDM Trails Due to service requirements. instead of creating WDM trails. type and relevant information about trails are described here. ODUk or client trails by specifying the sources and sinks of the trails.1.1.1. you can create OCh. 3. 3.1.1. sometimes.8 Deleting a WDM Trail The operation deletes the WDM trails from the network layer or from the NE layer.10 Sample Application: Configuring an OCh Trail This section describes how to configure an OCh trail in the end-to-end mode.. 3. 3.1 Basic Concepts This section describes the basic concepts of the WDM end-to-end management. 3. Resource statistics is a key basis of network maintenance and expansion.1.3 Configuring WDM Trails After searching out the relevant trail information on the U2000. 3.3 End-to-End WDM Management iManager U2000 Operation Guide for WDM End-to-End Management 3.9 Sample Application: Configuring GE Services with the WXCP Protection in End-to-End Mode This sample describes how to configure GE Services with the WXCP protection in the end-toend mode. In the routine maintenance. you need to modify the configuration of a WDM trail. 3.1 Managing WDM Trails This section describes how to manage end-to-end WDM services based on the trail management function of the U2000.1.1 Basic Concepts This section describes the basic concepts of the WDM end-to-end management. Issue 02 (2009-10-23) .

4 Process for Creating a Trail The trail creation process describes a series of procedures before a trail is generated on the U2000.1 WDM Trail The concept. The OTS trail cannot be deleted from the U2000. and the OSC trail is related to supervisory signals. 3-3 . The rate level varies with the value of "k" in ODUk/OTUk. this trail is a conflict trail. join.1. Table 3-1 ODUk rate level Trail Level ODU0 ODU1/OTU1 ODU5G/OTU5G ODU2/OTU2 ODU3/OTU3 Rate (bit/s) 1.3 Trail Creation Method The U2000 provides multiple methods for creating trails to meet different operation habits of users and requirements of different service scenarios.25G 2. For details. but the cross-connection that forms the trail does not exist at the NE layer. view. search. the U2000 provides the signal flow diagram that visually displays the signal flow and the transmission media layer route of trails.1. Currently the U2000 provides the following OTN trail modules that comply with ITU-T G.5G 5G 10G 40G Issue 02 (2009-10-23) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. 3. Ltd. You must delete the fiber connection before deleting the OTS trail. In addition. and delete WDM trails. The U2000 enables you to create. type and relevant information about trails are described here.1.1. ODU5G/OTU5G is a level customized by Huawei. 3.1.. see Table 3-1. This facilitates operations and improves the maintenance efficiency. The detailed process varies with the creation method.1.iManager U2000 Operation Guide for WDM End-to-End Management 3 End-to-End WDM Management If a trail exists on the U2000.872: l l l l l l l Client trail ODUk trail: optical channel data unit (ODUk) trail OTUk trail: optical channel transport (OTUk) unit trail OCh trail: optical channel trail OMS trail: optical multiplexing section trail OTS trail: optical transmission section trail OSC trail: optical supervisory channel (OSC) trail NOTE l l l The first six types are related to services. split. 3.

3-4 Huawei Proprietary and Confidential Copyright © Huawei Technologies Co.. a tributary board or a line board. Figure 3-1 Trail Client ODUk OTUk OCh OMS OTS OTS OTS Figure 3-2 OSC Trail OSC Trail OSC Trail TM RM TM RM OSC OSC OSC OTM FIU FIU OLA FIU FIU OTM ODUk Trail Different from other trails. an ODUk/OTUk sets the source and sink at the internal ports of an OTU board.3 End-to-End WDM Management iManager U2000 Operation Guide for WDM End-to-End Management Trail Module Figure 3-1 and Figure 3-2 illustrate the relationship and location of the trails. Figure 3-3 displays a typical ODUk trail module whose source and sink are set on the internal ports of tributary ports or of line boards. Issue 02 (2009-10-23) . Ltd.

.) trail 52TOM GE RX1 ODU0 LP1 O D U 1 52NS2 ODU1 52NS2 ODU1 52TOM LP1 O D U 1 ODU0 GE TX1 O D U 2 O T U 2 OUT IN O T U 2 O D U 2 OCh Trail OTU2 Trail ODU2 Trail ODU1 Trail ODU0 Trail Client Trail Electrical Signal Optical Signal Issue 02 (2009-10-23) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co.. Ltd.iManager U2000 Operation Guide for WDM End-to-End Management 3 End-to-End WDM Management Figure 3-3 ODUk (k = 1.... Figure 3-4 ODUk (k = 0. 1. 2. 3-5 . . 2.25 Gbit/s..) trail TQS STM-16 RX1 LP1 O D U 1 NS2 ODU1 O D U 2 O T U 2 NS2 ODU1 TQS LP1 O D U 1 STM-16 TX1 OUT IN O T U 2 O D U 2 OCh Trail OTU2 Trail ODU2 Trail ODU1 Trail Client Trail Electrical Signal Optical Signal In the case of the client-side service whose rate is less than 1. as shown in Figure 3-4. an ODU0 trail is added.

Hence. That is. 40G inverse multiplexing trail model The transmission rate of a single wavelength is 40G. This is equal to four 10G signals on the line side and lowers the optical layer index requirement. Figure 3-5 40G inverse multiplexing trail 10G inverse multiplexing trail model The TDX board is a 10G inverse multiplexing tributary board that has two individual transmission paths. Ltd. The 10G service uses any or all of the four ODU1 signals according to bandwidth status. Issue 02 (2009-10-23) . you can only search for an inverse multiplexing trail. two or three ODU2 trails. a 40G signal is converted to four 10G ODU2 signals. Each path inversely multiplexes a 10G service to multiple ODU1 signals.. services are unavailable and you fail to search for the client trail. You cannot dynamically adjust the bandwidth of STM-256 or OC768 services whose rate is 40G. which are cross-connected to a line board for transmission. An inverse multiplexing client trail can take an ODU1 or ODU2 trail as the server trail. If you configure only one. each of which uses one wavelength. you can search for a client trail only after you configure four ODU2 trails. In a 40G inverse multiplexing transmission scheme.3 End-to-End WDM Management iManager U2000 Operation Guide for WDM End-to-End Management Inverse Multiplexing Trail The rate of the client layer of an inverse multiplexing trail is greater than the rate of the server layer. an inverse multiplexing client trail cannot take ODU1 and ODU2 trails as the server trails at the same time. an inverse multiplexing client trail needs multiple trails to serve as its server layer. but you cannot create an endto-end inverse multiplexing trail. Figure 3-5 shows the inverse multiplexing trail model of the TSXL board. but a single wavelength cannot used for long-distance transmission due to an optical layer index (such as dispersion) restriction. When the 10G service does not use all of 3-6 Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. Currently. Hence.

three or four ODU1 trails.. two. Figure 3-6 10G inverse multiplexing trail 3. Issue 02 (2009-10-23) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co.iManager U2000 Operation Guide for WDM End-to-End Management 3 End-to-End WDM Management the four ODU1 signals. and create a service on NE C. See Figure 3-7. Cause A trail consists of a single station cross-connection at the NE layer.1. Assume that a trail is NE A-> NE B. 3-7 . A 10G service is an Ethernet service for which you can dynamically adjust bandwidth. If the configuration data at the NE layer changes and a complete trail cannot be formed at the network layer. the trail is extended as NE A->NE C. This saves line resources.1. the trail that exists on the U2000 is a conflict trail. As a result. the client trail that you search out is of different rate levels. Ltd. The trail NE A-> NE B that exists on the U2000 becomes a conflict trail. and the corresponding cross-connection at the NE layer becomes a discrete service. The server layer allows one.2 Conflict Trail If a trail exists on the U2000. this trail is a conflict trail. Figure 3-6 shows the inverse multiplexing trail model of the IP3 port on the TDX board. Hence. but the cross-connection that forms the trail does not exist at the NE layer. Create a fiber from NE B to NE C. l Adding a fiber leads to trail extension. the 10G service share an ODU2 trail with other ODU1 signals.

the U2000 stops the searching and asks you to confirm the conflict trail. The original trail is NE A-> NE C. 3-8 Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. If you fail to verify that the conflict trail is correct. There are the following two handling methods: l Stop searching. The cross-connection of the trail on NE B is deleted. Figure 3-8 A conflict trail generated because a single station cross-connection is lost NE A NE B NE C l Delete a protection service on a per-NE basis.3 End-to-End WDM Management iManager U2000 Operation Guide for WDM End-to-End Management Figure 3-7 A conflict trail generated because a fiber is added NE A NE B NE C l The single station cross-connection is lost. Issue 02 (2009-10-23) . See Figure 3-9. See Figure 3-8. The conflict trail remains. but the U2000 does not generate a new trail. Ltd. the original trail of NE 1-> NE 2 becomes a conflict trail. Figure 3-9 A conflict trail generated because a protection service is deleted on a per-NE basis Cross-Connection A Working Trail Cross-Connection C Cross-Connection B NE1 Protection Trail Cross-Connection D NE2 Handling Method During trail search.. you can choose to stop searching. the original trail of NE A-> NE C becomes a conflict trail and services on NE A and NE C become discrete services. If cross-connection D of NE 2 is deleted. On the U2000. NE 1 and NE 2 comprises a 1+1 linear protection and the original trail is NE 1-> NE 2. if the U2000 searches out a conflict trail.

Ltd.1. the following prerequisites must be met: l l l All the NEs that the trail passes through must have enough idle resources.. Creating trails by trail search On a per-NE basis. its customized information.iManager U2000 Operation Guide for WDM End-to-End Management l 3 End-to-End WDM Management Continue to search. Table 3-2 shows the methods. NOTE After the conflict trail is deleted. The data on the U2000 must be consistent with the data on the NE. and does not affect services on the NE. This method requires better technical knowledge of users. the prohibited node to select a route. This operation does not delete the cross-connection on a per-NE basis. This method is applicable to the creation of a majority of normal trails. l l Issue 02 (2009-10-23) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co.1. 3-9 .3 Trail Creation Method The U2000 provides multiple methods for creating trails to meet different operation habits of users and requirements of different service scenarios. Table 3-2 Comparison of methods for creating trails Trail Creation Method Feature Application Scenario This method is applicable to the scenario that the service is already configured on a perNE basis. the U2000 deliver the crossconnections related to the trail to all NEs involved. features. The fibers on the U2000 are correctly connected. configure all nodes that a service passes through. The system deletes the conflict trail from the network layer. During the search. 3. and application scenarios of the trail creation. users may need to handle conflict trails and discrete services. and remarks. Creating trails in the automatic mode l The service is configured directly at the network layer. by using the network-layer trail search function. including the trail name. user. The route can be computed automatically. Then. If multiple routes exist between the selected source and sink. After the activation of the trail. To successfully create a trail on the U2000. you can set the compulsory link. combine crossconnections of each node to form end-to-end trails. is permanently lost and cannot be restored.

Figure 3-11 shows the process for creating trails in the automatic mode. The detailed process varies with the creation method.4 Process for Creating a Trail The trail creation process describes a series of procedures before a trail is generated on the U2000.1.3 End-to-End WDM Management iManager U2000 Operation Guide for WDM End-to-End Management 3. Issue 02 (2009-10-23) .. Ltd. Figure 3-10 shows the process for creating trails by trail search. Figure 3-10 Creating trails by trail search Start Obtain all cross-connections of NEs networkwide Sort cross-connections by level Search out trails at the server layer and then the client layer Check whether new trails conflict with original trails Y The searched is paused and conflicting trails are displayed N Delete conflicting trails Y Whether to resume the search N Stop the trail search The network management system starts to manage new trails Check whether discrete services that do not form trails exist Y N The information about discrete services is displayed End 3-10 Huawei Proprietary and Confidential Copyright © Huawei Technologies Co.1.

you need Issue 02 (2009-10-23) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. level.1. you need to perform an WDM trail search so that you can manage configured services by using the trail management function.2.1. such as the direction. Ltd.iManager U2000 Operation Guide for WDM End-to-End Management 3 End-to-End WDM Management Figure 3-11 Creating trails in the automatic mode Start Check whether the server trail for the trail to be created exists Y Set trail attributes.. 3-11 . To manage WDM trails. 3. link.2 Creating WDM Trails by Trail Search After a new network is set up or services are configured on a per-NE basis. and rate N Create or search out the server trail Set the source and sink NEs for the trail Set route restriction conditions related to the node. and timeslot (optional) Whether to set the trail as an SNCP trail N Set basic attributes for the trail Y Set the SNCP protection route Activate the trail End 3.1 Searching for WDM Trails After you create fibers and configure services for WDM equipment on the U2000. the trail information does not exist in the network layer of the U2000.

Fiber connections must be created correctly for the WDM equipment.1. The U2000 supports the ability to restore the user-defined information. only the OTS trail can be managed directly without being searched. U2000 trail search restrictions. the trail information does not exist in the network layer of the U2000. 3. you can restore the user-defined information.2 Discrete Service Causes and Handling Measures After trail search.1.2. 3-12 Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. which are unsatisfied trail search conditions. l l l l l Procedure Step 1 Choose Service > WDM Trail > WDM Trail Search from the Main Menu. Ltd. you need to search for the data of cross-connections and fiber connections over the network to generate end-to-end WDM trails at the network layer of the U2000. the user-defined information of the trail is saved in the system. The U2000 supports the ability to search for a WDM trail that has multiple sources and sinks. To manage WDM trails.. You can only search for an inverse multilplexing client trail. When the you delete a trail from the network layer of the U2000. Issue 02 (2009-10-23) . incomplete or wrong configuration of cross-connections. Context l Among the five types of trails. because the data is stored at the network layer when fibers are created. The U2000 supports the ability to search for an unterminated trail. set the search policies.3 End-to-End WDM Management iManager U2000 Operation Guide for WDM End-to-End Management to search for the data of cross-connections and fiber connections over the network to generate end-to-end WDM trails at the network layer of the U2000.2. Hence. The networking in which no fiber connection exists between cross-connections of the same level is not supported. discrete services are usually caused by the following factors. when you search for a trail that has the same source or sink and direction as the deleted trail.1 Searching for WDM Trails After you create fibers and configure services for WDM equipment on the U2000. Step 2 Under Advanced settings. 3. Prerequisite l l You must be an NM user with "network operator" authority or higher.

click Finish. Issue 02 (2009-10-23) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. Step 5 Click Next to view all discrete services in the network. That is.2. the U2000 shows the conflicting trails after you perform the search operation. Step 4 Optional: Click Next to view the conflicting trail information . the U2000 deletes trails that do not have the management flag from the network layer. The trail may cause interruption of service flow.iManager U2000 Operation Guide for WDM End-to-End Management 3 End-to-End WDM Management NOTE In the mode of searching by subnet. The principles of verifying a conflict trail are as follows: The networking changes. incomplete or wrong configuration of cross-connections. Step 3 Click Next to begin to search for trails. For example. The U2000 takes some time to return the results. 3-13 . NOTE If Step 4 is executed. ----End 3. including deleting a crossconnection or fiber.2 Discrete Service Causes and Handling Measures After trail search. NOTE l l If there are cross-connections that are collisions and these cross-connections cannot form end to end trails.1. the selected subnet range should be independent from the networking aspect. depending on the number of services. Ltd. which are unsatisfied trail search conditions. This does not affect services of the actual NE or the data of an individual NE on the U2000. If you want to set a trail management flag. Step 6 After the search is complete. discrete services are usually caused by the following factors. the key information of the trail. U2000 trail search restrictions.. NOTE Skip this step if the Automatically create trails after searching policy is selected in Step 2. check the Management Flag check box or right-click it and select the management flag. is verified. no fiber connection exists between the selected subnet range and the area that beyond the selected subnet range.

Unsatisfied trail search conditions l l l l The data on the U2000 is inconsistent with those on NEs.1. Protection subnets are not created or cannot be searched. handle it as soon as possible so that it does not affect subsequent service configuration. If not. the NE logic system of the service does not belong to any protection subnet. Issue 02 (2009-10-23) . The WDM trail creation feature simplifies the service configuration procedure and ensures proper operation.Before creating an EAPE pair. In addition. Incomplete or wrong configuration of cross-connections l l l l Handling Discrete Services 1.3 Configuring WDM Trails After searching out the relevant trail information on the U2000. How to Avoid Discrete Services Use the trail management function to configure services whenever possible. After you specify the source and sink of a service. The SNCP service configuration is wrong.1. for example. If discrete services are found. 3. The service configuration is incomplete. upload the configuration data to the U2000. analyze and handle them according to the causes displayed on the U2000 and the handling measures that are given above. The NE data configuration is incorrect. Perform a consistency check to check whether the data on the U2000 and the data on the NEs are consistent or not. The EAPE function uses OCh trails to identify EAPE pairs. The fibers created on the U2000 do not match actual fiber connections. It is recommended that you handle the discrete services at add/drop tributaries first. In the case of the 3-14 Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. which results in an incomplete protection route. 2. This is because services configured in this way do not form discrete services. The timeslot configured for the protection route is wrong. you can groom and deploy services in a flexible manner in application scenarios (deployment or expansion). 4. 2. The timeslot for the protection route is not configured. You should complete this service configuration and search for the trails again. and that there are no errors like wrong fiber connection on the U2000. 3.3 End-to-End WDM Management iManager U2000 Operation Guide for WDM End-to-End Management Causes of Discrete Services 1. When a discrete service is found. Check whether incomplete services are configured in the station-by-station mode.. then handle the those SDH NNI discrete services. Ltd. you can create OCh.1 Creating an OCh Trail The U2000 supports creating OCh trails in an end-to-end mode. and finally the pass-through discrete services. the U2000 can generate an OCh trail based on the searched server trail. 3. or the protection subnet configuration is wrong.3. a non-protection chain service is created on the protection ring. For example. pass-through services may not be configured on pass-through NEs. Verify that the fiber connections created on the U2000 are consistent with the actual fiber connections. Perform a trail search on the U2000. ODUk or client trails by specifying the sources and sinks of the trails. you should create OCh trails.

11WSMD2. you can groom and deploy services in a flexible manner in application scenarios such as deployment or expansion. ROAM. Background Information The U2000 does not support the ability to reuse discrete cross-connections. you can create OCh trails manually by using the trail management function of the U2000. WSD9. the U2000 generates a client trail based on the searched or created server trail. 3.iManager U2000 Operation Guide for WDM End-to-End Management 3 End-to-End WDM Management equipment with the dynamic optical cross-connection boards. 11RDU9. 3-15 . WSM5. the OptiX OSN 6800. In addition. In the case of the equipment with the dynamic optical cross-connection boards. The WDM trail creation feature simplifies the service configuration procedure and ensures proper operation. The source and sink of an OCh trail are the ports at the line side of the OTU boards. In addition.3. 12WSD9. The typical scenario of non-protected OCh networking is as follows: Typical OCh networking scenarios are as follows: l Issue 02 (2009-10-23) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. After you specify the source and the sink of a service. WSMD4. the U2000 automatically searches for the server trail and creates the ODUk trail.. 13WSD9. 12WSM9. The WDM trail creation feature simplifies the service configuration procedure and ensures proper operation. you can create OCh trails manually by using the trail management function of the U2000.1. 3. WSD9. For the OptiX Metro 6100V1E: WSM9.1.3.2 Creating an ODUk Trail The U2000 supports creating ODUk trails in an end-to-end mode. The boards that support the dynamic optical cross-connection are classified by equipment domain as follows: l l l For the OptiX BWS 1600G: WSM9. RMU9. In addition.3. The EAPE function uses OCh trails to identify EAPE pairs. you can groom and deploy services in a flexible manner in application scenarios such as deployment or expansion. Ltd. The boards that the trail passes should support dynamic optical cross-connection or should contain static optical cross-connection.1 Creating an OCh Trail The U2000 supports creating OCh trails in an end-to-end mode. and the OptiX OSN 8800 I: WSM9. After you specify the source and sink of a service. WSD9. The OMS server trail must be searched out. and WSMD4. you should create OCh trails. Prerequisite l l You must be an NM user with "network operator" authority or higher. you can groom and deploy services in a flexible manner in application scenarios (deployment or expansion).1. WSD5 and RMU9. 3. 13WSM9. The WDM trail creation feature simplifies the service configuration procedure and ensures proper operation. RDU6. WSM6.Before creating an EAPE pair. After you specify the source and sink of a service.3 Creating Client Trails The U2000 supports creating client trails in an end-to-end mode. the U2000 can generate an OCh trail based on the searched server trail. For the OptiX OSN 3800. RMU9.

Set the level to OCh and set the direction according to the specific networking. Step 2 Set the level and direction of the service. Issue 02 (2009-10-23) . the wavelength information of the board port is displayed. By default. You can click the trail again. Select the NE. the U2000 uses the board and port that have the same band and wavelength with priority. if you already select one end (source or sink) of a trail and open the NE Panel to select another end.3 End-to-End WDM Management ONE2 ONE1 OCh D40 OT U O T U iManager U2000 Operation Guide for WDM End-to-End Management O T U OCh M40 WSM FIU ONE3 FIU FIU WSD FIU OT U OSC OSC OSC OCh fiber oxc l The typical scenario of protected OCh networking is as follows: ONE1 OSC ONE2 OSC OSC ONE4 F I U O T U O L P F I U WSD WSM F I U F I U ONE3 F I U F I U WSD WSM F I U F I U O L P O T U OSC OSC OSC OCh fiber oxc NOTE The source and sink of an OCh trail cannot be modified. Step 3 Click Browse and the Select Board Port-Source/Sink dialog box is displayed.. Step 4 Optional: Click a server tail between the source and sink NEs. board. TIP l l During the selection of source or sink in the NE Panel. 3-16 Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. Ltd. and cancel the selected server trail in the dialog box displayed. and select the included server trail in the dialog box displayed. and port. Procedure Step 1 Choose Service > WDM Trail > Create WDM Trail from the Main Menu. when you move the cursor to a board.

Step 9 Optional: Click Port Attribute. Ltd. indicating that the operation was successful. Context The configuration principles are as follows: l The source and sink of an ODUk (k = 0. or TQS boards. Choose Service > WDM Trail > WDM Trail Management from the Main Menu and select the proper filter criteria for the trails. A prompt is displayed.iManager U2000 Operation Guide for WDM End-to-End Management 3 End-to-End WDM Management Step 5 Optional: Double-click the other NE in the protection subnet to specify the NE that the route cannot pass through. 1. Step 10 Click Apply. including the name and ID. ODU3 or OTU2 server trail must be searched out. 3. set the basic trail attributes. The sign is displayed on the NE. do not support the grooming of ODU0 services in the asynchronous mode. Select a path and click OK. In the WDM Trail Management user interface. Step 7 Click the General Attributes. The line boards that support the grooming of ODU0 services are as follows: 52NS3. such as the 52TOM boards. TQM.3. set the OPA Mode in the dialog box displayed and click OK.. find out that the trail is correctly created. Double-click the NE again to cancel your selection. l l Issue 02 (2009-10-23) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. Click Close. After you specify the source and the sink of a service. you can groom and deploy services in a flexible manner in application scenarios such as deployment or expansion. Step 6 Optional: Click Specify Route Channel and the Specify Route Channel dialog box is displayed. The boards. 52NQ2. and 52NS2. 52ND2. 2.1. 3. 2. 5G) trail are LP ports of the TDG. Prerequisite l l You must be an NM user with "network operator" authority or higher. The boards support the grooming of ODU0 services only in the synchronous mode. The OTU1 ODU1. TIP You can filter other trails according to the source and sink of the new trail. In addition. 3-17 . ODU2. The source and sink of an ODU0 trail are the LP ports of the tributary boards. The WDM trail creation feature simplifies the service configuration procedure and ensures proper operation. ----End Result 1. however. the U2000 automatically searches for the server trail and creates the ODUk trail.2 Creating an ODUk Trail The U2000 supports creating ODUk trails in an end-to-end mode. Step 8 Optional: Check the Activate the trail check box.

Step 3 Click Browse and the Select Board Port-Source/Sink dialog box is displayed. Issue 02 (2009-10-23) . An ODU1 trail cannot be created on an OTU1 server trail formed by the networking of the TQS boards.3 End-to-End WDM Management NOTE iManager U2000 Operation Guide for WDM End-to-End Management In the synchronous mode. XCS board). Currently. XCS board) is available. the tributary board and line board must be installed on the same subrack. l l l l l l l An example of the ODUk networking scenario is as follows: TQS STM-16 RX1 LP1 O D U 1 NS2 ODU1 O D U 2 O T U 2 NS2 ODU1 TQS LP1 O D U 1 STM-16 TX1 OUT IN O T U 2 O D U 2 OCh Trail OTU2 Trail ODU2 Trail ODU1 Trail Client Trail Electrical Signal Optical Signal Procedure Step 1 Choose Service > WDM Trail > Create WDM Trail from the Main Menu. During the installation of cross-connect board (for example. board. If no cross-connect board (for example. The U2000 does not support the ability to create a trail whose source and sink use the same subrack. The TSXL board supports the inverse multiplexing of the 40 Gbit/s service and the TDX board supports the inverse multiplexing of the 10 Gbit/s service The U2000 supports the ability to reuse discrete cross-connections. Select the NE. The cross-connect board can be the 52XCH boards. 3-18 Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. Ltd. Step 2 Set the level. rate and direction of the service. ODU5G and ODU3 trails cannot be created. the boards (including tributary and line boards) that support the grooming of ODU0 services work with synchronous cross-connect boards. The U2000 does not support the ability to create a trail that is terminated at one end. two types of boards support the inverse multiplexing trail. but can be searched.. ODU1 and ODU2 trails can be created. l Only ODU0. and port. the tributary board and line board must be installed in paired slots of the same subrack.

Step 6 Optional: Click Specify Route Channel and the Specify Route Channel dialog box is displayed. An OCh or ODUk server trail is correctly searched out or created. 2. In the WDM Trail Management user interface. the U2000 only supports the Client trails created based on the ODUk server trails in a network composed all by NG WDM equipment. Prerequisite l l You must be an NM user with "network operator" authority or higher. Click Close. ----End Result 1. Step 9 Optional: Check the Activate the trail check box. The WDM trail creation feature simplifies the service configuration procedure and ensures proper operation. 3. Step 10 Click Apply. You can click the trail again. 3-19 l Issue 02 (2009-10-23) . Right-click the NE that selectively receives services and choose Set Selective-Receiving Point from the shortcut menu. A prompt is displayed. In the upper left corner of the NE icon. set the basic trail attributes. Step 8 Click the General Attributes. Step 5 Optional: Double-click the other NE in the subnet to specify the NE that the route cannot pass through. Background Information The restrictions for configuring cross-connections and networking are as follows: l The working route and protection route of WXCP/SNCP trails must be different server trails. In addition. Select a path and click OK.1.. In the upper left corner of the NE icon. find out that the trail is correctly created. TIP You can filter other trails according to the source and sink of the new trail. Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. The server trail can be ODU1 trail. Currently. Right-click the NE that dual feeds services and choose Set Dual-Feed Point from the shortcut menu. ODU5G trail and ODU2 trail.iManager U2000 Operation Guide for WDM End-to-End Management 3 End-to-End WDM Management Step 4 Optional: Click a server tail between the source and sink NEs. and cancel the selected server trail in the dialog box displayed. you can groom and deploy services in a flexible manner in application scenarios such as deployment or expansion. is displayed. After you specify the source and sink of a service. Ltd. and set the SNCP protection route. The sign is shown on the NE. is displayed. and select the included server trail in the dialog box displayed.3 Creating Client Trails The U2000 supports creating client trails in an end-to-end mode. Step 7 Optional: Click the Protection Setting tab. including the name and ID. indicating that the operation was successful. the U2000 generates a client trail based on the searched or created server trail. Choose Service > WDM Trail > WDM Trail Management from the Main Menu and select the proper filter criteria for the trails. Double-click the NE again to cancel your selection.3.

3. Issue 02 (2009-10-23) . Step 4 Optional: Click a server tail between the source and sink NEs. and select the included server trail in the dialog box displayed. and cancel the selected server trail in the dialog box displayed.1 Viewing Route Information of WDM Trail The U2000 provides the transmission media route of the trails. Right-click the NE that selectively receives services and choose Set Selective-Receiving Point from the shortcut menu. is displayed. Click Close..4 Viewing WDM Trails This section describes how to view the connection relation of all boards on a WDM NE.4. rate and direction of the service.2 Viewing the Signal Flow Diagram for WDM Trails 3-20 Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. In the upper left corner of the NE icon. TIP You can filter other trails according to the source and sink of the new trail. the client trail cannot be created even if the OCh trail is searched out. including the name and ID. Step 2 Set the level. if services are configured at only one port. is displayed. A prompt is displayed. The sign is shown on the NE. For the dual-fed OTU.1. Step 9 Optional: Check the Activate the trail check box. Step 6 Optional: Click Specify Route Channel and the Specify Route Channel dialog box is displayed. indicating that the operation was successful. In the WDM Trail Management user interface. board.1. The U2000 supports the ability to create a mono nodal trail. Double-click the NE again to cancel your selection. find out that the trail is correctly created. In the upper left corner of the NE icon. 3. Ltd.4. 2. Step 10 Click Apply. You can click the trail again. Select a path and click OK. and port. l l Procedure Step 1 Choose Service > WDM Trail > Create WDM Trail from the Main Menu. Select the NE. You can view the transmission media layer route to find out the transmission media of the trail. Step 3 Click Browse and the Select Board Port-Source/Sink dialog box is displayed.3 End-to-End WDM Management l iManager U2000 Operation Guide for WDM End-to-End Management The U2000 supports the creation and search for the Client trails using the SW SNCP scheme. set the basic trail attributes. 3. Step 5 Optional: Double-click the other NE in the subnet to specify the NE that the route cannot pass through. Right-click the NE that dual feeds services and choose Set Dual-Feed Point from the shortcut menu. ----End Result 1. and set the SNCP protection route. Step 8 Click the General Attributes.1. Step 7 Optional: Click the Protection Setting tab. Choose Service > WDM Trail > WDM Trail Management from the Main Menu and select the proper filter criteria for the trails.

3.4. and facilitates operation and maintenance. Step 2 The Set Trail Browse Filter Conditions dialog box is displayed. Prerequisite l l You must be an NM user with "network monitor" authority or higher.1. click Secondary Filter. you can view the other associated working and protection trails of a trail in the trail list. you can learn about the information including status and attributes of a server trail related to the desired trail. 3. the alarm that causes service interruption is handled with priority. In the signal flow diagram. The WDM trails must be created. l l l If you need to filter all the trails. Through the function of querying a WDM trail. click Filter All.1. Issue 02 (2009-10-23) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. You can view the transmission media layer route to find out the transmission media of the trail. Set the filter criteria and view the desired trails in the trail list.4.4.4 Browsing Related Server Trails The U2000 supports querying related server trails.1. The U2000 provides a way to manage the optical power that is related to the NE layout. you can view the client trail information of a specified trail. The signal flow diagram visually display the flow direction of optical signals.7 Viewing the Connectivity of WDM Services Networkwide The U2000 periodically checks the connectivity of the trails that receive alarm notifications and displays the result.4.4. You can learn about the connectivity of services networkwide by viewing the check result and thus adopt different handling policies.4. For example. 3. 3. If you need to filter the trails in the list. By using this function.3 Viewing Relevant Client Trails At a level higher than sever trails.5 Viewing the Optical Power for the Trails You can query the optical power for trails.1. you can view fiber connections between boards on optical NEs. topology structure and routing. By using the U2000.4. If you need to add to the list more trails that match the requirement. Step 3 Choose a trail and click Transmission Media Layer Route in the bottom portion of the window.. Procedure Step 1 Choose Service > WDM Trail > WDM Trail Management from the Main Menu. click Incremental Filter.1.iManager U2000 Operation Guide for WDM End-to-End Management 3 End-to-End WDM Management The U2000 provides the signal flow diagram for trails of an optical NE. 3-21 . 3.1 Viewing Route Information of WDM Trail The U2000 provides the transmission media route of the trails.6 Analyzing the WDM Trail Fault This section describes how to query relevant information about the WDM trail status. 3. Ltd.1. The transmission media is displayed in the bottom window.1. 3. client trails are used to carry services.8 Browsing Associated Working and Protection Trails U2000 supports the function of displaying associated working and protection trails of an optical NE on an optical layer trail.

Then. click Incremental Filter.2 Viewing the Signal Flow Diagram for WDM Trails The U2000 provides the signal flow diagram for trails of an optical NE. There must be correct WDM trails.4. The signal flow diagram visually display the flow direction of optical signals. and select the Signal Flow Diagram tab in the bottom portion of the window.3 End-to-End WDM Management NOTE iManager U2000 Operation Guide for WDM End-to-End Management Hover the cursor over the trail and the source and sink port information of this route is displayed. the broken fiber is highlighted in red.1. Issue 02 (2009-10-23) . and facilitates operation and maintenance. click Secondary Filter.. Step 3 Select a trail. Set the filter criteria and view the desired trails in the trail list. you can view fiber connections between boards on optical NEs. click Filter All. ----End 3-22 Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. Procedure Step 1 Choose Service > WDM Trail > WDM Trail Management from the Main Menu. The valid positive working route is highlighted in green. The fibers related to the trail are displayed in the signal flow diagram. Step 5 Optional: When an alarm is generated in the case of fiber cut. while the valid negative working route is highlighted in orange. NOTE l l The auto-refresh function of the valid routes is not supported. ----End 3. In the signal flow diagram. and then choose Display valid routes from the shortcut menu. Step 4 Optional: Right-click on the view of signal flow diagram. and choose Legend from the shortcut menu. Right-click on the view of signal flow diagram. This function does to support trail groups. select the trail. NOTE Hover the cursor on a trail to display the source and sink port information of that section of the route. and choose Refresh. Prerequisite l l You must be an NM user with "network monitor" authority or higher. you can refresh the signal flow diagram manually. Step 2 The Set Trail Browse Filter Conditions dialog box is displayed. Step 6 Optional: To query the current working route of a trail. so that you can easily view the alarm status and start initial fault location. The signal flow direction of the entire trail is shown. right-click on the view of signal flow diagram. If you need to add to the list more trails that match the requirement. Ltd. If you need to filter the trails in the list. l l l If you need to filter all the trails. Dotted lines represents intra-station fibers and real lines represents inter-station fibers.

you can view the client trail information of a specified trail. ----End 3. Click Secondary Filter to filter the trails that are already displayed.3 Viewing Relevant Client Trails At a level higher than sever trails. The corresponding client trail information is displayed in the trail list. the link connection of a OCh trail is provided by a OMS trail. OTS trails do not support querying related server trails. A connection of the client layer is carried by an adjacent server trail for transmission.That is. Procedure Step 1 Choose Service > WDM Trail > WDM Trail Management from the Main Menu. Click Incremental Filter to add newly qualified trails to the list without refreshing the trails that are already displayed. 3-23 Issue 02 (2009-10-23) . By using this function.4.805.iManager U2000 Operation Guide for WDM End-to-End Management 3 End-to-End WDM Management 3.1. refer to 3. Context In the network models specified in the ITU-T G.1. The WDM trail must be created or serached out. while the link connection of a Client trail is provided by an OCh or ODUk trail. A WDM trail must be searched out or created. The OCh or ODUk layer is the server trail of the Client layer. Step 3 Right-click a trail and choose Browse Relevant Client Trails from the shortcut menu. The trails are displayed in the list. The OMS layer is the server layer of the OCh layer. Prerequisite l l l You must be an NM user with "network monitor" authority or higher.872 and G. and the OCh trail is the client trail of the OMS layer.4 Browsing Related Server Trails The U2000 supports querying related server trails.1. the OTN transport network is divided.4. Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. each layer manages its own overheads and each layer can be classified into sublayers and the relationship between the adjacent layers is client and server.1 WDM Trail.. Step 2 In the Set Trail Browse Filter Condition dialog box. you can learn about the information including status and attributes of a server trail related to the desired trail. and the Client trail is the client trail of the OCh or ODUk trail. NOTE l l l Click Filter All to refresh and display all the qualified trails. For details of the trail models. For example. Prerequisite l l You must be an NM user with "network monitor" authority or higher. set the filter criteria and click Filter All. Ltd. By using the U2000. client trails are used to carry services.1.

Procedure Step 1 Choose Service > WDM Trail > WDM Trail Management from the Main Menu. This trail and the related server trails are displayed in the user interface. Click Secondary Filter to filter the trails that are already displayed. For details of the trail models.1. Prerequisite l l You must be an NM user with "network monitor" authority or higher.805. the OTN transport network is divided. refer to 3. the link connection of a OCh trail is provided by a OMS trail. while the link connection of a Client trail is provided by an OCh or ODUk trail. The trails are displayed in the list.1. l l l If you need to filter all the trails. If you need to add to the list more trails that match the requirement. Step 3 Right-click a trail and choose Browse Related Server Layer Trails from the shortcut menu. and the Client trail is the client trail of the OCh or ODUk trail.1 WDM Trail. click Secondary Filter. set the filter criteria and click Filter All.872 and G. ----End 3. Step 2 In the Set Trail Browse Filter Conditions dialog box displayed. each layer manages its own overheads and each layer can be classified into sublayers and the relationship between the adjacent layers is client and server. NOTE l l l Click Filter All to refresh and display all the qualified trails. For example.3 End-to-End WDM Management iManager U2000 Operation Guide for WDM End-to-End Management Context In the network models specified in the ITU-T G.. topology structure and routing. Set the filter criteria and view the desired trails in the trail list. Ltd.1. Issue 02 (2009-10-23) . Procedure Step 1 Choose Service > WDM Trail > WDM Trail Management from the Main Menu. Step 4 You can select another trail to continue the query. A connection of the client layer is carried by an adjacent server trail for transmission. The OMS layer is the server layer of the OCh layer. The U2000 provides a way to manage the optical power that is related to the NE layout.That is. 3-24 Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. and the OCh trail is the client trail of the OMS layer. Step 2 The Set Trail Browse Filter Conditions dialog box is displayed. The OCh or ODUk layer is the server trail of the Client layer.4. The WDM trails must be correctly created. click Filter All. If you need to filter the trails in the list.5 Viewing the Optical Power for the Trails You can query the optical power for trails. Click Incremental Filter to add the newly qualified trails to the list without refreshing the trails that are already displayed. click Incremental Filter.

Ltd. 2. move the cursor on a link. and 5G) trails.1. In the Operation Result dialog box displayed. Step 5 Click the Graphic tab to query the graphic interface of the port optical power. Black "E" shape in the histogram indicates the allowable deviation range of the optical power. Orange indicates that the current power exceeds the reference deviation and there is an exception. Prerequisite l l l You must be an NM user with "network monitor" authority or higher. click Close. The U2000 shows the optical power information of all fibres in the link. 3. ----End 3. 3. 3-25 . ODUk (k =0. NOTE In the View tab. and 5G) trails are supported. WDM trails must be created and in the active state. and OTUk (k =1..4.6 Analyzing the WDM Trail Fault This section describes how to query relevant information about the WDM trail status. 2. l Issue 02 (2009-10-23) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. Client trails.iManager U2000 Operation Guide for WDM End-to-End Management 3 End-to-End WDM Management Step 3 Right-click a trail and choose Query Relevant Optical Power from the shortcut menu. Trails that have multiple sources and sinks are not supported. click the Table tab. Step 4 In the Optical Power Management window displayed. NOTE l l l Green indicates that the current optical power is in the normal range. Click Query to query the optical power information of ports from the NE. 1.

the U2000 automatically generates a service-level alarm that is displayed in the Browse Current Alarm window.7 Viewing the Connectivity of WDM Services Networkwide The U2000 periodically checks the connectivity of the trails that receive alarm notifications and displays the result. however.. the alarm that causes service interruption is handled with priority. click Close. select the filter criteria. ----End 3. Procedure Step 1 Choose Fault > Service Minitoring > Real-Time Faulty WDM Trail Management from the Main Menu.4. To add trails that meet the new criteria based on the existing trails. click Filter All. Ltd. is not handled in time. Step 3 Select an WDM trail in the trail list. Step 2 In the Set Trail Browse Filter Conditions dialog box displayed. Step 2 In the Filter dialog box displayed. Then. Step 3 View Connection Status. To filter the trails again according to the new criteria based on the existing trails. For example. Context In the case of the trails that reports the alarms. The alarm that causes service interruption. Step 4 In the Operation Result dialog box displayed. The connectivity of the service is refreshed in real time. ----End 3-26 Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. NOTE l l l To filter all the trails on the U2000. After the service interruption is detected.1.3 End-to-End WDM Management iManager U2000 Operation Guide for WDM End-to-End Management Procedure Step 1 Choose Service > WDM Trail > WDM Trail Management from the Main Menu. click Incremental Filter. right-click the trail. Prerequisite You must be an NM user with "network operator" authority or higher. set the filter criteria and click Filter All. and then choose Analyse Trail Status. Issue 02 (2009-10-23) . certain services of the trails are interrupted while other services of the trails are not interrupted. You can only handle those alarms one by one. You can learn about the connectivity of services networkwide by viewing the check result and thus adopt different handling policies. view Trail Status. The trails are displayed in the list. Step 5 In the WDM Trail Status dialog box displayed. click Secondary Filter. The services that are interrupted cannot be identified when you view alarms. the desired trails are displayed in the trail list.

----End 3.4 Performing 1+1 Protection Switching for a WDM Trail You can perform 1+1 protection switching for a WDM trail. There must be created or searched WDM trails.5. Prerequisite l l You must be an NM user with "network monitor" authority or higher. 3.. Through the function of querying a WDM trail. 3. If you need to add to the list more trails that match the requirement.5. click Filter All. Issue 02 (2009-10-23) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co.1. If you need to filter the trails in the list. 3.iManager U2000 Operation Guide for WDM End-to-End Management 3 End-to-End WDM Management 3.1.2 Configuring OTU Overhead on the OCh Trail You can use the U2000 to configure the overhead bytes of the trail node through the overhead management function of the OTU layer that corresponds to the end-to-end OCh trail.5 Maintaining WDM Trails The end-to-end trails are carriers of services of the customers. 3.5. they are displayed with the selected trail on the trail management interface.5. If there are no associated working and protection trails.4. Set the filter criteria and view the desired trails in the trail list.3 Querying the 1+1 Protection for a WDM Trail This section describes how to query the 1+1 protection status for a WDM trail from the network layer.1. 3-27 . Ltd.1. click Incremental Filter. only the selected trail is displayed. Activating trails enables the services on the WDM trails according to the trail data that is saved on the U2000.5. you can view the other associated working and protection trails of a trail in the trail list.5 Querying the WXCP/SNCP Protection of a WDM Trail This section describes how to query the WXCP or SNCP protection state of a WDM trail from the network layer. Step 3 Select a trail. In the routine maintenance. NOTE If there are associated working and protection trails. Step 2 The Set Trail Browse Filter Conditions dialog box is displayed.1.1.8 Browsing Associated Working and Protection Trails U2000 supports the function of displaying associated working and protection trails of an optical NE on an optical layer trail.1. Procedure Step 1 Choose Service > WDM Trail > WDM Trail Management from the Main Menu.1 Activating/Deactivating WDM Trails Deactivating WDM trails deletes the related services from the NE side and saves the relevant data on the U2000 to release the occupied path resource. 3. l l l If you need to filter all the trails. right click and select the Browse Associated Working/Protection Trails. click Secondary Filter. the administrator and maintainer must find out the status of the trails to ensure that all the services are transmitted correctly.

ODUk. click Incremental Filter. Step 4 Optional: Select one or more trails. Activating trails enables the services on the WDM trails according to the trail data that is saved on the U2000. Step 2 The Set Trail Browse Filter Conditions dialog box is displayed. A prompt appears telling you that the operation was successful.7 Querying the DPPS Protection of a WDM Trail This section describes how to query the DPPS protection state of a WDM trail from the network layer. Performing the WXCP or SNCP protection switching for the trails in the endto-end mode is more direct and easier than that on the per-NE basis. The Client. click Secondary Filter..1. 3. Step 5 Click OK in the Confirm window and the Reconfirm window displayed. Context CAUTION Deactivating WDM trails may interrupt the services. If you need to add to the list more trails that match the requirement.1. 3.5. you need to deactivate the client trail and then the server trail.5. Issue 02 (2009-10-23) . OTUk or OCh trail must be created.6 Performing the WXCP/SNCP Protection Switching for a WDM Trail The U2000 supports performing the WXCP or SNCP protection switching for the trails in the end-to-end mode. l l l If you need to filter all the trails. ----End 3-28 Huawei Proprietary and Confidential Copyright © Huawei Technologies Co.1. right-click and choose Activate. Set the filter criteria and view the desired trails in the trail list. NOTE If a certain server trail carries an active client trail or a partially active client trail. right-click and choose Deactivate. Prerequisite l l You must be an NM user with "network operator" authority or higher.3 End-to-End WDM Management iManager U2000 Operation Guide for WDM End-to-End Management 3. Step 6 Click Close. click Filter All. Ltd. If you need to filter the trails in the list. Step 3 Optional: Select one or more trails.1 Activating/Deactivating WDM Trails Deactivating WDM trails deletes the related services from the NE side and saves the relevant data on the U2000 to release the occupied path resource.5. Procedure Step 1 Choose Service > WDM Trail > WDM Trail Management from the Main Menu.

The OCh trail must be searched. Select the overhead bytes input mode. and the source and sink OTU boards must support overhead management. Step 3 Select an OCh trail. click Incremental Filter. Right-click on the TTI to be Received or TTI to be Sent column. Step 4 Select a port from the object list. l l l If you need to filter all the trails. click Maintenance. Context CAUTION You need to configure OTU overheads correctly. click Secondary Filter. click Filter All. Prerequisite l l You must be an NM user with "network operator" authority or higher. and select Overhead Management. Step 2 The Set Trail Browse Filter Conditions dialog box is displayed.1. If you need to filter the trails in the list. 3-29 .. Otherwise. Ltd. services may be interrupted. If you need to add to the list more trails that match the requirement.2 Configuring OTU Overhead on the OCh Trail You can use the U2000 to configure the overhead bytes of the trail node through the overhead management function of the OTU layer that corresponds to the end-to-end OCh trail.iManager U2000 Operation Guide for WDM End-to-End Management 3 End-to-End WDM Management 3.5. The OTU Overhead window is displayed. Issue 02 (2009-10-23) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. Set the filter criteria and view the desired trails in the trail list. Procedure Step 1 Choose Service > WDM Trail > WDM Trail Management from the Main Menu.

and the Please input the overhead byte dialog box is displayed. Sink Flag and User Tag. Click OK. Ltd.1. The Confirm dialog box is displayed. Applies to Client. 3-30 Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. Step 5 Click Apply. and inter-subrack 1+1 protection for a trail. OCh. Enter the information about Source Flag.3 End-to-End WDM Management iManager U2000 Operation Guide for WDM End-to-End Management NOTE l l Choose Copy All Form Received to automatically copy the contents of current overhead bytes received to the table. A prompt appears telling you that the operation was successful. optical line protection. intra board 1+1 protection. Option Description Copy All Form Received Click Copy All Form Received. Choose Manual Input to customize the contents of the overhead bytes. 1+1 optical path protection. The optical line protection or 1+1 protection groups must be configured. ----End 3.3 Querying the 1+1 Protection for a WDM Trail This section describes how to query the 1+1 protection status for a WDM trail from the network layer. Step 6 Click OK. Manual Input Click Manual Input. client-side 1+1 protection. Prerequisite l l l l You must be an NM user with "network monitor" authority or higher. Trail search must be performed properly. Context You can query the status and parameters of inter-board 1+1 protection. Issue 02 (2009-10-23) .5. Step 7 Click Close.. and OMS trails.

Click Filter All. The Operation Result dialog box is displayed. Step 3 In the WDM Trail Management view. In the Confirm dialog box.1. Step 3 Select a client trail that has WDM 1+1 protection. Prerequisite l l l l You must be an NM user with "network operator" authority or higher. Right-click in the Current Status field and choose Force to Working or any of the other switching operations.iManager U2000 Operation Guide for WDM End-to-End Management 3 End-to-End WDM Management Procedure Step 1 Choose Service > WDM Trail > WDM Trail Management from the Main Menu.. OCh or OMS trails. Step 2 The Set Trail Browse Filter Conditions dialog box is displayed. 3-31 . Procedure Step 1 Choose Service > WDM Trail > WDM Trail Management from the Main Menu. Set filter criteria and methods as needed. Ltd. select a trail that is configured with the 1+1 protection.4 Performing 1+1 Protection Switching for a WDM Trail You can perform 1+1 protection switching for a WDM trail. The 1+1 protection information of the WDM trail is shown in the window. The 1+1 protection status of the WDM trail is queried. Click Maintenance and choose WDM Trail 1+1 Parameter Settings from the drop-down menu. Issue 02 (2009-10-23) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. indicating that the operation is successful. Step 5 Click Close. Step 4 Select a trail in the WDM Trail 1+1 Parameter Settings window. click Maintenance and select WDM Trail 1+1 Parameter Settings. Click Function and select Query Switching Status. A trail search must be performed properly. Step 2 The Set Trail Browse Filter Conditions dialog box is displayed. Context CAUTION Services may be interrupted when performing 1+1 protection switching for a WDM trail. Set filter criteria and methods as needed. confirm the operation. Step 4 Select a protection group of WDM trails. Click Filter All.5. Applies to OCh client. The Operation Result dialog box is displayed indicating that the operation is successful. The WDM Trail 1+1 Parameter Settings window is displayed. ----End 3.

5 Querying the WXCP/SNCP Protection of a WDM Trail This section describes how to query the WXCP or SNCP protection state of a WDM trail from the network layer. A trail with the WXCP or SNCP protection must be configured.1.3 End-to-End WDM Management NOTE iManager U2000 Operation Guide for WDM End-to-End Management You need to confirm the operation only when performing the forced switching and trail locking. Step 3 Select a trail with WXCP or SNCP in the WDM Trail Management window. Step 4 Select the protection group of this WDM trail and click Query. indicating the WXCP or SNCP information of the WDM trail. A trail with the WXCP or SNCP protection must be configured.1. Step 5 Click Close. Prerequisite l l You must be an NM user with "network monitor" authority or higher. ----End 3. Performing the WXCP or SNCP protection switching for the trails in the endto-end mode is more direct and easier than that on the per-NE basis. Step 5 Click Close. Set the filter criteria and methods as needed. indicating that the operation is successful. 3-32 Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. ----End 3.6 Performing the WXCP/SNCP Protection Switching for a WDM Trail The U2000 supports performing the WXCP or SNCP protection switching for the trails in the end-to-end mode.. The WXCP/SNCP Service Control window is displayed. Click the Maintenance button and select WXCP/SNCP Service Control from the drop-down list. Context CAUTION Services may be interrupted when performing the WXCP/SNCP protection switching for a WDM trail. The Operation Result dialog box is displayed. Issue 02 (2009-10-23) . Ltd. Prerequisite l l You must be an NM user with "network operator" authority or higher. Click Filter All.5. Step 2 The Set Trail Browse Filter Conditions dialog box is displayed. Procedure Step 1 Choose Service > WDM Trail > WDM Trail Management from the Main Menu.5.

7 Querying the DPPS Protection of a WDM Trail This section describes how to query the DPPS protection state of a WDM trail from the network layer. indicating the WXCP or SNCP information of the WDM trail. The DPPS Protection window is displayed. Procedure Step 1 Choose Service > WDM Trail > WDM Trail Management from the Main Menu. Step 4 Select the protection group of this WDM trail and click Query. Issue 02 (2009-10-23) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co.iManager U2000 Operation Guide for WDM End-to-End Management 3 End-to-End WDM Management Procedure Step 1 Choose Service > WDM Trail > WDM Trail Management from the Main Menu.5.6. Click Maintenance and select WXCP/SNCP Service Control from the drop-down list. Step 3 In the WDM Trail Management view. 3. A trail with the DPPS protection must be configured. Step 5 Click Close. you can check whether the resources are sufficient before configuring services. indicating the DPPS information of the WDM trail. Click Function and select the forced or manual switching from the drop-down list. select a trail with the WXCP or SNCP protection. Step 3 Select a trail with DPPS in the WDM Trail Management window. Set the filter criteria and methods as needed. ----End 3.1. The Operation Result dialog box is displayed. ----End 3. 3-33 . Click Filter All. Step 4 Select the protection group of this WDM trail. Step 2 The Set Trail Browse Filter Conditions dialog box is displayed.1. The WXCP/ SNCP Service Control window is displayed. Click Filter All. Step 2 The Set Trail Browse Filter Conditions dialog box is displayed. Ltd. indicating that the operation is successful.1. Resource statistics is a key basis of network maintenance and expansion.1 Collecting Statistics on Client-Side Port Resources By collecting statistics on resource inventory for WDM client-side ports (Ethernet service and client-side ports of the OTU board). the DPPS information of the WDM trail is displayed.. Click the Maintenance button and select DPPS Query from the drop-down list.6 Collecting Resource Statistics You can collect statistics on resources to learn the existing inventory of a network. Prerequisite l l You must be an NM user with "network monitor" authority or higher. Set the filter criteria and methods as needed.

3.2 Collecting Statistics on Inter-Station Wavelength Resources The statistics report of inter-station wavelength resources shows the usage of the wavelength resources of one or more trails between the selected stations. select an NE and click the double-right-arrow button (red). Procedure Step 1 Choose Inventory > WDM Statistic Report > Statistics Report of WDM Client-Side Port Resources from the Main Menu. Ltd. Step 3 Click Statistics to query the resource information of the WDM client-side ports.6.1. Unused Port or Dynamic Port tab to query details of the ports.3 Collecting Statistics on WDM Link Resources By using this function.6.1. Step 2 In the left-hand pane. Step 4 Click Used Port.1. This provides reference for service planning and increases the service availability ratio.6.3 End-to-End WDM Management iManager U2000 Operation Guide for WDM End-to-End Management 3. you can learn about the usage of the WDM link resources between the specific stations.. 3-34 Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. Issue 02 (2009-10-23) . This provides reference for service planning and increases the service availability ratio. Prerequisite You must be an NM user with "network monitor" authority or higher. 3. you can check whether the resources are sufficient before configuring services.1 Collecting Statistics on Client-Side Port Resources By collecting statistics on resource inventory for WDM client-side ports (Ethernet service and client-side ports of the OTU board).

.6.1. Discrete services are taken as idle resources. You can select multiple intermediate NEs to determine the trail to be counted out of multiple trails between the source and sink ends.iManager U2000 Operation Guide for WDM End-to-End Management NOTE 3 End-to-End WDM Management l l If a client-side port is not used by a trail. 3-35 . ----End 3. The Confirm dialog box is displayed prompting you to search for trails before collecting statistics. Procedure Step 1 Choose Inventory > WDM Statistic Report > Statistics Report of Inter-Station Wavelength Resources from the Main Menu. NOTE The source and sink ends can be optical NEs. Click OK in the Search NE dialog box. Ltd. Step 5 Optional: Click Print or Save As to output the report. only OCh trails are supported. NOTE l l The intermediate NE can only be an optical NE.2 Collecting Statistics on Inter-Station Wavelength Resources The statistics report of inter-station wavelength resources shows the usage of the wavelength resources of one or more trails between the selected stations. Issue 02 (2009-10-23) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. You cannot collect statistics on the wavelengths that are used by WDM ASON trails at the OCh level. this port is used. l Context To ensure that statistics are correct. Step 2 Set the Level and Direction of the trail to be counted. NEs or boards. NOTE Currently. Prerequisite l l You must be an NM user with "network monitor" authority or higher. it is recommended that you search for WDM trails before you collect statistics on wavelength resources. Step 5 Click Count. Step 3 Click Browse to select the source end and click the button again to select the sink end. You cannot collect statistics if the trail to be counted is bidirectional. and the source and sink ends of the trail use the optical multiplexer/demultiplexer board or optical add/drop multiplexing board. Otherwise. this port is idle. Step 4 Optional: Click Browse to select the intermediate NE. This provides reference for service planning and increases the service availability ratio.

This provides reference for service planning and increases the service availability ratio. view the details of all the links between the two stations.3 Collecting Statistics on WDM Link Resources By using this function.1. you can learn about the usage of the WDM link resources between the specific stations. view the link resources among stations. Prerequisite You must be an NM user with "network monitor" authority or higher. select a record. in the Link List pane.6. Issue 02 (2009-10-23) . Step 7 Optional: Click Print or Save As to output the report. Procedure Step 1 Choose Inventory > WDM Statistic Report > Statistics Report of WDM Link Resources from the main menu. select an NE and click the double-right-arrow button (red). Then. Ltd.. Step 2 In the left-hand pane. ----End 3.3 End-to-End WDM Management iManager U2000 Operation Guide for WDM End-to-End Management Step 6 Click OK. 3-36 Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. it takes a long time to create the report. The Operation Result dialog box is displayed indicating that the operation was successful. You can view the created report in the right-hand pane. Step 3 In the Inter-Station Link Resource Statistics pane. Click Close. Step 4 In the Inter-Station Link Resource Statistics pane. NOTE If there is a large number of network data.

Idle ports must be available at the source and sink ends. ----End 3. you need to modify the configuration of a WDM trail. If you want to modify the sink end of a WDM trail. Applies to a trail with only one source and one sink.7. 3. such as the L4G. U2000 supports manually modifying the source and sink of an exisiting WDM trail and the trail names in batches. l l l l CAUTION Modifying the source or sink of a trail interrupts services. and LQG boards. you may need to modify the source and sink of a WDM trail. The U2000 supports the ability to modify the source and sink ends of a client trail that is in service. sometimes. The U2000 does not support the ability to modify a cross-subrack WDM trail.3 Modifying Trail Names in Batches The network administrator can set the trail naming rules and modify trail names in batches according to these rules. 3.1.1 Modifying the Source and Sink of a Client Trail Because of service requirements.1. Context The configuration principles are as follows: l The OTU boards at the source and sink ends. and thus the operation is simplified. The U2000 supports manually modifying the source and sink of an existing WDM trail. you can modify the WXCP/SNCP protection for trail. the sink end before modification and the sink end after modification must reside in the same subrack. 3.iManager U2000 Operation Guide for WDM End-to-End Management 3 End-to-End WDM Management Step 5 Optional: Right-click one or more links in the Link List pane and choose Browse Relevant Client Trails from the shortcut menu to view the client trail of this link. you need not create a new WDM trail.1. The U2000 supports manually modifying the source and sink of an existing WDM trail.1. LOG. Issue 02 (2009-10-23) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. As a result. and thus the operation is simplified. you need not create a new WDM trail.1.7. must support configuring cross-connections and must be installed on different NEs. 3. This greatly simplifies the operations.2 Modifying WXCP/SNCP Protection In the case of a trail change.. As a result. 3-37 . The source and sink of a trail represent specific service ports. Prerequisite l l You must be an NM user with "network operator" authority or higher. instead of creating WDM trails.1 Modifying the Source and Sink of a Client Trail Because of service requirements.7 Modifying WDM Trails Due to service requirements.7. you may need to modify the source and sink of a WDM trail. Ltd.7.

. and choose Modify Trail from the drop-down menu. Set filter criteria and methods as needed. and select the included server trail in the dialog box displayed. click Filter All. Step 7 Click Finish.7. Step 5 Click Browse corresponding to Sink to select a sink port. click Create/Modify. Choose Service > WDM Trail > WDM Trail Management from the Main Menu and select the proper filter criteria for the trails. Step 2 The Set Trail Browse Filter Condition dialog box is displayed. 3-38 Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. Issue 02 (2009-10-23) . to add trails that meet the new criteria. 3. ODU0. Step 3 Select a desired trail. you can modify the WXCP/SNCP protection for trail. to filter the trails again according to the new criteria. and cancel the selected server trail in the dialog box displayed. You can click the trail again. Step 8 The Operation Result dialog box is displayed. Step 6 Optional: Click a server tail between the source and sink NEs. and if the modified trail is an activated trail. Support the function of modifying the WXCP/SNCP protection for Client. Step 4 Click Browse corresponding to Source to select a source port. ----End Result 1. ODU1. The Modify WDM Trail window is displayed. TIP You can filter other trails according to the source and sink of the new trail. In the WDM Trail Management user interface. and ODU2 trails. click Incremental Filter.3 End-to-End WDM Management iManager U2000 Operation Guide for WDM End-to-End Management Procedure Step 1 Choose Service > WDM Trail > WDM Trail Management from the Main Menu. click Yes.1. Based on the existing trails. Context CAUTION This operation may cause short interruption of the services. find out that the trail is correctly modified. Ltd. click Secondary Filter. Based on the existing trails. Click Close. NOTE l l l To filter all trails on the U2000.2 Modifying WXCP/SNCP Protection In the case of a trail change. the Confirm dialog box is displayed. Prerequisite l l You must be an NM user with "network operator" authority or higher. 2.

right-click the selective-receiving point and choose Cancel Selective-Receiving Point from the shortcut menu. – Right-click the dual-fed point and choose Set Dual-Fed Point from the shortcut menu. and the node is displayed as .iManager U2000 Operation Guide for WDM End-to-End Management 3 End-to-End WDM Management Procedure Step 1 Choose Service > WDM Trail > WDM Trail Management from the Main Menu. Click Incremental Filter to add the newly qualified trails to the list without refreshing the trails that are already displayed. – Right-click the blank area in the Node List frame and choose Add from the shortcut menu. In the Operation Result dialog box.. ----End 3. The trails are displayed in the list. Step 3 Select a trail and click Create/Modify and choose Modify Trail. Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. and the node is displayed as .1. 3-39 Issue 02 (2009-10-23) . select DualFed Point and Selective-Receiving Point. l Add WXCP/SNCP protection. Click OK. The Add the dual-fed and selective-receiving node is displayed. set the filter criteria and click Filter All. Ltd. NOTE l l l Click Filter All to refresh and display all the qualified trails.7. Right-click a record in the Node List frame and choose Delete from the shortcut menu. click Close.3 Modifying Trail Names in Batches The network administrator can set the trail naming rules and modify trail names in batches according to these rules. The trail naming rules must be set on the U2000. Right-click the selective-receiving point and choose Set Selective-Receiving Point from the shortcut menu. Step 4 Click the Protection Setting tab. Click OK. – – – l Modify WXCP/SNCP protection. Prerequisite l l You must be an NM user with "network maintainer" authority or higher. Step 2 In the Set Trail Browse Filter Conditions dialog box displayed. sets the Server Layer Trail and Channel of the protection route . Click Protection Setting. In the Specify Route Channel window. Click Secondary Filter to filter the trails that are already displayed. l Delete WXCP/SNCP protection. Step 5 Click Finish. click Yes. In the Confirm dialog box. Click Delete Protection. Right-click the dual-fed point and choose Cancel Dual-Fed Point from the shortcut menu.

3 End-to-End WDM Management

iManager U2000 Operation Guide for WDM End-to-End Management

Procedure
Step 1 Choose Service > WDM Trail > WDM Trail Management from the Main Menu. Step 2 In the Set Trail Browse Filter Condition dialog box, set the filter criteria and click Filter All. The trails are displayed in the list.
NOTE

l l l

Click Filter All to refresh and display all the qualified trails. Click Secondary Filter to filter the trails that are already displayed. Click Incremental Filter to add newly qualified trails to the list without refreshing the trails that are already displayed.

Step 3 Right-click one or more trails from the list, and choose Name from the shortcut menu. For the naming rules, refer to Customizing Naming Rule. Step 4 In the Confirm dialog box displayed, click OK. ----End

3.1.8 Deleting a WDM Trail
The operation deletes the WDM trails from the network layer or from the NE layer. You need to delete the trails if the network will be adjusted or rebuilt.

Prerequisite
l l l l

You must be an NM user with "network operator" authority or higher. The trail is not the OTS trail. The trail must have the highest priority. The trails that contain dynamic cross-connections must be deactivated before deleted. Other trails can be directly deleted.

Context
A WDM trail can be deleted from the network side or the NE side.
l

If a trail is deleted from the network side, only the WDM trail at the network layer is deleted on the U2000 side. The deleted trail is not delivered to the NE. Moreover, the service is not affected. Generally, this method is adopted to synchronize the trail information on the U2000 side and the trail information at the network layer. After the trail is deleted from the network layer, you can search for and find it again based on the service information at the NE layer. If a trail is deleted at the NE layer, the trail on the NE side is deleted accordingly. After the trail is deleted, the service is interrupted. If the service configuration of the trail is incorrect or needs to be modified, you can delete the trail at the NE layer and then create another trail. The U2000 supports the ability to delete a WDM trail and to delete a dynamic crossconnection related to the trail. The U2000 does not support the ability to delete the WDM trail that has a client trail. The U2000 does not support the ability to delete an OTS trail.
Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. Issue 02 (2009-10-23)

l

l

l l

3-40

iManager U2000 Operation Guide for WDM End-to-End Management
l

3 End-to-End WDM Management

Before you delete a WDM trail, the dynamic cross-connection related to the trail must be inactive. If active, an error is displayed during the deletion.

CAUTION
Deleting the trails from NE layer will affect service.

Procedure
Step 1 Choose Service > WDM Trail > WDM Trail Management from the Main Menu. Step 2 The Set Trail Browse Filter Conditions dialog box is displayed. Set the filter criteria and view the desired trails in the trail list. l l l 1. 2. If you need to filter all the trails, click Filter All. If you need to add to the list more trails that match the requirement, click Incremental Filter. If you need to filter the trails in the list, click Secondary Filter. Select the WDM trail that you want to delete, right-click it and choose Delete. In the Confirm and Reconfirm dialog boxes displayed, click OK. The operation is complete. Select the WDM trail that you want to delete, right-click it and choose Delete from Network Layer. In the Operation Result dialog boxes displayed, click Close.

Step 3 Optional: Deleting WDM Trails from the NE Layer.

Step 4 Optional: Deleting WDM Trails from the Network Layer. 1. 2.

----End

3.1.9 Sample Application: Configuring GE Services with the WXCP Protection in End-to-End Mode
This sample describes how to configure GE Services with the WXCP protection in the end-toend mode.

Prerequisite
l l l

You must be an NM user with "network operator" authority or higher. The Optical NE must be created as shown in Figure 3-12. The NEs and boards must be created as shown in NE Panel.

Context
Network Design The Project T constructs a ring network with station A, station B, station C and station D. All the equipments are OptiX Metro 6100V1E. Station A is an Optical Terminal Multiplexer (OTM) station. The station A has two back-to-back OTMs including two NEs. Station B, station C and
Issue 02 (2009-10-23) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd. 3-41

3 End-to-End WDM Management

iManager U2000 Operation Guide for WDM End-to-End Management

station D are Optical Add/Drop Multiplexer (OADM) stations. Each station has one NEs. The network design is shown in Figure 3-12. Figure 3-12 Network Design

A

B

D

C

OADM OTM

Slot Diagram Figure 3-13 Station A

3-42

Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd.

Issue 02 (2009-10-23)

After receiving a request. the engineer must follow the request to configure a GE level service with WXCP from station A to station C. the maintenance engineer is responsible for the service deployment and adjustment. Suppose that the engineer is familiar with all the services carried by the WDM network. Ltd. Issue 02 (2009-10-23) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co.. 3-43 .iManager U2000 Operation Guide for WDM End-to-End Management 3 End-to-End WDM Management Figure 3-14 Station B Figure 3-15 Station C Figure 3-16 Station D Service Requirements In the network management center. One of the routine tasks of this engineer is to deploy the GE level service to a wavelength.

The U2000 takes some time to return the results. 1. 6. Issue 02 (2009-10-23) . Create a GE trail with the WXCP protection. Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. 2. Connect fibers on the U2000 according to the actual networking diagram. NOTE If no trails conflict. Click Next to begin to search for trails. Record all the available resources. 4. Choose Inventory > WDM Statistic Report > Statistics Report of WDM Client-Side Port Resources from the Main Menu. Under Advanced settings. Procedure Step 1 Query the available resources of the WDM side. 4. If you want to set a trail management flag. Click the double arrow button to add the port resources of the two NEs to the statistics area at the right-hand side. no window about conflicting trails is displayed.. the U2000 displays the window about discrete services.3 End-to-End WDM Management iManager U2000 Operation Guide for WDM End-to-End Management Procedure 1. 2. Choose Service > WDM Trail > WDM Trail Search from the Main Menu. 3. 3-44 Click Next to view all discrete services in the network. Click Next to view the conflicting trail information . 5. Select the optical NE A and the optical NE C from the Navigation Tree. set the search policies. 3. Query the available resources of the WDM side. Search for WDM trails. Click Used Port and Unused Port to view the using status of each port. 2. 1. 3. check the Management Flag check box or right-click it and select the management flag. After you click Next. Step 2 Search for WDM trails. depending on the number of services. Ltd.

board.3 port of the No. Click Apply. 2. and D are optical add/drop multiplexer (OADM) stations.1. and D. Set the service level as GE. rate and direction of the service. is displayed. In the upper left corner of the NE icon. and set the SNCP protection route. and port. Prerequisite l l l You must be an NM user with "network operator" authority or higher.1 timeslot LQG on NE331. A prompt is displayed. Right-click the NE that dual feeds services and choose Set Dual-Feed Point from the shortcut menu. Click Close. 4. The optical NE as shown in Figure 3-17 must be created. click Finish. including the name and ID. and Table 3-3 lists the network configuration data. In the upper left corner of the NE icon. Select the NE. Step 3 Create a GE trail with the WXCP protection. C. Set optical NE A as the dual transmitting node and optical NE C as the receiving node. The NEs and boards as shown in NE Panel must be created. Choose Service > WDM Trail > Create WDM Trail from the Main Menu. Set the level.. The network uses the OptiX Metro 6100 equipment. Set the sink port as No. B. and set the service direction as Unidirectional.3 port of the No. Figure 3-17 shows the network design. C. After the search is complete.1 timeslot LQG on NE333. Check the Activate the trail check box. 3.10 Sample Application: Configuring an OCh Trail This section describes how to configure an OCh trail in the end-to-end mode. set the basic trail attributes. Each station has only one NE. Right-click the NE that selectively receives services and choose Set Selective-Receiving Point from the shortcut menu. 7. Ltd. Stations A. Click Browse and the Select Board Port-Source/Sink dialog box is displayed. Click the Protection Setting tab. ----End 3. Context Project network design Project T is a ring network that consists of stations A. is displayed. Click the General Attributes. indicating that the operation was successful. 6. 3-45 . 1.iManager U2000 Operation Guide for WDM End-to-End Management 3 End-to-End WDM Management 7. 5. Issue 02 (2009-10-23) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. B. Set the source port as No.

1.146 129..1. 3-46 Huawei Proprietary and Confidential Copyright © Huawei Technologies Co.1.147 Remarks Gateway NE Non-gateway NE Non-gateway NE Non-gateway NE NE Panel In the project.174 129. Issue 02 (2009-10-23) .9. the configurations for NEs on stations A.9.3 End-to-End WDM Management iManager U2000 Operation Guide for WDM End-to-End Management Figure 3-17 Network design A B D C OADM Table 3-3 Network data table Station A B C D NE Type OADM OADM OADM OADM NE Name NE403 NE430 NE401 NE402 IP Address 129. C. Ltd.1.145 129.9. and D are the same.9. B.

Based on the services..iManager U2000 Operation Guide for WDM End-to-End Management 3 End-to-End WDM Management Figure 3-18 NE panel on station A LL 44 GG F S SF W W P I C CI S S M U 2 CU D M U 9 9 Service demand A main responsibility of the transmission equipment maintenance engineers in the transmission maintenance department of the network management center is to provision and groom services in the WDM network. This route passes through station C. Figure 3-19 Signal flow of the trail from station B to station C l There is a bidirectional trail from station B to station D. the planned OCh trails are as follows: l There is a unidirectional trail from station B to station C. Ltd. The route from station D to station B is D->A->B. The wavelength of the service is wavelength 2. One is a unidirectional service from station B to station C. Figure 3-20 and Figure 3-21 show the trail signal flows. An engineer receives a grooming order for provisioning two services. The route from station B to station D is B->C->D. 3-47 . Figure 3-19 shows the trail signal flow. The wavelength of the service is wavelength 1. The route is B->C. The wavelength of the service is wavelength 2. The other is a bidirectional service from station B to station D. This route passes through station A. Issue 02 (2009-10-23) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co.

Create an OCh trail between station B and station D. 2.3 End-to-End WDM Management iManager U2000 Operation Guide for WDM End-to-End Management Figure 3-20 Signal flow of the trail from station B to station D Figure 3-21 Signal flow of the trail from station D to station B Configuration procedure 1. 3. 2. Search for WDM server trails. Procedure Step 1 Search for WDM server trails. 3. Choose Service > WDM Trail > WDM Trail Search from the Main Menu. Ltd. 3-48 Connect fibers on the U2000 according to the actual networking and signal flow diagrams.. set the search policies. 1. Create an OCh trail from station B to station C. Issue 02 (2009-10-23) . Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. Under Advanced settings.

Huawei Proprietary and Confidential Copyright © Huawei Technologies Co.. Check the Activate the trail check box. 5. and port. 6. board. Set the service level to OCh. 4. including the name and ID. Set the source port to port 1 of the L4G in slot 1 on NE430 and the sink port to port 1 of the L4G in slot 1 on NE401. Select the NE. Select the NE. 5. Click Apply. rate and direction of the service. check the Management Flag check box or right-click it and select the management flag. 1. Set the service level to OCh. 2. Click the General Attributes. 6. 1. 2. Step 2 Create an OCh trail from station B to station C. Choose Service > WDM Trail > Create WDM Trail from the Main Menu. port and wavelength. If you want to set a trail management flag. Ltd. The U2000 displays a window that displays discrete services. Click Next to view the conflicting trail information .iManager U2000 Operation Guide for WDM End-to-End Management 3 End-to-End WDM Management 4. indicating that the operation was successful. A prompt is displayed. Click Next. board. depending on the number of services. Set the level and direction of the service. 3. Issue 02 (2009-10-23) . set the basic trail attributes. 7. The U2000 takes some time to return the results. After the search is complete. and set the service direction to Bidirectional. Click Close. NOTE If no conflict trail exists. the window of conflict trails is not displayed. Click Next to view all discrete services in the network. Click Browse and the Select Board Port-Source/Sink dialog box is displayed. and set the service direction to Unidirectional. 3. Choose Service > WDM Trail > Create WDM Trail from the Main Menu. click Finish. Click Browse and the Select Board Port-Source/Sink dialog box is displayed. 3-49 Step 3 Create an OCh trail between station B and station D. Click Next to begin to search for trails. Set the level.

1 EAPE The U2000 provides the enhanced automatic power pre-equilibrium (EAPE) function. Click the General Attributes.2. the EAPE can reduce or even eliminate bit errors of services on the trail. In the case of the equipment with the dynamic optical cross-connection boards. This event prompts the user to start EAPE adjustment so that the VOA at the source end finely tunes the optical power at the transmit end. The WDM trail creation feature simplifies the service configuration procedure and ensures proper operation.. 6. Click Close. The EAPE function uses OCh trails to identify EAPE pairs. 3. ----End 3.2.4 Starting EAPE Adjustment In the case of a WDM service configured with EAPE. 3. 3.Before creating an EAPE pair. The EAPE adjustment can be enabled to ensure that the receive-end signal quality of each channel meets the preset requirement and that the services are available. the U2000 can generate an OCh trail based on the searched server trail. you should create OCh trails. set the basic trail attributes. you can manually delete the EAPE.2 Configuring EAPE The U2000 supports configuring the enhanced automatic power equalization (EAPE) for a trail. 5. 3. Check the Activate the trail check box.1 EAPE The U2000 provides the enhanced automatic power pre-equilibrium (EAPE) function. Click Apply.3 Creating EAPE Objects The U2000 supports configuring the enhanced automatic power equalization (EAPE) for a trail. 3-50 Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. The EAPE adjustment can be enabled to ensure that the receive-end signal quality of each channel meets the preset requirement and that the services are available. 3. you can groom and deploy services in a flexible manner in application scenarios (deployment or expansion). an exceptional EAPE event is reported to and displayed on the U2000. After you specify the source and sink of a service. when the OTU at the sink end detects the signal degrade. Ltd.5 Deleting EAPE Objects When you need to activate a trail or the EAPE function on the trail is not required. indicating that the operation was successful.2. By adjusting the optical power of a WDM trail. For a WDM service configured with the EAPE.3 End-to-End WDM Management iManager U2000 Operation Guide for WDM End-to-End Management Set the source port to port 1 of the L4G in slot 2 on NE430 and the sink port to port 1 of the L4G in slot 2 on NE402. A prompt is displayed.2. you can create OCh trails manually by using the trail management function of the U2000.2. In addition. the U2000 fine-tunes the optical power of the transmit end according to signal quality detected by the receive end.2 Creating an OCh Trail The U2000 supports creating OCh trails in an end-to-end mode. This can improve the signal quality. Issue 02 (2009-10-23) . This can enhance the signal quality. 4.2. including the name and ID. 3.

During deployment commissioning.. if the optical power of the OTU at the receive end does not cross the threshold. When the OTU at the receive end detects an alarm. greatly changes due to fiber condition variation. Function Implementation The procedure to implement the EAPE function is as follows: 1. the OTU at the receive end detects the signal quality of each channel. the optical power flatness of each channel. This ensures that the receive-end signal quality of each channel meets the preset requirement and that the services are available. In this case. the quality of received signals does not meet the requirement. Table 3-4 The versions of the equipment and U2000 that support the EAPE function Equipment Version OptiX OSN 6800/3800 V100R003 or later versions OptiX OSN 3800A/6800A V100R001C01 or later versions OptiX OSN 1600A/G(NA) V100R003C02 or later versions U2000 Version V100R001 or later versions V100R001 or later versions V100R001 or later versions The service board and the SCC board are jointly used to achieve the EAPE function. The boards that support this function include the OTUs and line boards with the FEC function. adjust the optical power attenuation ratio of the corresponding channel according to the actual situation.iManager U2000 Operation Guide for WDM End-to-End Management 3 End-to-End WDM Management Function Description In practice of WDM system operation. 2. 3. This ensures that each channel normally operates. During system operation. As a result. compared with that during deployment commissioning. Involved Units The Table 3-4 lists the equipment and U2000 versions that support the EAPE function and their relations. Ltd. EAPE adjustment can be enabled to ensure that the receive-end signal quality of each channel meets the preset requirement and that the services are available. This function involves the following types of boards and ports: l OTU detection unit – Detects the receive-end signal quality of each channel and reports any EAPE unbalance event detected. 3-51 . – Issue 02 (2009-10-23) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. manually adjust the optical power of each channel to obtain signal quality that meet the requirement.

Two trails with VOA units exist. Each of the two receive optical interfaces of the dual fed and selective receiving OTU has an FEC module. WSD9. The boards that support this function include the OLP and DCP. Figure 3-22 Scenario of the single VOA unit that takes the common OTU as the source EAPE application scenario 2 is applicable to the dual fed and selective receiving OTU board. in this networking mode. WSD5. Received signal selection unit – l The system locates the point to be adjusted according to the current protection state of the OLP or DCP board. The figure illustrates only the unidirectional EAPE pair. – l System control and communication unit – – NOTE For the EAPE function. Hence. It is the system entity that carries out the EAPE function. WSM5. Issue 02 (2009-10-23) . Figure 3-22 shows the networking diagram of this application mode. WSM9. you need to configure two EAPE pairs.Figure 3-23 shows the networking diagram of this application mode. The figure illustrates only the unidirectional EAPE pair. The EAPE protocol frames can be sent in modes such as the OSC and ESC. M40V. Ltd.. VA2. DWC. The boards that support this function include the SCC. EAPE application scenario 1 is with the basic configuration that only a trail with VOA unit exists. EDWC. Networking Scenarios The EAPE function can be applied in three typical scenarios. WSMD4. V48. The boards that support this function include ROAM. V40.3 End-to-End WDM Management l iManager U2000 Operation Guide for WDM End-to-End Management Adjustment unit: It is the EAPE adjustment entity that adjusts the optical attenuation of each channel. D40V. VA1 and VA4. 3-52 Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. EAPE protocol frames can be sent to each node as long as the physical communication route is reachable.

Figure 3-24 shows the networking diagram of this application mode. you also need to specify the OLP or DCP board and the active and standby adjustment units. Only one EAPE pair needs to be configured. Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. 3-53 l l l Issue 02 (2009-10-23) .iManager U2000 Operation Guide for WDM End-to-End Management 3 End-to-End WDM Management Figure 3-23 Scenario of the dual VOA units that take the dual-fed and selective-receiving OTUs as the sources EAPE application scenario 3 is applicable to the 5 Gbit/s.. the system locates the VOA to be adjusted according to the current services operating channel. the FEC function of the OTU must be enabled. In this networking mode. you just need to specify the source OTU. Ltd. When the sink OTU detects an anomaly. Figure 3-24 Scenario of the dual VOA units with the OLP protection units Configuration Principle The EAPE configuration principles are as follows: l l When creating the EAPE. When the OTU is jointly used with the OLP or DCP board for networking. the sink OLP or DCP board and the sink OTU must be configured on one NE. you must create the corresponding OCh trail firstly. the FEC working mode of the OTU must not be changed. In this networking mode. The FEC type of the source and sink OTU must keep consistent. EAPE requires that the monitored path is a complete end-to-end wavelength without any intermediate add or drop wavelength. sink OTU and adjustment unit. 10 Gbit/s and 40 Gbit/s OTUs. Based on the basic application scenario. the adjustment unit and the source OTU must be configured on another NE. After EAPE is configured. besides specifying the source OTU and sink OTU. the intra-board 1+1 protection needs to be configured. The figure considers the OLP board as an example to illustrate only the unidirectional EAPE pair.

you can obtain the EAPE objects with consistent data between the U2000 and the NE. WSD9. The adjustment board cannot be on the sink NE. and the OptiX OSN 8800 I: WSM9. you can create OCh trails manually by using the trail management function of the U2000.2 Creating an OCh Trail The U2000 supports creating OCh trails in an end-to-end mode. RMU9. you can groom and deploy services in a flexible manner in application scenarios (deployment or expansion). The FEC mode of the source OTU and sink OTU should be the same. Typical OCh networking scenarios are as follows: l The typical scenario of non-protected OCh networking is as follows: Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. In the case of the equipment with the dynamic optical cross-connection boards. Prerequisite l l You must be an NM user with "network operator" authority or higher. When an OCh trail has the corresponding EAPE objects. the OptiX OSN 6800.3 End-to-End WDM Management l iManager U2000 Operation Guide for WDM End-to-End Management An OCh trail with regenerating stations equals to two independent wavelengths and thus need be configured with two EAPE pairs. RMU9. ROAM. The boards that support the dynamic optical cross-connection are classified by equipment domain as follows: l l l For the OptiX BWS 1600G: WSM9. Issue 02 (2009-10-23) 3-54 .2.. The source and sink of an OCh trail are the ports at the line side of the OTU boards. search for a new trail. For the OptiX OSN 3800. The boards that the trail passes should support dynamic optical cross-connection or should contain static optical cross-connection. 13WSM9. The OMS server trail must be searched out. EAPE requires that the adjustment unit is configured in the transmit-end station and the OTU detection unit is configured in the receive-end station. In addition. you cannot modify or deactivate the trail. you should create OCh trails. WSMD4. WSD5 and RMU9. The uploading function is not supported. WSM5. 11RDU9. Background Information The U2000 does not support the ability to reuse discrete cross-connections. the U2000 can generate an OCh trail based on the searched server trail. The EAPE function uses OCh trails to identify EAPE pairs. RDU6. WSM6. but the script importing and exporting function is supported. If the EAPE ID on the U2000 is inconsistent with that on the NE. After you specify the source and sink of a service. 11WSMD2. and the selective receiving board cannot be on the source NE. The WDM trail creation feature simplifies the service configuration procedure and ensures proper operation. In this way. you need to delete the trail on the U2000 from the network layer. An OCh trail with multiple sources and sinks does not support the EAPE function.Before creating an EAPE pair. WSD9. 12WSD9. and WSMD4. 13WSD9. For the OptiX Metro 6100V1E: WSM9. WSD9. 12WSM9. l l l l l l l 3. Ltd. and then query or create EAPE objects.

Step 3 Click Browse and the Select Board Port-Source/Sink dialog box is displayed. and cancel the selected server trail in the dialog box displayed. the U2000 uses the board and port that have the same band and wavelength with priority. Procedure Step 1 Choose Service > WDM Trail > Create WDM Trail from the Main Menu. Step 4 Optional: Click a server tail between the source and sink NEs. and select the included server trail in the dialog box displayed. when you move the cursor to a board. Select the NE.iManager U2000 Operation Guide for WDM End-to-End Management ONE2 ONE1 OCh D40 OT U O T U O T U 3 End-to-End WDM Management OCh M40 WSM FIU ONE3 FIU FIU WSD FIU OT U OSC OSC OSC OCh fiber oxc l The typical scenario of protected OCh networking is as follows: ONE1 OSC ONE2 OSC OSC ONE4 F I U O T U O L P F I U WSD WSM F I U F I U ONE3 F I U F I U WSD WSM F I U F I U O L P O T U OSC OSC OSC OCh fiber oxc NOTE The source and sink of an OCh trail cannot be modified. By default. the wavelength information of the board port is displayed. Set the level to OCh and set the direction according to the specific networking. 3-55 . if you already select one end (source or sink) of a trail and open the NE Panel to select another end. Step 2 Set the level and direction of the service. Ltd. TIP l l During the selection of source or sink in the NE Panel. Issue 02 (2009-10-23) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. You can click the trail again. and port.. board.

including the name and ID. 2. the U2000 fine-tunes the optical power of the transmit end according to signal quality detected by the receive end. set the OPA Mode in the dialog box displayed and click OK. TIP You can filter other trails according to the source and sink of the new trail. The sign is displayed on the NE. Procedure Step 1 Choose Trail > WDM Trail Management from the Main Menu. An OCh trail must be created or searched out. In the WDM Trail Management user interface.3 Creating EAPE Objects The U2000 supports configuring the enhanced automatic power equalization (EAPE) for a trail. and select EAPE Management from the dropdown menu. click Maintenance. Step 9 Optional: Click Port Attribute. Choose Service > WDM Trail > WDM Trail Management from the Main Menu and select the proper filter criteria for the trails.2. Select filter criteria according to requirements. 3-56 Huawei Proprietary and Confidential Copyright © Huawei Technologies Co.. For a WDM service configured with the EAPE. Select a path and click OK. Step 8 Optional: Check the Activate the trail check box. A prompt is displayed. ----End Result 1. Step 2 Select a desired OCh trail. Double-click the NE again to cancel your selection. Click Close. The EAPE Management dialog box is displayed. 3. Step 10 Click Apply. find out that the trail is correctly created. Prerequisite l l You must be an NM user with "network operator" authority or higher. indicating that the operation was successful. Issue 02 (2009-10-23) . Ltd. This can improve the signal quality. Step 6 Optional: Click Specify Route Channel and the Specify Route Channel dialog box is displayed.3 End-to-End WDM Management iManager U2000 Operation Guide for WDM End-to-End Management Step 5 Optional: Double-click the other NE in the protection subnet to specify the NE that the route cannot pass through. Step 7 Click the General Attributes. set the basic trail attributes.

Ltd..2. an exceptional EAPE event is reported to and displayed on the U2000. l ----End 3. By default. NOTE l You need not configure the data of the EAPE objects. If the OLP dual fed board is available. a power adjustment board for the protection trail is required. when the OTU at the sink end detects the signal degrade. 3-57 . The U2000 automatically calculates and then applies the data to the sink NE. This event prompts the user to start EAPE adjustment so that the VOA at the source end finely tunes the optical power at the transmit end. Issue 02 (2009-10-23) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co.4 Starting EAPE Adjustment In the case of a WDM service configured with EAPE. This can enhance the signal quality. The data of the EAPE objects is not displayed in the user interface.iManager U2000 Operation Guide for WDM End-to-End Management 3 End-to-End WDM Management Step 3 Click New to create the EAPE management. the adjustment board nearest to the source is used.

Step 2 Select a desired OCh trail. The 15-min performance monitoring must be started on the sink NE.3 Managing Alarms on WDM Trails You can use the U2000 function of end-to-end trail management to manage the alarms generated on WDM trails at the network layer. Procedure Step 1 Choose Service > WDM Trail > WDM Trail Management from the Main Menu. Unequalized. The status can be Adjustment Not Required. ----End 3. The EAPE Management dialog box is displayed. Step 2 Select an OCh trail whose EAPE that you want to delete. The EAPE must be created. Select filter criteria according to requirements. Prerequisite l l You must be an NM user with "network operator" authority or higher. and select EAPE Management from the drop-down menu. The EAPE must be created. Step 3 If the Status is Can Be Adjusted. NOTE l l When the adjustment is finished. Being Adjusted. click Start Adjustment to start adjusting the EAPE. and select EAPE Management from the dropdown menu. Can Be Adjusted. click Maintenance.. Unequalized indicates that the optical power received by the sink end exceeds the threshold or the received signal degrades.2. Ltd. Procedure Step 1 Choose Service > WDM Trail > WDM Trail Management from the Main Menu. you can manually delete the EAPE. Status indicates the current adjustment status of the EAPE. Status changes to Adjustment Not Required. Step 3 Click Delete to delete the EAPE objects on the trail. The EAPE Management dialog box is displayed. Issue 02 (2009-10-23) . Select filter criteria according to requirements. 3-58 Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. or Not Specified. ----End 3.3 End-to-End WDM Management iManager U2000 Operation Guide for WDM End-to-End Management Prerequisite l l l You must be an NM user with "network operator" authority or higher.5 Deleting EAPE Objects When you need to activate a trail or the EAPE function on the trail is not required. Step 4 Repeat Step 1 to 3 to start the reverse adjustment. click Maintenance .

If you need to filter the trails in the list. 3-59 .3. Step 3 Select a desired trail. l l l If you need to filter all the trails. click Alarm. you can learn about faults on this trail to perform maintenance in a timely and effective manner. and choose Current Alarm from the drop-down menu.2 Viewing History Alarms of a WDM Trail By querying history alarms of a WDM trail. The current alarms on this trail are displayed in the window. 3. Step 2 The Set Trail Browse Filter Conditions dialog box is displayed. Procedure Step 1 Choose Service > WDM Trail > WDM Trail Management from the Main Menu. It manages all the WDM trails that have current alarms. ----End 3. Prerequisite You must be an NM user with "network monitor" authority or higher. Procedure Step 1 Choose Service > WDM Trail > WDM Trail Management from the Main Menu.3 Managing Networkwide WDM Alarm Trails in Real Time The U2000 can manage the networkwide WDM alarm trails in real time.3. the related trail is automatically removed from the user interface. you can learn about history faults on this trail and provide reference for maintenance of current faults. 3. Set the filter criteria and view the desired trails in the trail list.3. click Incremental Filter. Issue 02 (2009-10-23) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. Step 4 Perform maintenance according to the current alarms reported on this trail. If an alarm ends. Prerequisite You must be an NM user with "network monitor" authority or higher. click Filter All.3.. you can learn about history faults on this trail and provide reference for maintenance of current faults. Ltd. you can learn about faults on this trail to perform maintenance in a timely and effective manner. If you need to add to the list more trails that match the requirement. 3. Step 2 The Set Trail Browse Filter Conditions dialog box is displayed. click Secondary Filter. Set the filter criteria and view the desired trails in the trail list.1 Viewing Current Alarms of a WDM Trail By querying current alarms of a WDM trail.3.1 Viewing Current Alarms of a WDM Trail By querying current alarms of a WDM trail.iManager U2000 Operation Guide for WDM End-to-End Management 3 End-to-End WDM Management 3.2 Viewing History Alarms of a WDM Trail By querying history alarms of a WDM trail.

It manages all the WDM trails that have current alarms. Prerequisite l l You must be an NM user with "network monitor" authority or higher. Procedure Step 1 Choose Fault > Service Minitoring > Real-Time Faulty WDM Trail Management from the Main Menu. ----End 3. If you need to filter the trails in the list. Select the corresponding command from the drop-down menu to query or set the alarm data of each trail. Step 4 Learn about the history alarms reported on this trail to provide reference for maintenance of current faults. the alarm affected WDM trails that meet the criteria are displayed. click Incremental Filter. 3-60 Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. Step 3 In the Alarm Affected WDM Trails window displayed.3. Ltd.. click Print. 3. Step 2 Set the trail filter criteria and click Filter All. Step 5 Choose Alarm. The license for trail management must be available. Step 7 Optional: To print the trail information.3 End-to-End WDM Management iManager U2000 Operation Guide for WDM End-to-End Management l l l If you need to filter all the trails. The history alarms on this trail are displayed in the window. click Secondary Filter. click Filter All. Step 6 Optional: To query the performance data of a trail. To save the trail information. click Performance > Browse Performance. Step 4 Optional: Right-click the title of a parameter column and set the trail attributes to be displayed.4. If an alarm ends. click Save As. click Alarm. the related trail is automatically removed from the user interface. If you need to add to the list more trails that match the requirement. ----End 3.1 Querying Current Performance of WDM Trails You can find out the running status of the service carried by the WDM trails by querying the performance data. Step 3 Select a desired trail. Issue 02 (2009-10-23) .3 Managing Networkwide WDM Alarm Trails in Real Time The U2000 can manage the networkwide WDM alarm trails in real time. and choose History Alarm from the drop-down menu.4 Managing the Performance of WDM Trails You can use the network layer function of the U2000 to perform end-to-end performance management on WDM trails.

2 Browsing the History Performance of WDM Trails By querying the history performance data of a WDM trail.3 Setting Performance Monitoring Parameters of an WDM Trail Performance monitoring keeps a detailed record of the performance of services over a trail. you can learn about the running status of the services carried on the trail in a specific period in the past and provide reference for analyzing the current performance of this trail. click Incremental Filter. helping the maintenance engineer to monitor and analyze the states of services. Step 5 Optional: Click Filter. In the Filter dialog box.iManager U2000 Operation Guide for WDM End-to-End Management 3 End-to-End WDM Management 3. you can learn about the running status of the services carried on the trail in a specific period in the past and provide reference for analyzing the current performance of this trail. Procedure Step 1 Choose Service > WDM Trail > WDM Trail Management from the Main Menu. set the filter criteria and click OK.. Set the filter criteria and view the desired trails in the trail list. Issue 02 (2009-10-23) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co.4. click Secondary Filter. Step 2 The Set Trail Browse Filter Conditions dialog box is displayed.2 Browsing the History Performance of WDM Trails By querying the history performance data of a WDM trail. you can set performance thresholds based on a trail. 3. l l l If you need to filter all the trails. you can set the corresponding performance thresholds for the performance events and performance types on the source and sink of a trail. Perform the maintenance operation according to the current performance events. Ltd.4. 3.4. click Filter All. If you need to filter the trails in the list. ----End 3.1 Querying Current Performance of WDM Trails You can find out the running status of the service carried by the WDM trails by querying the performance data. click Performance and select Browse Performance from the drop-down list. Specifically.4 Setting WDM Trail Performance Threshold In this user interface. If you need to add to the list more trails that match the requirement. The qualified performance events are displayed. Prerequisite You must be an NM user with "network monitor" authority or higher. Step 3 Select a trail.4. Step 4 Click the 15-Minute Current Performance or 24-Hour Current Performance tab and query the latest 15-minute or 24-hour performance data of the trail. 3-61 .4. Prerequisite You must be an NM user with "network monitor" authority or higher. 3.

helping the maintenance engineer to monitor and analyze the states of services. If you need to filter the trails in the list. If you need to add to the list more trails that match the requirement. ----End 3. Step 5 Click Apply. Step 2 In the Set Trail Browse Filter Condition dialog box. Issue 02 (2009-10-23) . In the Operation Result dialog box displayed. Procedure Step 1 Choose Service > WDM Trail > WDM Trail Management from the Main Menu. Step 4 Click the 15-Minute History Performance or 24-Hour History Performance tab and view the history performance data. ----End 3-62 Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. In the Filter dialog box. click Performance and select Browse Performance from the drop-down list. The qualified performance events are displayed.4.. Prerequisite You must be an NM user with "network operator" authority or higher. click Filter All. and set the monitor status and auto reporting status.3 Setting Performance Monitoring Parameters of an WDM Trail Performance monitoring keeps a detailed record of the performance of services over a trail. Step 2 The Set Trail Browse Filter Conditions dialog box is displayed. Click Performance and choose from the drop-down menu. Click Secondary Filter to filter the trails that are already displayed. set the filter criteria and click OK. click Close. Step 4 In the dialog box displayed.3 End-to-End WDM Management iManager U2000 Operation Guide for WDM End-to-End Management Procedure Step 1 Choose Service > WDM Trail > WDM Trail Management from the Main Menu. Step 3 Select a desired trail. set the filter criteria and click Filter All. Step 5 Optional: Click Filter. select an monitored object. Click Incremental Filter to add newly qualified trails to the list without refreshing the trails that are already displayed. click Incremental Filter. Ltd. click Secondary Filter. l l l If you need to filter all the trails. Set the filter criteria and view the desired trails in the trail list. NOTE l l l Click Filter All to refresh and display all the qualified trails. Step 3 Select a trail.

double-click Threshold Value to change the performance threshold value. The trail must be created. Procedure Step 1 Select Service > WDM Trail > WDM Trail Management from the main menu. Prerequisite l l You must be an NM user with "network monitor" authority or higher. Click Incremental Filter to add newly qualified trails to the list without refreshing the trails that are already displayed. set the filter criteria and click Filter All. ----End Issue 02 (2009-10-23) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co.4. Click Performance and choose Performance Threshold from the drop-down menu. Step 4 In the Performance Threshold window. 3-63 . Click Secondary Filter to filter the trails that are already displayed.4 Setting WDM Trail Performance Threshold In this user interface. you can set the corresponding performance thresholds for the performance events and performance types on the source and sink of a trail. Specifically. Step 3 Select one or more trails.iManager U2000 Operation Guide for WDM End-to-End Management 3 End-to-End WDM Management 3. Ltd. NOTE l l l Click Filter All to refresh and display all the qualified trails. Step 2 In the Set Trail Browse Filter Condition dialog box.. you can set performance thresholds based on a trail.

.

Ltd. N.. U. Q. E. C. X Issue 02 (2009-10-23) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. B. O. D. A. M. V. G. A-1 . W. R. P. I. H.iManager U2000 Operation Guide for WDM End-to-End Management A Glossary and Abbreviations A Glossary and Abbreviations Glossary and abbreviations are listed in an alphabetical order. L. F. S. T. Numerics.

12. X16.4. MR4. The addresses listed in the ACL are used for authentication. TXC. X64. the operation reliability is improved. When both the cross-connect boards are in position.1 Numerics 2-channel Add/Drop Unit 2xGigabit Ethernet Unit 32-channel Demultiplex Unit 32-channel Multiplex Unit 40-channel Demultiplexing Unit 40-channel Multiplexing Unit 2-channel Add/Drop Unit 2xGigabit Ethernet Unit 32-channel Demultiplex Unit 32-channel Multiplex Unit 40-channel Demultiplexing Unit 40-channel Multiplexing Unit 40-channel 40-channel Multiplexing Unit With VOA Multiplexing Unit With VOA 4xSTM-1/4 Multiplex Optical Wavelength Conversion Board 4xSTM-1/4 Multiplex Optical Wavelength Conversion Board A. MR8 and MB2 bear the wavelength directly adding/dropping services.2 A Access Control List Access Control List (ACL) is a list of IP address. 5 . ACE ACL Active/standby switching of crossconnect board Add/drop wave band Add/drop wavelength ADM A-2 Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. the one inserted first is in the working status. the board power supply fails or the board hardware operation fails. Adaptive Communication Environment. XC4.8 and 9 . DTD. When the active cross-connect board fails in self-test. and a wave band bearing the added/dropped services is called add/drop wave band. Issue 02 (2009-10-23) . XC1. etc. If the ACL for the user is not null. XCS. Ltd. Unplug the active board. A wavelength group is called a wave band. A board like MB2 divides the wavelength resources into such fixed wavelength groups as 1 . the standby one will run in the working status automatically.. In the OADM equipment.A Glossary and Abbreviations iManager U2000 Operation Guide for WDM End-to-End Management A. Add/Drop Multiplexer. MR3. the standby cross-connect board can automatically take the place of the active one. See Access Control List If there are two cross-connect boards on the SDH equipment. the boards MR2. AXCS and STG boards all support active/standby switching. GTC. which are in hot back-up relation of each other. the board is pulled out. it indicates that the address where the user logged in is contained in the list.

Alarm Alarm correlation analysis Alarm correlation rules It refers to the rule of processing alarm1 and alarm2 under certain conditions. there are three indicators with different colors indicating the current status of the NE: Green indicator on: The NE is powered on. After a recovery alarm is received. and whether the alarm information is displayed and saved is decided by the status of the alarm filter. Alarm hold-off time Alarm indication Issue 02 (2009-10-23) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. Orange indicator on: A general alarm is generated.iManager U2000 Operation Guide for WDM End-to-End Management A Glossary and Abbreviations AIS AIS insertion Alarm Indication Signal. AIS is inserted in this channel to indicate it is unavailable. If there are excessive errors in a channel.? (2) Alarm1 occurs in the service upstream of alarm2. but is monitored on the NE. Ltd. the status of the corresponding alarm changes to cleared. A-3 . An alarm with the filtering status set to "Filter" is not displayed and saved on the NMS. you can either mask the alarm or raise the level of alarm2 according to the behavior defined in the alarm correlation rule. An alarm is not regarded as being generated until the NE has been detecting it for a period of time. Such conditions are supported as follows:(1) Alarm1 and alarm2 occur on the same object. B2 and B3 bytes. it can be set whether to insert AIS when there are excessive errors in BIP-2.? (3) Alarm1 occurs at the opposite service end of alarm2. Alarm delay includes starting delay and stopping delay. Alarm filtering Alarms are detected and reported to the NMS system.? The following actions are supported at present:(1) Alarm1 masks alarm2. which affects the result of alarm correlation analysis. Set it with caution. and this period of time is the alarm end hold-off time. For a line board. In case alarm2 is generated within five seconds after alarm1 is generated. and this period of time is the alarm start hold-off time. For tributary board at the E1/T1 level. it can be set whether to insert AIS when there are excessive errors in the B3 byte.? (2) Raise the level of alarm2The alarm correlation rule is the basis for alarm correlation analysis. An alarm is not regarded as being ended until the NE has been detecting the ending of it for a period of time. and it complies with the conditions defined in the alarm correlation analysis rule. You can stop the NE alarm indication through the NMS. Red indicator on: A critical alarm is generated. For tributary board at the E3 level or higher. Each alarm corresponds to a recovery alarm. Such a process is called alarm correlation analysis. it can be set whether to insert AIS when there are excessive errors in the B1. On the cabinet of an NE. Setting the hold-off time can avoid the generation of unnecessary alarms due to misreport or jitter. A message reported when a fault is detected by a device or by the network management system during the process of polling devices..

? When the alarm inversion mode of the NE is set to automatic recovery. and the alarm inversion state of the port is set to Enabled. There are three alarm inversion modes: normal. For the port that has already been configured but not actually loaded with services. The alarm inversion status of the port will automatically recover to "not inverse" after the alarm ends. When the alarm inversion mode of NE is set to no inversion. this function can be used to avoid generating relevant alarm information. the equipment will report an alarm. minor. thus preventing alarm interference. The threshold can be divided into crossing threshold and defect threshold. thus preventing alarm interference.? Under wrap mode. revertible and non-revertible.? (2) Manual restoration mode: If the NE alarm inversion mode is set to manual restoration. new alarms will be discarded when the alarm register in NE is full. Alarm severity is to identify the severity of an alarm or event. automatic recovery and manual recovery) setting of the NE and the alarm inversion status (Enable and Disable) setting of the port. whether the port is automatically restored to the normal status depends on the alarm inversion mode of this NE. There are six alarm types as following: Communication: alarm indication related with information transfer. When the bit error reaches a specific limit. major. then the alarm of the port will be suppressed. After the service is accessed or the fault is removed. how the inversion status of the NE port is set will not affect alarm reporting of this port. it will not be restored to the normal status automatically and manual restoration is required. Via the ALC function of each node. it fulfills optical power control on the line that contains the link. Alarm mask means not monitoring the alarm event of a specific object. Issue 02 (2009-10-23) . after the NE port set to the inversion status accesses services or the fault is removed. usually generated by a sensor Security: alarm indication related with security See Automatic Level Control The ALC link is a piece of end-to-end configuration information. if the alarm inversion status of the port is set as Enable.? The object here may be the networkwide equipment.. Classification of alarms with different attributes. Processing: alarm indication related with software or information processing Equipment: alarm indication related with equipment fault Service: alarm indication related with QoS of the equipment Environment: alarm related with the environment where the equipment resides. which exists in the equipment (single station) as an ALC link node.A Glossary and Abbreviations iManager U2000 Operation Guide for WDM End-to-End Management Alarm inversion For the port that has already been configured but has no service. a specific board and even a specific functional module of a specific board. this function can be used to avoid generating relevant alarm information. Ltd. Alarm inversion mode Alarm mask Alarm severity Alarm storing mode alarm threshold Alarm type ALC ALC link A-4 Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. alarms of the port will be reported as usual no matter whatever the inversion status of the port is. the earliest alarms will be deleted and new alarms will always be saved when the alarm register in NE is full.? When the alarm inverse mode of the NE is set as "not automatic recovery". it will be restored to the normal status automatically and an event is reported. It is divided up into four levels: critical.? (1) Automatic restoration mode: If the NE alarm inversion mode is set to automatic restoration. after the NE port set to the inversion status accesses services or the fault is removed.? Under stop mode. a specific NE. There are two modes for saving alarms: stop and wrap. The alarm report condition of the NE port is related to the alarm inverse mode (not inverse. the alarm of the port will be reported.? (3) Not-to-invert mode: If the NE alarm inversion mode is set to not-to-invert. and warning alarm. This limit is the bit error alarm threshold.

which corresponds to the equipment.. Automatically Switched Optical Network Asynchronous transfer An electronic digital data transmission technology. Automatic laser shutdown Automatic Level Control Issue 02 (2009-10-23) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. ATM is designated by mode the ITU-T as the transfer and switching mode for B-ISDNs. A technique (procedure) to automatically reduce the output power of optical amplifiers to avoid exposure to hazardous levels. the test function can be manually started immediately (by clicking ) without the off time. the laser will be shut down again after continuous light emitting after a certain period of time (continuously on time). In the laser shutdown period. SC1/SC2 and MS2 boards. Report the alarm to the NMS as soon as it is generated at the equipment side. the laser will be turned on again and starts working normally. the laser will start automatically every other a period of time (off time) to test whether the line is normal. Ltd. Automatic Optical Power Equalization Automatic Protection Switching.1 ASON ALC functional unit. In June 1992. Auto-negotiation Automatic alarm report Automatic alarm synchronization The rate/work mode of the communication party set as self-negotiation is specified through negotiation according to the transmission rate of the opposite party. The user in the acknowledgement information is "Automatic Acknowledgment". The NMS can automatically acknowledge all unacknowledged alarms before the specified days at 3:00 AM every day. achieves the ALC function through the coordination among the VOA. The on and off time of the laser during automatic test can be set on the NMS . If yes. In shutdown period. See Automatic laser shutdown Alternate Mark Inversion.iManager U2000 Operation Guide for WDM End-to-End Management A Glossary and Abbreviations ALC node ALS AMI AMI code APE APS ASN. Abstract Syntax Notation One. If no. The NMS pops up the alarm panel.? The ended alarm that has been acknowledged will become the history alarm. called monitoring connections (APS VPCs). Its service life can be prolonged by decreasing the on time of the laser. Automatic Level Control. the whole VPG will switch over to quicken the ATM protection switching (as quick as the protection switching of the SDH layer. Because of its high flexibility and support for multimedia services. ATM See Asynchronous transfer mode ATM protection group It refers to the logically bound ATM VP network/sub-network connections that share the same physical transmission channel. If the monitoring connections switch over. a pair of VP connections (working connection and its protective connection) is used for monitoring the automatic protection switching. Automatic laser shutdown means that automatic laser shutdown is permitted when the optical interface board does not bear services or the optical fiber is faulty. A-5 . The user can view this alarm information in the alarm panel without active query. WBA. The NMS will test whether the service over the fiber is restored to normal. Alternate Mark Inversion code. In the VP Group (VPG). ATM is considered as the key to implementing broadband communications.

designating one bind number to identify the VC4s of the same virtual cascaded payload is called "bind". of which the payload bandwidth is 90M. the TDA board is adopted to sent the signals to the TDA boards of other stations via fibers. It is introduced for the use of the routing and convergence functions in the future. The bind ID is of 1-24 characters. The VC Trunk is an entity between the Ethernet port and the 2M path. Ltd. thus damaging the quality of the transmitted information. Backbone WDM System BIOS Bit error BITS BML Bound path Broadcast service BWS A-6 Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. On the same ET1 board. On the same NE. either point-to-point private line connection or point-to-multipoint broadcast connection.3 B BER Binding Basic Encoding Rules In virtual cascaded payload configuration. Broadcast service is a wide application of the TDA board. the line board will detect SD (signal deterioration) or SF (signal failure) condition and then report it to the SCC board that will generate K byte and send it out via the line board according to APS protocol. The number of VC12s assigned to each VC Trunk are configurable. one VC Trunk can be configured with up to 48 VC12s. Fault restoration. with the corresponding bandwidth as 100M. judged. For example. Basic Input/Output System Bit error means that an error occurs to some bits in the digital code stream after being received. As in the networking application one ET1 board can provide 48 VC12s at most. the bind IDs of the same virtual cascaded payload on the passed NE can be different. one VC12 can be assigned to only one VC Trunk. the bind ID is unique. The specific configuration is dependent on the bandwidth that users need. and send the received signals to the wireless paging transmitters for further transmission. Building Integrated Timing Supply System Business Management Layer The VC Trunk refers to the 2M paths which are bound together to transmit the Ethernet data. Each ET1 has eight Ethernet ports and each ET1 board can be configured with up to 16 VC Trunks. After switching restoration time. If a fault occurs to one of the bound services. and regenerated. Issue 02 (2009-10-23) . and send command to XCS board to perform the switching of payloads. in a paging center. However.A Glossary and Abbreviations iManager U2000 Operation Guide for WDM End-to-End Management Automatic switching When a fault occurs to the line. The unidirectional services from one service source to multiple service sinks are called the broadcast service. Auxiliary Equipment AUX A.. The line boards of other nodes will report it to the SCC board after receiving K byte. Finally SCC board will specify the switching status of the node according to protocol. all bound services will switch as a whole. Since the tone interface provided by the TDA board does not contain such call and control signals as ringing current and signaling. it is only applicable to the semi-permanent connection between the equipment with the tone interface. this protection sub-network will switch to the working route and resume normal working status.

CoS is even more important. the register storing the earliest history data will be overwritten.. If the history registers are full. CoS keeps the priority mapping rules. It works in internal ports. It changed within the monitor period. especially when there is congestion. A-7 . which includes the single-user mode and multi-user mode.? (2) History register: The 15-minute history register (16 pieces) or 24hour history register (6 pieces) is a first-in-first-out queue. etc) transporting Ethernet services have the same server trail. Ltd. The network administrator needs to customize custom views and select managed network entities from the main topology view. The service with higher priority is processed first and the service with lower priority is discarded when the bandwidth is insufficient.? (2)24-hour register: Accumulates the performance event data within 24 hours Each type of register can be further divided as follows:(1) Current register: The current 15-minute register or current 24-hour register (only one for each) is applied to collect the performance data in the current monitoring period.? The typical configuration data includes board configuration. A subset of the main topology view. cascade service.4 C CAR CC CDE Charging zone Class of Service Committed Access Rate Continuity Check Common Desktop Environment The time zone between the start time and end time of charging. It means that several SDH end-to-end trails (such as VC12. the NE provides two types of registers:(1) 15-minute register: Accumulates the performance event data within 15 minutes. or cleared but unacknowledged. Cyclic Redundancy Code. Common Object Request Broker Architecture. The services at different levels are processed according to the corresponding priorities. VC3. The login mode of a client. For each performance parameter of each performance monitoring entity. which contains network entities such as NEs. An alarm that is uncleared and unacknowledged. Coarse Wavelength Division Multiplexing Client mode Concentrated routing Ethernet trail Configuration data CORBA CoS CRC CRC Current alarm Current performance data Custom View CWDM Issue 02 (2009-10-23) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. the NMS or submaps.iManager U2000 Operation Guide for WDM End-to-End Management A Glossary and Abbreviations A. the login mode is the multi-user mode. Configuration data is the instruction file of NEs. uncleared but acknowledged. It refers to the data that configures the NE hardware for coordination between this NE and other NEs in the entire network and operation of specified services. See Class of Service Cyclic Redundancy Check. clock configuration and protection relationship. By default. and it is the key for efficient network running. Class of Service. VC4.? The performance data stored in the current register is called current performance data.

See Data Communication Channel Data Communication Network. The DCC channels that are composed of bytes D1-D3 is referred to as the 192 kbit/s DCC-R channel. After successfully deleting it. network level. management. After deletion. the SDH NNI becomes an isolated node and has no effect on service. and then search the trail in the trail view to create the original service. side Device set It is an aggregate of multiple managed equipments. Digital Distribution Frame Digital Data Network. device type.. DGE Discrete service A-8 Huawei Proprietary and Confidential Copyright © Huawei Technologies Co.? A deleted protection sub-network cannot be restored but can be reestablished. After creating the isolated node as SDH NNI again. which can be uploaded on the NMS and then saved in the NMS. It is the NE configuration data saved on the SCC board of the OptiX equipment. Dynamic Gain Equalizer The cross-connection that exists on an NE but cannot form trails on the network management system. The service that uses the F1 byte or some undefined bytes to transmit information such as call charge. Delete the logical systems of the protection sub-network and the NE and delete all the related services. The command is not sent to NE and has no effect on the service. After configuring. thus eliminating the need to set the operation authorities over these devices respectively. The data channel that uses the D1-D12 bytes in the overhead of an STM-N signal to transmit information on operation. etc. The data interface service works in point-to-point mode. Data interface service Data on NE DCC DCN DDF DDN Delete protection subnetwork at network layer Delete protection subnetwork on NE side Delete SDH NNI at network layer Delete SDH NNI on NE Delete the SDH NNI and all its service directly. the SDH NNI can be found again in the trail view. Issue 02 (2009-10-23) . Ltd. network management system information and power supply monitoring. The other DCC channel that are composed of bytes D4-D12 is referred to as the 576 kbit/s DCCM channel.A Glossary and Abbreviations iManager U2000 Operation Guide for WDM End-to-End Management A. such functions as deleting optical fiber and re-uploading NE data are available. search the protection sub-network again. Delete the association between the logical systems of the protection sub-network and the NE .5 D D32 D40 Data Communication Channel 32-channel Demultiplex Unit 40-channel Demultiplexing Unit Data Communications Channel. If some operation authorities over one device set are assigned to a user (user group). and can not resume them later. maintenance and provision (OAM&P) between NEs. these operation authorities over all devices of the device set are assigned to the user (user group). It is suggested to design device set according to such criteria as geographical region.? Device set facilitates the authority management on devices in the management domain of the NMS.

As one type of power and environment monitoring unit. It functions to implement virtual optical path protection. However. Issue 02 (2009-10-23) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. If the original disk fails. Moreover. as per VC4. smoke alarm. specific regulations on the protection mode for the inter-ring service are made in G. into different protection sub-networks. VC4. cascade service.? For example.. fire alarm. in this mode. and like disk duplexing. in an STM-16 fiber. and protection fails in the case of interconnection node failure. Dual Node Interconnection Dual node interconnection is an architecture between two rings where two nodes in each ring are interconnected. It means that several SDH end-to-end trails (such as VC12. Element Management System. services can also be protected Destination (signalling) Point Code Dynamic Random Database Digital Signal. It means that some of the VC4s over the fiber can be put into one protection sub-network. in case of fiber failure or node failure.6 E EGT EML EMS Environment Monitor Unit Gigabit Ethernet Transparent Transmission Board Element Management Layer. Disk mirroring pairs multiple hard disks on the same channel. such as the power supply and temperature. the change of environment can be monitored timely and accurately. The former can be protected in line protection mode. writes data to both the original and secondary disk. VC3. burglary alarm. EMU is installed on the top of the equipment cabinet to monitor the environment variables. by adopting the recommended protection modes. Division as per VC4 means that different timeslots in a fiber belong to different protection sub-networks. Disk mirroring cannot protect against failures that occur along the channel between the disks and the NetWare server. because the duplicate disks exist on the same channel. can be monitored as well. while the 5th to 8th VC4s belong to another unprotected link. The two interconnections between the two rings can be arranged to provide protection of the traffic crossing from one ring to the other. Assign timeslots. etc.iManager U2000 Operation Guide for WDM End-to-End Management A Glossary and Abbreviations Disk Mirroring A procedure that involves duplicating data from a NetWare partition on one hard disk to the NetWare partition on another disk. With external signal input through the relay. Ltd. therefore. With the display on NMS system. the 1st to 4th VC4s belong to an STM-4 unprotected ring. A-9 . Level n Dispersion Slope Equalizer Dense Wavelength Division Multiplexing Dispersed routing Ethernet trail Division as per VC4 DNI DNI DPC DRDB DS-n DSE DWDM A.? 842 Recommendation. protection is only valid for fiber and optical transmitting/receiving ports. the secondary disk automatically takes over. The service between ring networks can be classified into the Single Node Interconnection (SNI) mode and the dual node interconnection (DNI) mode. It regulates the protection modes of the two interconnection nodes both on a MSP ring or a PP ring. etc) transporting the Ethernet service have different server trails. In the latter mode. the protection of the interconnecting service between two ring networks composed of the devices of different manufacturers and in different protection modes can be realized.

path protection. The command is issued and the responses are checked. to-be-received J2. path impedance. the protection capability of the SDH can be fully used. different users can be differentiated in the same 10M/100M signal so as to manage the bandwidth.? The ET1 board can perform bandwidth separation and management for users in VLAN mode. etc).. the VLAN-based port bandwidth sharing and statistical multiplexing can be realized. The processing board and wire led-out board are separated in the Ethernet interface unit. path phase lock. each network port can also be mapped into 1 to 48 2Ms. they have the following functions: 1.A Glossary and Abbreviations iManager U2000 Operation Guide for WDM End-to-End Management EPL EPLAN ESCON ET1 board Ethernet Private Line Ethernet Private LAN Enterprise System Connection The ET1 (Ethernet Transparent Transmission Unit) has eight 10M/100M standard Ethernet interfaces (in compliance with the IEEE 802. Support port full duplex and half duplex. The command is issued and the responses are checked. Provides the single-mode/multimode optical interface. tobe-sent J2. path service type. Ethernet Virtual Private Line Ethernet Virtual Private LAN Exercise switching is used to test whether a switching protocol can work normally and no switching operation is really conducted. now it only needs to replace or add the corresponding wire led-out board. VC4. In this way. input type equalization. Ethernet end-to-end trail Ethernet interface board EVPL EVPLAN Exercise switching Exerciser .? 3 recommendation). As the Ethernet service outlet board of the Ethernet transparent transmission interface unit. retiming work mode. code pattern. VC3. Support the access of four 100BaseFX Ethernet services (EFF4 board).? The ET1 board has two types of interface boards: ETF4 and EFF4. if the 100M optical interface is to be used or more network interfaces are to be added for example . ser It is the MAC port to MAC port Ethernet service transparent transport trail provided by multiple SDH end-to-end trails (such as VC12. Besides. Therefore. This command exercises ring protection switching of the requested channel without completing the actual bridge and switch. Its applications are as follows:(1) The ET1 board can map the Ethernet frames of 1 to 8 10/100Base-T ports into 1 to 48 2Ms. when different interfaces are needed. which is usually used to NE distinguish different network segments in a WAN.Ring Exerciser . SXT work mode. A-10 Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. Support the access of four 10/100Base-T Ethernet services (ETF4 board). cascade service.? (3) As the Ethernet frames are mapped into N 2Ms (N=<48) and transmitted in the same point-to-point mode as the SDH. 2. Issue 02 (2009-10-23) . It not only saves costs for users but also facilitates the upgrade and maintenance. This command exercises span protection of the requested channel without completing the actual bridge and switch.? Where. An extended ID and an ID form the physical ID of an NE. but no working traffic is affected. but no working traffic is affected. Support the port self-adaptation function. Ltd. The board attributes include tributary loopback. Support the automatic shutdown function of multimode optical interface.Span Extended IP address of It is the serial number of a sub-network where an NE resides.

the fiber/cable is of optical fiber type..7 F F1 byte It is the user path byte. the logical systems at the two ends should be configured as TM. which is reserved for the user but usually it is special for network providers. But in the process of practical engineering installation. It refers to the physical entities that connect the transmission equipment. we name it extended protection subnetwork.? Then.Performance Management. another protection sub-network is needed to support the incomplete protection sub-network. They are the path user channel bytes.Accounting Management. There are many Internet sites that have established publicly accessible repositories of material that can be obtained using FTP. For a chain protection sub-network. They belong to the higher order path overhead byte. we name it extended protection sub-network. The optical fiber transmits optical signal. FTP is a special way to log in to another Internet site for the purposes of retrieving or sending files. carry transmission objects (user information and network management information) and perform transmission function in the transmission network. deleting it and deleting it from network layer but creating it. The fiber/cable between SDH NEs represents the connection relation between NEs. The end-point NEs of a link is of the ADM type. A very common method of moving files between two Internet sites. with the service not to be restored automatically.? The fiber/cable between NEs represents the optical fiber connection or cable connection between NEs. As this type of protection subnetwork can be extended. F3 bytes FCAPS FD FDB FEC fiber/cable File Transfer Protocol Forced switch Issue 02 (2009-10-23) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. As it is can be extended. but the service on it needs activating gradually during project building.Configuration Management. It is mainly used to provide the temporary data/voice path for special maintenance Objectives. A-11 . with only the one in the middle configured as ADM. This switch occurs regardless of the state of the protection channels or boards. It belongs to the regenerator section overhead byte. the user should delete it from network level and search for protection sub-network and trail once more. This function forces the service to switch from the working channel to the protection channel.Security Management Frequency Diversity Flash Database Forward Error Correction Fiber & Cable is the general name of optical fiber and cable. Ltd.iManager U2000 Operation Guide for WDM End-to-End Management A Glossary and Abbreviations Extended protection subnet An unprotected chain like ADM-ADM-TM or ADM-ADM-ADM. F2. A. When the new equipment arrive. The NMS can support searching for it. These two bytes provide the user with the communication between path units related to payload. Thus the part of no protection line is not available. At this time. while the cable transmits electrical signal. the networking equipments at the bottom layer may arrive in different batches. Fault Management. unless the protection channels or boards are satisfying a higher priority bridge request.

A Glossary and Abbreviations

iManager U2000 Operation Guide for WDM End-to-End Management

Forecast laser performance

It is to forecast the laser performance within a certain period of time on the basis of the collected laser performance data and according to a certain performance model so that you can replace the laser in time if necessary.? The forecast can be roughly divided into two types: 1. Forecast the bias current, input optical power and output optical power at a moment in future; 2. Forecast the period of time which is taken for the bias current, input optical power and output optical power to reach the specified value. See File Transfer Protocol The system that can transmit information in both directions on a communication link.On the communication link, both parties can send and receive data at the same time. In the full searching mode, all the trail information at the NM side will be deleted first (but the service configuration information of respective NEs is saved at the NM side). Then the service configuration information of respective NEs at the NM side is researched to form the trail information in the network. In the full search mode, all the trail information on the NM side will be deleted first (Only the trail information at the network layer on the NM side are deleted, while the service configuration information of NE in NE layer on the NM side and on the NE side still remain). Then the service configuration information of respective NEs in the NE layer on the NM side is re-searched to form the trail information in the network layer on the NM side.

FTP Full duplex Full mode

Full search

A.8 G
Gateway ID Gateway NE A gateway ID refers to the ID of an NES serving as a gateway. Gateway NE refers to the NE that communicates with the NMS via Ethernet or serial port line. The non-gateway NE communicates with the gateway NE via ECC and communicates with the NMS via the gateway NE. The gateway NE is a communication route that the NMS must pass through when managing the entire network. The communication status between the gateway NE and the NMS can be:(1) Normal: The current communication is efficient;? (2) Connecting: The destination gateway responds, and the communication is interrupted but is being connected;? (3) Disconnected: The destination gateway does not respond (Maybe the network cable is disconnected or not within the same network segment), and the communication is unreachable or the gateway is disabled manually. Global Cluster Manager Gigabit Ethernet. Gate Network Element Graphical User Interface.

GCM GE GNE GUI

A.9 H
HA Half duplex History Alarm High Availability. On the communication link, only one party can send data, while the other party can only receive data. An alarm that is acknowledged and cleared.

A-12

Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd.

Issue 02 (2009-10-23)

iManager U2000 Operation Guide for WDM End-to-End Management

A Glossary and Abbreviations

History performance data

For each performance parameter of each performance monitoring entity, the NE provides two types of registers:(1) 15-minute register: accumulating the performance event data within 15 minutes;? (2) 24-hour register: accumulating the performance event data within 24 hours.? Each type of register can be further divided as follows:(2) Current register: The current 15-minute register or current 24-hour register (only one for each) is applied to collect the performance data in the current monitoring period. It changes within the monitor period.? (2) History register: The 15-minute history register (16 pieces) or 24hour history register (6 pieces) is a first-in-first-out queue. If the history registers are full, the register storing the earliest history data will be overwritten.? The performance data stored in the history register and the auto-report performance data saved on the NM are called history performance data in a unified way. The hotline phone number can be called immediately by picking up only, but not by dialing. Hot-Standby Hyper-Text Transmission Protocol

Hotline phone HSB HTTP

A.10 I
Idle resource optical NE When the NMS is started successfully, an NE icon called "Idle ONE" will be displayed on the topological view.? In this NE, the subracks and boards that are not divided to other optical NEs (such as OTM, OADM and other NEs) are retained. In this NE, idle DWDM subracks and boards are reserved, which can be distributed to other ONEs. Double-click the NE icon to view all the currently idle DWDM subracks or boards in the network. Internet Group Management Protocol. Inverse Multiplexing for ATM. Integrated Management Application Platform. In this search mode, the network management system first reserves the trail data of the current client and then re-searches the service configuration data of respective NEs on the network management system according to the newly given search condition to form the new trail data and combine it with the original trail data to get the result. The incremental mode means to compare the trail information of the NM side with the service configuration information of respective NEs at the NMS side. If inconsistent, the trail information will be fed back into the list as an "Inconsistent Trail". When the user has deleted the inconsistent trail information, the system will re-search for the service configuration information of the NMS side which has not formed the trail information. The increment search mode means to compare the trail information in network layer on the NMS side with the service configuration information of respective NEs on the NMS side. If they are inconsistent, the trail information will be fed back into the list as an "Inconsistent Trail". When the user has deleted the inconsistent trail information, the system will re-search for the service configuration information that has not formed the trail in the NE layer on the NMS side.

IGMP IMA iMAP Incremental filtering trail

Incremental mode

Incremental search

Issue 02 (2009-10-23)

Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd.

A-13

A Glossary and Abbreviations

iManager U2000 Operation Guide for WDM End-to-End Management

Inter-board wavelength path protection

The optical wavelength inter-board channel protection is mainly implemented by the SCC judging the alarm report in the line of the wavelength conversion board to turn off the laser in the tributary of the board. The dual fed is implemented by adding a passive optical splitter to the tributary. The signal selection is implemented by the SCC turning off the laser in the tributary with poorer signal quality according to the signal quality of the lines of two wavelength conversion boards, and letting the channel of light with higher quality pass through the coupler. The coupler is also a passive device and only one channel of light can pass through it. If there are two channels of light passing through the coupler, they will interfere each other that would cause bit error to the service. Therefore, it is necessary to ensure that only the channel of light with higher quality pass through the coupler at a destined time. It refers to the equipment used for optical fiber management and dispatch in the metropolitan area. It has multiple pairs of interfaces for the optical fiber connection. Every two interfaces in a pair are connected with each other to form a longer physical optical fiber path. The physical optical fiber path connecting the transmission equipment can comprise two or more sections of optical fiber cascaded via the intermediate office. There is an intermediate office information list for some fiber & cable connections, which shows the section information about the fiber & cable. The intra-board optical wavelength path protection is mainly implemented by the wavelength conversion board with dual fed and signal selection function. The dual fed is implemented by the optical divider inside the board, while the signal selection is implemented by the board turning off the laser of one of the receiving optical interfaces. Therefore, this protection mode is also called optical wavelength intra-board channel protection. The switching in this protection mode can be completed within a short time, but the services must be interrupted during the maintenance of the damaged boards or devices. Therefore this protection mode will have a relatively lower reliability. Intelligent Optical Network Internet Protocol. In the TCP/IP protocol, it is used to uniquely identify the 32-bit address of the communication port, An IP address consists of a network ID and a unique host ID. An IP address consists of the decimal values of its eight bytes, separated with periods; for example,192.168.7.27. Intelligent Power Adjustment Integrated Services Digital Network. A type of special NE or an optical port on an NE. An isolated node does not refer to an isolated NE, instead, it refers to a type of special logical system which does not belong to any protection sub-network or SDH NNI.? It is the node that has been configured on the NE side but cannot form (or has not formed) a corresponding protection sub-network with other nodes. This node may be either an NE or a logical system on the NE.? An isolated node may be formed when:(1) There is something wrong with the configuration information of the NE side;? (2) The fiber/cable connected to this node has not been created on the NMS.? The sub-network where this node resides is of unprotected type. Interleaver Unit International Telecommunication Union-Telecommunication Standardization Sector

Intermediate office

Intra-Board optical wavelength path protection

ION IP IP address

IPA ISDN Isolated node

ITL ITU-T

A-14

Huawei Proprietary and Confidential Copyright © Huawei Technologies Co., Ltd.

Issue 02 (2009-10-23)

It is to divide the NE into the configuration module. this function disables the service from being switched from the working channel to the protection channel. When the switching condition is satisfied. that is a media access control port. A-15 . alarm module. such as the 8 ports of ET1.12 M M32 M40 MAC port Issue 02 (2009-10-23) 32-channel Multiplex Unit 40-channel Multiplexing Unit Media Access Control. the services are not switched back to the working board or channel. When the service has been switched. disabling other NM clients from setting the locked modules. performance module and other modules. Services are not switched to the protection board or channel when a fault occurs.11 L LAN LCAS LCD LCT LDG LLID Lock NE login Lock NE setting Local Area Network. after the working board or channel recovers to normal.? You can lock the setting function of these modules. the function enables the service to be restored from the protection channel to the working channel. Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. NE logical systems and their logical protection relation will be generated when defining the NE logical system relation LOS LPT LQS LSP LWC LWF LWM LWS LWX Loss Of Signal Link-state Pass Through 4xSTM-1/4 Multiplex Optical Wavelength Conversion Board Label Switching Path STM-16 Line Wavelength Conversion Unit STM-64 Transmit-receive Line Wavelength Conversion Unit With FEC Multirate Optical Wavelength Conversion Unit STM-64 Transmit-receive Line Wavelength Conversion Unit With FEC Arbitrary Bit Rate Wavelength Conversion Unit A. Link Capacity Adjustment Scheme Liquid Crystal Display Local Craft Terminal 2xGigabit Ethernet Unit Locate Loopback ID This function prohibits the users at lower levels from logging in NE and forces logged NE users with lower level to log out..iManager U2000 Operation Guide for WDM End-to-End Management A Glossary and Abbreviations A. if currently no switching takes place. Lock status Lock Switching Logical system relation It is to set the logical protection relation of two linear multiplex section types. Ltd. If currently the switching takes place.

NE will not monitor the corresponding alarm conditions and the alarm will not occur even when the alarm conditions are met. for example. dedicated MS protection ring and shared MS protection ring. It presently supports that three protection trails protect one service trail. Managed Object. services are manually switched from the working channel to the protection channel. Mean Time to Recovery.A Glossary and Abbreviations iManager U2000 Operation Guide for WDM End-to-End Management Manual switching When the protection channel is efficient and there is no higher-level switching request.? including linear 1+1 MS protection switching link. Under suppression status. The node is unique on the ALC link. It supports either the protection trail passing the line board or the protection trail passing the tributary board. MOdulator-DEModulator.? It supports the trails other than the optical ones. Monitor A logical port which achieves transparent transmission of the MAC service over SDH. Ltd.? This protection mode supports protecting important services through non-optical network trails. such as microwave. the 16 ports of the ET1. Managed Object Instance Tree. linear 1:n MS protection switching link. to provide protection. Man-Machine Language.? At the trail sink. Issue 02 (2009-10-23) . It is a protection mode in which multiple services with different trails but with the same sink protect an important service with the same sink. thus testing whether the network still has the protection capability. Bandpass Filter Expandable 2-Channel Optical Add/Drop Multiplexing Board Multi-channel Spectrum Analyzer Unit Memory Database Medium Dependent Interface Message Dispatch Process Manager Management Information Base. Masking status MB2 MCA MDB MDI MDP Mgr MIB MML MO MODEM MOIT MON MP port MPLS MR2 MS MS node MSP MTBF MTTR Multi-trail protection service Multiplex section protection A-16 Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. a microwave trail. Multi-Protocol Label Switching 2-channel Add/Drop Unit Multiplex Section The WDM network node that has the spectrum analysis unit in the link for which the ALC function is configured. for example.. it monitors the quality of protection trail signals and protects important services according to the priority and the signal quality. See Multiplex section protection Mean Time Between Failures.? The most significant characteristic of the multi-service protection trail is: Flexible networking. The nodes online achieve protection switching through the K1 and K2 bytes in the multiplex section.

The host software runs on the SCC board. FDB0: permanently saved databases in a Flash ROM. NE ID NE layer data on NM NE side NEL Network Element Network entity Network layer data on It is the network configuration data saved in the NM database and is the data source for NM the network function of the NMS.? Meanwhile. the NE configuration data is saved in DRDB and SDB at the same time.? In efficient operation. The network entities include transmission object and sub-network.? If the data in DRDB is also lost due to the exhaustion of the battery. the NE layer data on the NM side is one of the important data sources of the network layer data on the NM side.? (2) SDB: a static database in a powerdown RAM.? Backing up an NE database means backing up the NE configuration data from SDB to FDB0 and FDB1. which considerably facilitates the description of the network. including the hardware unit and the software running on it.? The network layer data on the NM side includes three parts: fiber connection data. one NE has at least SCC (System Control & Communication Unit) board which responsible for the management and monitoring of the NE. the NE database is restored in the following procedures: As the SDB data is lost due to power-down. The NM uses NE ID. Network entity refers to the universal basic devices used to describe the functions and structure of the transmission network.? If there is any data on the NE side.13 N NE NE database See Network Element There are three types of database on NE SCC board as following:(1) DRDB: a dynamic database in a dynamic RAM. Consistency between the data on the NM side and that on the NE side is the precondition of efficient running of the transmission equipment. each NE corresponds to a unique identifier.? If there is no data on the NE side. Ltd. to identify various NEs in a network. A-17 . thus forming the data on the NE side. which can be uploaded to the network management system and then stored in databases on the network management system NE side. Network Node Interface NM NML NMS NNI NSAP Issue 02 (2009-10-23) Network Node Interface.iManager U2000 Operation Guide for WDM End-to-End Management A Glossary and Abbreviations A. the main control restores the data first from DRDB. in an interface or a database. the NMS can save such data in the NE layer on the NM side through the upload function. Usually. It is the NE configuration data saved in the NM database.. the data is restored from FDB0 or FDB1. In a network. thus forming the NE layer data on the NM side. The NE configuration data saved on the SCC board of the equipment.? (3) FDB0. See also NNI. powered by battery. Network Management Network Management Layer Network Management System. See Network Node Interface Network Service Access Point Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. protection sub-network and SDH NNI data and trail information.? When an NE is restarted after power-down. The interface at a network node which is used to interconnect with another network node. Network Element Level It is the network element. the NMS can send the NE layer data on the NM side through the upload function.

Ltd. In this way. Since different client operations have different influences on system security. the operations with similar influence on system security are added in an operation set. If the default operation can not meet the requirement for authority assignment.A Glossary and Abbreviations iManager U2000 Operation Guide for WDM End-to-End Management NTP Number of routes calculating Network Time Protocol Usually.? The NMS has a default operation set. Operation set facilitates authority management in the NMS system. if the authority in this operation set is assigned to a user (user group).14 O OA OADM OAM OAMS OAU OBU OCH OCP OD ODU ODUk OEQ Office OIF OLA OLP OM OMS OMU ONE Operation set Optical Amplifier Optical Add/Drop Multiplexer Operations.the NMS can work out multiple trails which comply with the requirements according to the route restriction. and Maintenance Optical fiber line Automatic Monitoring System Optical Amplifier Unit Optical Booster Board Optical Channel Optical Channel Protection Optical Demultiplexing Optical Demultiplexing Unit Optical Channel Data Unit-k Optical Equalizer To facilitate management and show the actual physical relation of the equipment.. A. Optical Internetworking Forum Optical Line Amplifier Optical Line Protection Optical Multiplexing Optical Multiplexing Section Optical Multiplexer Unit Optical Network Element A collection of multiple client operations. Administration. the user (user group) will have the authority of all operations in the operation set. A-18 Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. the user can create a new one. The number selected here is the maximum number of optional routes which is worked out by the NMS . all the NEs in respective actual transmission equipment rooms are grouped into offices. Issue 02 (2009-10-23) . The user can select one of them.

an ONE provides a list of the subracks that form the NE to display the board layout. The locating of an ONE is equivalent to that of a common NE. which achieves the management function similar to the frame overhead bytes in the SDH system. A-19 . like a common NE and its alarm status can be displayed with colors. It is the end-to-end optical wavelength.iManager U2000 Operation Guide for WDM End-to-End Management A Glossary and Abbreviations Optical NE Optical Network Element (ONE) is the transport entity that implements the NE functions (terminal multiplexing. REG and OXC. OLA. OADM. he can directly press the "#" key to clear the line currently in communication and then establish the communication with the break-in party.? Therefore. the optical trails OCH. Logically. cross-connection and regeneration) in a DWDM layer network. Optical Supervision Channel is an independent optical channel in the DWDM system. Optical Supervisory Channel The SC1 or SC2 board. the optical signals of the supervisory channel are split first and then the service channel is preamplified and demultiplexed. an ONE is displayed with an icon. but they are terminated and regenerated at each site. the optical signals of the supervisory channel and the multiplexed and amplified optical signals of the service channel are converged to the backbone transmission fiber.? Like a common NE. OTS and OMS are available at the same time. so you do not need to create/search for any more optical trail. in DWDM transmission system the monitor channel optical signals are not amplified.? In a view.. which is responsible for ALC protocol byte processing. However the service channel optical signals are on the contrary. In the optical signal receiving direction. Operation System Function Open Systems Interconnection.? Similar to a common NE.? In the optical signal transmission direction. Orderwire authorized break-in cannot be done unless no hotline or private telephone is set on the corresponding Phone port. Optical Switch Node Optical Signal to Noise Ratio Optical Time-Domain Reflectometer Optical Terminal Multiplexer Optical Trassmission Network Optical Transmission Section Optical Transponder Unit Optical Channel Transport Unit-k Optical supervisory channel Optical trail OPUk Orderwire break-in OSC OSC board OSF OSI OSN OSNR OTDR OTM OTN OTS OTU OTUk Issue 02 (2009-10-23) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. an ONE cannot be expanded or entered like a sub-network. an ONE consists of different subracks. The types of ONEs include OTM. After creating the fiber/cable among the DWDM equipments. add/drop multiplexing. They are amplified many times during the transmission. but they are not terminated or regenerated. The phone with the forced breakin authority can be used to break in the phone forcedly by dialing "# + phone number". Ltd.? Optical monitor channel features independence of traffic channel. Optical Channel Payload Unit-k The called party in communication receives the call prompt (BB tone) of the third party.

a performance threshold-crossing event is generated. the OptiX 2500+. When the performance event count value exceeds the upper threshold. With external signal input through the relay. the protection preference is divided into trail protection and sub-network connection protection. different protection strategies can be selected as required. The object of performance event monitoring is the board functional module. the following parameters can be set: relay switch output control. Of the above. smoke alarm. Issue 02 (2009-10-23) . and the OptiX 10G(Metro 5000). the change of environment can be monitored timely and accurately. PMU (short for Power Monitoring Unit) is installed on the OptiX 155/622B. the OptiX 2500. can be monitored as well. 15-min history performance register. etc. the performance threshold-crossing event is ended. For the equipment installed with a power & environment monitoring board.A Glossary and Abbreviations iManager U2000 Operation Guide for WDM End-to-End Management A. UAT register and CSES register. In case the service route provides multiple service protections. etc. the OptiX BWS 320G NE. no protection. The power and environment monitoring unit is installed at the top of the cabinet of the SDH equipment and is used to monitor the environment variables. A performance register is used to count the performance events taking place within a period of operation time. If an alarm is raised. performance jitter caused by some sudden events can be shielded. burglary alarm. With the display on NMS system. when the performance event count value is below the upper threshold for a period of time. relay usage and alarm setting. PM PMU Port inversion Performance Monitoring See Power Monitor Unit It is to set port alarm monitoring as contrary to the practical situation. fire alarm. Both communication parties are connected permanently. the OptiX 155/622. including 15min current performance register. Ltd. so every board functional module has a performance register. Power and environment monitoring unit Power Monitor Unit Private line Protection strategy A-20 Huawei Proprietary and Confidential Copyright © Huawei Technologies Co.. so as to evaluate the quality of operation from the angle of statistics. such as the power supply and temperature. query of DIP switch status. and extra traffic. which is the special case that upper threshold and lower threshold are equal. Protection strategy refers to the protection mode given the priority in use for the trail: protection. it is reported normally. As one type of power and environment monitoring unit. In this way. temperature alarm threshold. A few performance events only have one threshold.15 P P2P PC PDH PE Performance register Point To Point Personal Computer Plesiochronous Digital Hierarchy Provider Edge. This function applies to a port configured with but not loaded with services to prevent the generation of any meaningless alarm that will interfere with alarm analysis. Performance register is the memory space for performance event counts. 24-hour current performance register. 24-hour history performance register. Performance threshold Performance events usually have upper and lower thresholds.

and If the amount found can not meet the bandwidth requirement. and then these independent logical systems are connected with one another to form a complete network structure. the creation of the protection subnetwork actually means that corresponding logical system is configured for each NE by means of creating the protection sub-network. the protection sub-network becomes a concept of network level other than multiplex section rings or path protection ringsin the original NES or RMS+ NMS. protocol is starting. the system will automatically copy the prototype trail. Protocol controller status Prototype trail Start or stop status of the protocol controller of the protection sub-network.iManager U2000 Operation Guide for WDM End-to-End Management A Glossary and Abbreviations Protection sub-network In the NMS. only one prototype trail needs to be selected here. prototype trails as many as the number of bandwidths should be selected. A.. In other words. Pseudo Wire Pseudo-Wire Edge-to-Edge PSTN PVP PW PWE3 A. The protection sub-network involves NEs and fiber/cable connections. If the separated route has been selected in the first step. Permanent Virtual Path. Ltd. The prototype trail is the server layer trail.17 R RAS RDMS Remote Network Monitoring (RMON) RES Resource sharing Remote Access Server Relational Database Management System A manage information base (MIB) defined by the Internet Engineering Task Force (IETF). part start. RMON is mainly used to monitor the data flow of one network segment or the entire network.16 Q QoS Quality of Service. Resume Resource sharing means that a physical resource may belong to two protection subnetworks. protocol start. enough resources can be available for the creation of a protection sub-network. These are the preconditions for creating a protection sub-network. and those listed are all server layer trails that satisfy the source/sink and board conditions. If the centralized route has been selected in the first step. From the viewpoint of logical system. including such statuses as not started. the resources that form a protection sub-network include NEs and fiber/cable. Issue 02 (2009-10-23) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. Only after the NE is created. the basic configurations for the NE is done and the fiber & cable connections among NEs are correctly set up. Public Switched Telephone Network. A-21 . The system will automatically find out other trails whose routes are consistent with the selected prototype trail. the optical interfaces (or VC4) of each board are mapped into the logical system.

and double-clicking it again can cancel the setting. thus realizing the synchronization of the whole network. Radio Transmission Node Rational Unified Process Route restriction RPR RS RS232 RS422 RSTP RSVP RTN RUP A. there is a routing table that contains information about how the service is transmitted from the source to the sink. Its highest speed is 19. A-22 Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. As a VLAN flag can be added to the Ethernet port. the user can specify the explicit route and the NEs that the trail cannot pass. providing a basis for route selection. The inevitable trail only functions when the number of routes is calculated as 1. It can communicate with RS232 and RS422 of other stations in point-to-point mode and the transmission is transparent. In the asynchronous transfer mode and there is no hand-shaking signal. Auto protection switching of clocks in the synchronous network can be implemented by using S1 byte and following the certain switching protocol. each network element traces step by step to the same clock reference source through a specific clock synchronization path.? Port routing: It means configuring a route between the Ethernet port and the bound path port. It can be used flexibly in point-to-point. To implement protection switching of clocks in the whole network. Therefore. The specification that defines the electrical characteristics of balanced voltage digital interface circuits.? Ethernet static routing in ET1 refers to the mapping relationship between the Ethernet port and the bound path. point-to-multipoint or multipoint-tomultipoint communication. When creating a trail. The interface can change to RS232 via the hardware jumper and others are the same as RS232. which is usually used for point-to-point networking communication.? Its routing type includes port routing and VLAN routing. The explicit route and the NEs are the constraints for calculating the route. It uses the lower four bits of the multiplex section overhead S1 byte to indicate 16 types of synchronization quality grades. Resilient Packet Ring. The implementation is to divide and converge the data stream according to the VLAN flag of the packet. Regenerator Section The 25-pin interface standard that is defined by EIA.A Glossary and Abbreviations iManager U2000 Operation Guide for WDM End-to-End Management Route The IP route selection is in table driving mode. The specific coding information is shown in the following table. In each host and each router of the Internet. Issue 02 (2009-10-23) . the clock of this NE will trace another clock reference source of lower level. ITU-T defines S1 byte to transmit the network synchronization status information. Ltd. the equipment can be applied more flexibly. The constraint conditions for calculating a route. 2 kbit/s.18 S S1 byte In an SDH network. the NE must learn about the clock quality information of the clock reference source it traces. Rapid Spanning Tree Protocol Resource Reservation Protocol.? VLAN routing: It means configuring a route between the Ethernet port and the bound path port based on the VLAN service. If a clock reference source traced by the NE is lost.. Double-click the NE icon can set the NE as an NE that cannot be passed.

the APR restarting optical power is restricted to less than 10dBm. NE physical view script file. which cannot allow too low output optical power. Ltd. the NMS creates a protection sub-network by creating a logical system on the port of an idle line board.255.*.0---230. 10. all 129. 255).? Usually. and the NE must be a TM without protection and fiber connection.255).*. port naming file. SAN SC1 SC2 SCC SCE Script file SCS SD trigger condition SDH SDH NNI Search domain Secondary filter trail Serial Line Interface Protocol Issue 02 (2009-10-23) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co.255.* to be searched. Search field refers to the range of IP addresses being searched. the NMS re-searches the trail data displayed by the current client according to the given search conditions.0---247.*. Or.*.255.*. all 192. In the TCP/IP. APR/IPA restarting optical power is the specified output power of the OAU.0.255.*. you can turn off this trigger condition through the switch to avoid MS switching when the signal degrades. SDH NNI is widely used in the 10GV2. whose search field is 192.*.0. whose search field is 129. Category B address (128.*.? The multiplex section protocol defaults to start switching in case of signal loss.255.255. which is reserved. 255.224.0---223.0---191.255).9. If the safe control switch is turned off. defines the framing mode over the serial line to implement transmission of messages over the serial line and provide the remote host interconnection function with a known IP address. Otherwise. This net-ID is a local address. in which .255.9.0.0.0. the SDH NNI is fulfilled only on the NMS side.Net-id 127. which is reserved. signal degradation severely affects some services. Sync Optical Channel Separator Board SD refers to signal degradation.224. and a node is independent when the SDH NNI is deleted from the network layer.*. In this search mode. so protection switching is needed. 255. An isolated node satisfying specified conditions can be used to create an SDH NNI. including the NE configuration file. For example. For example. without providing the searching function. the isolated node is a logical system not belonging to any protection sub-network or SDH NNI.*. As no logical system is available in the 10GV2. Serial Line Interface Protocol. 255.0.255. the IP addresses include:Category A address (1. It is applied to build communications connection with the equipment beyond the NMS management area. For example.224. 192.iManager U2000 Operation Guide for WDM End-to-End Management A Glossary and Abbreviations Safe control switch The APR/IPA safe switch is set in consideration of the long-span networking requirement.*. 255).0.9.*.*.255).255.9.Category C address (192. SDH Network Node Interface.0. whose search field is 10.0.Category D address (224.? Though both the SDH NNI and the isolated node are implemented via the logical system. because no tributary board is available. all 10.0.* to be searched. 129. A-23 .? In practice. end-to-end configuration file.*.255.0---126. An SDH NNI should usually be created to support the E4 service. NMS information file and service implementation data script file.9.* can be any number. helping the customer find the trail data which interests him the most..Category E address (240.255.9. Synchronous Digital Hierarchy.* to be searched. 255. Storage Area Network Single Directional Optical Supervising Channel Unit Dual Directional Optical Supervising Channel Unit System Control & Communication Unit System control & Communication Unit for Extended Subrack It is the text file describing the physical information and configuration information of the entire network.255.

When the services are not VC12 ones. it is the route of a service clock from the source to the sink.? When the VC12 service over a VC4 exceeds a preset threshold. When pass-through services are configured on the newly added nodes. otherwise lower order cross-connect is selected.. higher order cross-connect is selected. they shall be converted into VC12 equivalents. while the lower level trail is called the client trail. The SNCP node is generally set on the node on the line board with the path protection type of the dual fed and selectively received. There is an inclusion relation between the trails of different levels. alarms of this path related to the service can be suppressed.A Glossary and Abbreviations iManager U2000 Operation Guide for WDM End-to-End Management Serial port extended ECC Server layer trail and client layer trail The ECC channel realized by means of serial port. a trail of a certain level contains multiple trails of lower levels. In such a structure. there should be 21*2+4 = 46 VC12 services. See Serial Line Interface Protocol Optical Supervisory Channel Unit Service Management Layer Secondary Metro Node Service Management System Simple Mail Transfer Protocol. Sub-Network Connection Multiple Protection See Sub-network connection protection Set the SNC node on the protection sub-network to support sub-network connection protection that spans protection sub-networks. When the tributary payload loading indication of this path is set as "Unloaded". The SNCP node of the ring sub-network can support electric circuit dually feed and selectively receive a timeslot out of the ring. For example: if there are 2 VC3 and 4 VC12 services on a VC4. In the 1600G system. the upper level trail bearing another trail of lower level is called the server layer trail. pass-through of this VC4 shall be made through higher order cross-connect.? The working route can be in the form of point-to-point or broadcast (That is. Ltd. The payload loading indication is used to set the path of the tributary board. the mode of highorder or low-order to pass through can be selected. g. Issue 02 (2009-10-23) . Usually it is used for path alarm suppression. an input clock source corresponds to multiple output clock sources). Sub-Network Management Layer Subnetwork Management System Synchronous Optical Network Service clock working route Service configuration strategy Service loading indication SLIP SMC SML SMN SMS SMTP SNCMP SNCP SNCP node SNML SNMS SONET A-24 Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. If the threshold value is 42. e. thus implementing sub-network connection protection.

SNCP is of 1+1 protection mode.255. To create a multicast connection. SERVICE VLAN SRLG SSM STS Sub-network Sub-network connection protection Sub-network number subnet Subnet mask SVLAN Issue 02 (2009-10-23) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co.iManager U2000 Operation Guide for WDM End-to-End Management A Glossary and Abbreviations Spread type The spread type of ATM service includes point-to-point (p2p) and point-to-multipoint (including p2mpRoot and p2mpLeaf). Shared Risk Link Group Synchronization Status Message Synchronous Transport Signal Sub-network is the logical entity in the transmission network and comprises a group of network management objects. In this manner. On the one hand. also called network mask.? The network that consists of a group of interconnected or correlated NEs. nodes and connections. Payloads are transmitted simultaneously on both the working and the protection subnetwork connections.255. a sub-network is used to contain the equipments which are located in adjacent regions and closely related with one another. broadcast storms are suppressed.? The NMS supports multilevels of sub-networks.0. clock subnet and so on. Actually it is the first several digits (one or two) of the user phone number. For example. A-25 . it helps the network management personnel focus on the equipments under their management. It is displayed in the topology view as the subnet icon. the signal from the protection sub-network connection is selected according to the preference rule. or when its performance deteriorates to a certain level. a connection to identify this group of connections is necessary.0. Ltd.0. at the receiving end of the sub-network connection.0. which contains child submaps.? Generally. class B subnets with 256*256 IP address resources subnetted by the mask 255. It supports point-to-multipoint multicast service. The subnet mask is used to divide a network into different network segments. according to different functions. on the other hand.. When the working sub-network connection fails. protection subnet. the p2mpRoot connection must be created before the creation of p2mpLeaf connection. so that communication can be done only within the same network segment. thus no protocol is needed It is used to differentiate the different network sections in the sub-network conference. The p2p spread type supports real-time bidirectional communication service. If there is a p2mpLeaf connection in a group of connections. Switching usually takes the single-end switching mode. The number of bits in a network prefix.255. p2mpRoot and p2mpLeaf belong to the point-tomultipoint spread type. An orderwire phone number is composed of the sub-network number and the user number. According to the subnet mask and IP address. and it is indicated with a sub-network icon on a topological view. A type of topology object. Sub-network connection protection uses the 1+1 mode. while other connections are p2mpLeaf connections. This connection is a p2mpRoot connection. A sub-network can contain NEs and other sub-networks. During the creation of a point-to-multipoint (multicast) connection.0.0.? A sub-network planning can better the organization of a network view. and class C subnets with 256 IP address resources subnetted by the mask 255. the p2mpRoot cannot be deleted. the IP network can be classified into three commonly used classes of subnets: class A subnets with 256*256*256 IP address resources subnetted by the mask 255. The two communication parties are in the same status and participate the session actively. the view space can be saved.

All TDA boards in the whole network can share 1 .20 of the NMS "Local 2M" (12 audio interfaces correspond to time slots 1 .A Glossary and Abbreviations iManager U2000 Operation Guide for WDM End-to-End Management Switching priority There may be the case that several protected boards need to be switched. 2M-3 and 2M-4 is 1-31.12 respectively.? 1Q tag header is converted into an ordinary packet.? 1Q tab header and will discard the packet without a 802. Unidirectional Optical Supervisory Channel And Timing Transporting Unit Bidirectional Optical Supervisory Channel and Timing Transmission Unit Time Compressed Multiplex Transmission Control Protocol/Internet Protocol Tone & Data Access Unit The TDA board can be configured with 1 . It refers to the period of time between the start of detecting and the moment when the line is switched back to the original status after protection switching occurs in the MSP sub-network.12 two/four-wire audio interfaces (the rate is 64 kbit/s). The port set as UnTag processes the packet as an ordinary packet. Switching restoration time Synchronize NE time A. the tributary board that fails later cannot be switched. there are three switching priorities: "Priority 1". The service added/dropped to/from these interfaces correspond to the time slots 1 . and "Priority 3". The TDA board occupies at least one 1 2Mbit/s. or at most 4 2Mbit/s (corresponding to 2M-1. The corresponding time slot range of each 2M-1. The board with higher priority can preempt the switching of that with lower priority. The port set as Tag can only recognize the packet with a 802. Ltd. For the packet with a 802. In order to send these tone signals and digital signals to the SDH network for transmission.4 2Mbit/s altogether. thus the tributary board switching priority should be set. i.? 1Q tag header sent from the port. or with 4 RS-232 and 4 RS-422 data interfaces (the maximum rate is 19. otherwise it is called an UnTag port. the UnTag port will remove its 802. For the OptiX 10G(Metro 5000). 4 RS-232s correspond to time slots 13 . TDA is short for Tone Data Access.19 T Tag/UnTag The Ethernet port that can recognize and send the packet with a 802. If the switching priority of each board is set the same.? 1Q tag header.8.4 2Mbit/s. For the OptiX 2500+ equipment. "Priority 2". it is necessary to cross-connect the local 2M (20 64 kbit/s payloads) and four 2M signals (2M-1.? 1Q tag headerscan pass through the port. the whole network occupies 1 .16 respectively and 4 RS-422s correspond to time slots 17 .? e. 2M-2. 2M-3 and 2M-4 in the NMS). the highest switching priority is priority 1 and the lowest one is priority 5. Send the system time of the NMS server to NEs so as to synchronize all NEs with the server. 2M-3 and 2M-4) added/dropped from the XCS. For the 2500+ NE equipment.? 1Q tag header.20). the switching priority is classified into priorities 1 . and priority 8 is the lowest one. thus the packet with a 802. 2M-2.board..? 2kbit/s). it can be installed with the external TDA board for which the clock source must be set so that the TDA board can switch according to the set clock source sequence when clock source switching occurs. Issue 02 (2009-10-23) TC1 TC2 TCM TCP/IP TDA TDA board service TDA clock source A-26 .? 1Q tag header is called a Tag port. 2M-2. Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. For the OptiX 155/622 and the OptiX 2500 equipment. Packets either with or without a 802. where priority 1 is the highest one.

VC4. routing parameters and resource constraint on a realtime basis. It may be caused by the insufficiency of network resource or the imbalanced load of network resource. each optical fiber connection corresponds to an SPI. Two options are provided: enable and disable. Ltd.iManager U2000 Operation Guide for WDM End-to-End Management A Glossary and Abbreviations TDA feeding selection It can be selected whether the audio port of the SS42TDA board is in feeding mode or non-feeding mode. Tributary Protection Switching The network congestion is a main factor that affects the backbone network performance. mainly engaged in transferring messages from the input of the trail source to the output of the trail sink. the user can make a phone call without dialing. OMS. It indicates the means by which the NE discards cells when the network is congested. Tunable Dispersion Compensator See Traffic Engineering Trail trace Identifier Mismatch If the circuit is active at the moment when the charging time zone ends. the trail includes various types (OTS. OCH. including SDH and PDH services. Here. Issue 02 (2009-10-23) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. the cells will be discarded at the cell level. It monitors the network traffic and the load of network unit dynamically. and a trail is the general name for service carriers. Trail Trail consistency check Check whether the circuit route and the activation status of the NMS side and NE side are the same. The NMS topology is a basic component of the man-machine interactive interface. the feeding mode is configured during test so as to connect the telephone set for test. and monitoring the integrality of the transferred messages. for example) can be connected to transmit services. A trail is a kind of transport entity. the alarms of different NEs. two lines have -48V DC feeding. the communication status as well as the basic network operation status. such an operation as adding fibers to the SDH NNI or configuring/ deleting services through the configuration layer will result in circuit inconsistency. RS or MS trail. When the non-feeding mode is selected. TDC TE TIM Time of charging data circuit deactivation TMF TMN Topology TPS Traffic Engineering Traffic frame discard flag It is the traffic frame discard control. when it is opened. Generally.. Telecommunications Management Network. MS. OCH and OMS represent the trails in a DWDM layer network. SPI. optimizes the usage of network resource and avoid the congestion caused by the load imbalance. subnetworks in the network. TeleManagement Forum. Traffic engineering is a remedy to the congestion that results from imbalanced load. Among them. RS.? During network expansion. When the frame discard mark is closed. this moment is the time of deactivating the charging data circuit. the nonfeeding terminal (MODEM. "frame" refers to the AAL protocol data unit. For the ADM and TM equipment in the SDH network. When the feeding mode is selected. Otherwise. After the telephone set is connected and the audio service configured. A-27 . OTS. modify the traffic management parameters. they will be discarded at the frame level. The topology clearly shows the structure of the network. According to the different levels of the trail. clear the superfluous MOs and combine some of the circuits. VC3 and VC12). VC4 server trail. it is the general time of circuit deactivation.

No loopback is needed when the equipment runs efficiently. The difference is that the incoming traffic monitoring function is divided into UPC and NPC according to their positions. and the board power supply fails. 3. Unidirectional Path Switched Ring Usage Parameter Control/Network Parameter Control. Inloop: The input signal is returned along the original trail from the tributary board of the target NE. measures will be taken to control. and the payload of the protected board can be automatically switched over to the specified protection board and the work will be accomplished by the protection board. Switching priority can be set for each protected board to make the switching setting more flexible. the service will be automatically switched to the original board. The purpose of such configuration is to provide the basic data of trail protection for the subsequent trail management. Unavailable time event It is also called Unavailable Time (UAT). Once the specified parameter is exceeded. Outloop: When arriving at the line board after passing the input port in the local NE. Ltd. Issue 02 (2009-10-23) . The user name and password uniquely identifies the operation rights of a user in the NMS.20 U UAT UML Unavailable Time. 1. NPC is similar to the UPC in function. When the working protected board is faulty. the input signal is directly looped back to the service output end. A client user of the NMS.? g. A fault can be located for each service path by performing loopback to each path of the tributary board. See Usage Parameter Control/Network Parameter Control Report all or part of the configuration data of the NE to the NMS and overwrite the configuration data saved in the NE layer on the NMS side. No loopback: It is the normal status. Some operations in the tributary board protection switching will trigger some abnormal events. After the fault is cleared. UNI Unprotected subnetwork UPC/NPC Upload UPS UPSR Usage Parameter Control/Network Parameter Control See User Network Interface It refers to a sub-network without any protection mechanism. while the NPC at the network interface. 2. the board is pulled out. the UPC is implemented to monitor the actual traffic on each virtual circuit that is input to the network. Uninterrupted Power Supply. etc. The UPC locates at the user/network interface. when board self-test fails. the SCC will send switching command. A UAT event is reported when the monitored object generates 10 consecutive severely errored seconds (SES) and the SESs begin to be included in the unavailable time. The event will end when the bit error ratio per second is better than 10-3 within 10 consecutive seconds. Unified Modeling Language.A Glossary and Abbreviations iManager U2000 Operation Guide for WDM End-to-End Management Transmission media layer route Tributary loopback It refers to the physical media such as optical fibers and NEs passed by the trail. e. TU TU 1: N protection A.? There are three kinds of loopback modes. Tributary Unit TU protection is of the equipment level and it uses one standby TU to protect n TUs.? ..During the communication. User A-28 Huawei Proprietary and Confidential Copyright © Huawei Technologies Co.

? g. 1. When the VC4 server trail is configured. Outloop: When arriving at the line board after passing the input port in the local NE.? There are three kinds of loopback modes. the input signal is directly looped back to the service output end. lower order cross-connect is configured over the NE at the crosspoint of two VC4 server trails during the creation. Its server layer trail is VC4 server trail.? e. The VC4 server trail is the basis of the VC3 and VC12 trails.21 V V40 VB VC12. lower order cross-connect is performed over the NEs at the two ends during the creation. Virtual Channel Connection. system maintainer.? The VC12 and VC3 trails are transparent channels (i. thus making the VC12 and VC3 trails pass through.? The VC4 server trail provides transparent channels (i. User Network Interface UNI is the abbreviation for User Network Interface. a switch) in a path-layer network. The path rate of the VC4 server trail is 150. only the higher order cross-connection of VC4 is generated in the intermediate NE. Therefore. A. If the VC12 and VC3 trails pass multiple VC4 server trails. circuit group) provided for circuit-layer network nodes (e.? If the VC12 and VC3 trails only pass one VC4 server trail. 3. Inloop: The output signal is directly returned after passing the line board.048Mbit/s and 34. See Virtual Chanel Connection Virtual Concatenation Group See Virtual Channel Identifier Veritas Cluster Server. VC3 trail 40-channel Multiplexing Unit With VOA Virtual Bridge The channel rates of the VC12 trail and VC3 trail are respectively 2. The VC12 or VC3 trail is established on the basis of VC4 server trail. It is only the basis for VC3 and VC12 trail creation. VC4 loopback VC4 Server Trail VCC VCG VCI VCS Virtual Chanel Connection Issue 02 (2009-10-23) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. Ltd. the VC4 pass-through is configured over the intermediate NE. No loopback: It is the normal status. 2. The fault of each VC4 path on the optical fiber can be located by setting loopback for each VC4 path of the line..? g. the VC4 server trail is not a traditional service. in addition to that mentioned above. and acts as the basic unit of inter-office communication path.? 336Mbit/s. circuit group) for circuit-layer network nodes (e. which can only be created after the VC4 server trail. The default user group includes: system administrator. The created VC4 is a point-to-point service trail.? e. a switch) in a path-layer network. It identifies the interface between the user and the ATM network node. and act as the basic unit of transport capacity among circuit-layer network node channels. A-29 . no service is added/dropped. The attributes of user set include name and detailed description.iManager U2000 Operation Guide for WDM End-to-End Management A Glossary and Abbreviations User group User set refers to the set of NMS users with the same management authorities. that is. No loopback is needed when the equipment runs efficiently. but no cross-connection is generated at the two ends. only the source/sink NE can be specified instead of the source/sink port. The VC logical trail that carries data between two end points in an ATM network.368Mbit/s. system operator and system supervisor.

An extension of the private network. a virtual NE is also displayed with an icon on a view. Virtual concatenation Virtual leased line Virtual Local Area Network Virtual NE Virtual Path Connection Virtual Path Indentifier Virtual private network VLAN VLAN ID VLL VOA VPI VPLS VPN VT VVR VxVM A. and 8 bits in the UNI cell. it is similar to the traditional leased line. it is the virtual LAN identifier. The VPI and VCI together indicate a virtual connection. Like a common NE. it provides asymmetric and low-cost "DDN" service. See Virtual leased line Variable Optical Attenuator Unit. or the equipment is interconnected with other vendors NEs for service configuration. but it is only an NE simulated according to the practical situation. Ltd. See Virtual Local Area Network Namely. An emulation of the traditional leased line service.A Glossary and Abbreviations iManager U2000 Operation Guide for WDM End-to-End Management Virtual Channel Identifier The VCI. For end users of the VLL. A VPN contains shared links or encapsulated. encrypted. By emulating the leased line through the IP network. Issue 02 (2009-10-23) . See Virtual Path Indentifier Virtual Private LAN Service. See Virtual private network Virtual Tributary Veritas Volume Replicator Veritas Volume Manager. shorted for Virtual Path Identifier. when the trail management function is used for the NEs or sub-networks the NMS cannot manage. and authenticated links on the public network. occupies 12 bits in the NNI cell.? Usually. A-30 Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. which does not represents an actual NE. A VPN can connect users or sites over the Internet. Therefore. The VPC is shorted for Virtual Path Connection.22 W WAN Wide Area Network. It indicates the virtual channel in the path. When the standard virtual containers (including VC4/VC3/VC12/VC11) are incapable of carrying the volume of a SDH signal. the actual status of this NE cannot be queried and its alarm status cannot be displayed with colors. occupies 16 bits in both NNI cell or UNI cell. the containers can be concatenated to function as a larger container. shorted for Virtual Channel Identifier. and one NE can support up to 8K VLAN routes. The identifier in the ATM (Asynchronous Transfer Mode) cell header that identifies to which virtual channel the cell belongs. One Ethernet port can support 4K VLAN routes..The field in the ATM (Asynchronous Transfer Mode) cell header that identifies to which VP (Virtual Path) the cell belongs. A technology used to realize the virtual work group by logically classifying the devices on a LAN into multiple network segments. the end-to-end service configuration method and the trail management capability are provided. The VPI.

the input terminal of the DWDM equipment will switch over to the standby path. optical module failure. This is the path protection switching function. Ltd. wavelength conversion board failure. Service signals are transmitted in the two rings in opposite directions.. the input terminal of the DWDM equipment will switch back to the active path when it meets the setting requirement. Node C receives the signals from the two rings at the same time and selects the signal with higher quality. If the detection shows that the active path signal recovers. The restore time is less than 50ms. it is the basic network-level information. and Node A selects the signal with higher quality. A-31 . Its function is similar to that of the protection sub-network in the SDH NE. Similarly. group The wavelength path protection can only work with the correct configuration of the wavelength protection group. It provides protection against optical fiber damages.23 X XCS Cross-connect and Synchronous Timing Board Issue 02 (2009-10-23) Huawei Proprietary and Confidential Copyright © Huawei Technologies Co. Wavelength protection The wavelength protection group is important to describe the wavelength protection structure. WBA WDM WDM path protection WDM Optical Booster Amplifier Unit Wavelength Division Multiplexing At the place where the signals are input to the DWDM equipment.iManager U2000 Operation Guide for WDM End-to-End Management A Glossary and Abbreviations Wavelength path protection ring The wavelength path protection ring comprises the working ring and the protection ring. the signals from Node C to Node A are transmitted along both the working ring and protective ring. it is the basic networklevel data oriented to the user. WDM Access Node Work Station Function Wait-to-Restore Wavelength Cross Connection Protection WMASN WSF WTR WXCP A. Wavelength protection A wavelength protection sub-network is a ring-chain structure used to describe sub-network wavelength protection. Wavelength path protection can protect optical fibers and equipments. When faults occur to the active path. In the wavelength path protection ring. The two boards/ports are backed up mutually.? Create or delete a protection sub-network as required and set the parameters of the protection sub-network for the purpose of management on the network hierarchy. and optical amplifier failure. the same channel of optical signals are input to two boards/ports of the WDM equipment respectively via two optical fibers. service signals from one node (such as node A) to another node (such as node C) are transmitted via the working ring and the protection ring at one time. This is the path protection switching recovery function. With the function similar to that of the protection sub-network in an SDH network.

Sign up to vote on this title
UsefulNot useful