Professional Documents
Culture Documents
Rel.7.4F
Version 7.5.0
User Guide
3AL 61269 AAAA
Issue 4
May 2009
Alcatel, Lucent, Alcatel-Lucent and the Alcatel-Lucent logo are trademarks of Alcatel-Lucent.
PREFACE......................................................................................................................................... 27
Preliminary Information.............................................................................................................. 27
Applicability................................................................................................................................. 28
Scope ........................................................................................................................................... 28
History.......................................................................................................................................... 29
Related Documents .................................................................................................................... 30
Handbook Structure ................................................................................................................... 31
General on Customer Documentation ...................................................................................... 32
2 OPERATION................................................................................................................................. 117
2.1 Introduction .......................................................................................................................... 117
2.2 Network configuration......................................................................................................... 117
2.2.1 Network Construction ..................................................................................................... 117
2.2.2 Start the Netview application .......................................................................................... 118
2.2.3 Create the network objects ............................................................................................. 119
2.2.4 External Network Reference........................................................................................... 128
2.2.5 Create Connection.......................................................................................................... 132
2.2.6 Introduction to NPA ......................................................................................................... 143
2.2.7 Create a 4-F STM-16 NPE Ring with 1664SM ............................................................... 156
2.2.8 Takeover procedure ........................................................................................................ 157
2.2.9 Create a 4-Fibre STM-64 NPE Ring with 1670SM ......................................................... 157
2.2.10 Takeover procedure ...................................................................................................... 159
2.2.11 Upload Tools ................................................................................................................. 159
2.2.12 2Mb/s retiming management ........................................................................................ 165
2.2.13 Network implementation ............................................................................................... 168
2.2.14 Payload structure modification:Ho/Lo ........................................................................... 169
2.2.15 Trail Creation Wizard .................................................................................................... 170
2.2.16 Improved path/trail management .................................................................................. 174
2.2.17 Upload NAPs ................................................................................................................ 177
2.2.18 Take-over of retiming .................................................................................................... 178
2.3 Transport Management ....................................................................................................... 180
2.3.1 Path Provisioning............................................................................................................ 180
2.3.2 Path Create management............................................................................................... 182
2.3.3 Non terminated path ....................................................................................................... 199
2.3.4 Path ends modification ................................................................................................... 199
2.3.5 Gigabit Ethernet path ..................................................................................................... 202
2.3.6 LCAS Management ........................................................................................................ 210
2.3.7 Compatibility tables......................................................................................................... 215
2.3.8 Gigab broadcast 1 source............................................................................................... 229
2.3.9 Gigab broadcast 2 sources............................................................................................. 235
2.3.10 2 MB broadcast 2 sources ............................................................................................ 241
2.3.11 AU3 path ....................................................................................................................... 244
2.3.12 User's Default ............................................................................................................... 246
2.3.13 AU3-NV path................................................................................................................. 247
2.3.14 Digital Video Broadcasting path (not protected) ........................................................... 252
2.3.15 Digital Video Broadcasting path (route protected) ........................................................ 261
2.3.16 DVB path route (SNCP) and source protected ............................................................. 266
2.3.17 10 GBE EPL point to point path .................................................................................... 274
2.3.18 10 GBE EVPL point to multipoint path .......................................................................... 284
2.3.19 EVPL mixed 10GbE-1GbE path flow control management .......................................... 290
2.3.20 LCAS hold off time management on 1678MCC-1GBE path ......................................... 294
2.3.21 Ethernet auto-negotiation on single port of a path ........................................................ 299
2.3.22 Ethernet path consequent actions configuration for 1678MCC R4.3............................ 300
2.3.23 ............................................................................................ Management of ISA ES64 302
2.3.24 Path Allocate, implicit payload ...................................................................................... 308
2.3.25 Lock of BM path ............................................................................................................ 308
2.3.26 Saturation and fragmentation profiles ........................................................................... 319
Preliminary Information
WARNING
ALCATEL makes no warranty of any kind with regards to this manual, and specifically disclaims the
implied warranties of merchantability and fitness for a particular purpose. ALCATEL will not be liable
for errors contained herein or for damages, whether direct, indirect, consequential, incidental, or spe-
cial, in connection with the furnishing, performance, or use of this material.
NOTICE
The product specification and/or performance levels contained in this document are for information
purposes only and are subject to change without notice. They do not represent any obligation on the
part of ALCATEL.
COPYRIGHT NOTIFICATION
The technical information of this manual is the property of ALCATEL and must not be copied, repro-
duced or disclosed to a third party without written consent.
TECHNICAL SUPPORT
Please contact your Local Alcatel Technical Assistance Center for questions reffered to the infor-
mation contained in this document.
To send your comments about this handbook please follow the indication on Customer Documen-
tation Feedback on page 853.
PRODUCT
1354RM
Scope
This document aims to describe the 135RM Subsystem functionalities to manage a Network of regional
entity.
The list of handbooks given here below is valid on the issue date of this
Handbook and can be changed without any obligation for ALCATEL to
update it in this Handbook.
Some of the handbooks listed here below may not be available on the
issue date of this Handbook.
The standard Customer Documentation in the English language for the equipment whose product–
release–version is stated in “Applicability” on page 28 consists of the following handbooks:
The first document (the document you are reading) contains the basic network management
description, it contains also the product overview and the graphical inteface description. The
main argument is the SDH network provisioning.
The second document describes particular network provisioning : WDM, ASON and Ethernet
provisioning.
This handbook is divided into the main topics described in the table of contents:
GETTING STARTED This section aims introducing the 1354RM working environment, to
the users of the system, in terms of getting access to the system, the
environment utilities, the existing 1354RM functionalities and nav-
igation through the system
OPERATION This section describes the main steps required for the construction
of the network.
MAINTENANCE The aim of this section is to describe the operations related to the
maintenance of the protection network controlled by the 1354RM.
TECHNICAL ANNEXES The aim of this chapter is to give specific technical details on
1354RM functionalities
CUSTOMER DOCUMENTA- It contains info regarding customer opinions collection about this
TION FEEDBACK documentation.
A "product" is defined by the network hierarchical level where it can be inserted and by the whole of per-
formance and services for which it is meant.
A "product" evolves through successive "product–releases" which are the real products marketed for
their delivery at a certain "product–release" availability date.
So, a "product-release" defines a set of hardware components and a software package which, as a whole,
identify the possible network applications and the equipment performance which the specific "product–
release" has been designed, engineered and marketed for.
In some cases a "product–release" has further development steps, named "versions", that are born to
improve or add some performance (mainly software) with respect to the previous version, or for bug fixing
purposes.
A "product–release" has its own standard Customer Documentation, composed by one or more hand-
books.
A new "version" of a "product–release" may or may not produce a change in the status of the Customer
Documentation set, as described in “Handbook Updating” following part.
Handbooks are not automatically delivered together with the equipment they refer to.
The number of handbooks per type to be supplied must be decided at contract level.
Standard hardware and software documentation is meant to give the Customer personnel the possibility
and the information necessary for installing, commissioning, operating and maintaining the equipment
according to Alcatel Laboratory design choices.
In particular: the contents of the handbooks associated to the software applications focus on the expla-
nation of the man–machine interface and of the operating procedures allowed by it; maintenance is
described down to faulty PCB location and replacement.
Consequently, no supply to the Customers of design documentation (like PCB hardware design and pro-
duction documents and files, software source programs, programming tools, etc.) is envisaged.
The handbooks concerning hardware (usually the "Technical Handbook") and software (usually the
"Operator's Handbook") are kept separate in that any product changes do not necessarily concern their
contents.
For example, only the Technical Handbook might be revised because of hardware configuration
changes (e.g., replacing a unit with one having different P/N but the same function).
On the other hand, the Operator's Handbook is updated because of a new software version but which
does not concern the Technical Handbook as long as it does not imply hardware modifications.
However, both types of handbooks can be updated to improve contents, correct mistakes, etc..
The handbooks associated to the "product-release" are listed in “Related Documents” on page 30.
The edition and date of issue might change on future handbook versions for the following reasons:
– only the date changes (pointed out in the Table of Contents) when modifications are made to the edi-
torial system not changing the technical contents of the handbook.
– the edition, hence the date, is changed because modifications made concern technical contents. In
this case:
• the changes with respect to the previous edition are listed in History on page 29.;
• in affected chapters, revision bars on the left of the page indicate modifications in text and draw-
ings.
Changes concerning the technical contents of the handbook cause the edition number increase (e.g. from
Ed.01 to Ed.02). Slight changes (e.g. for corrections) maintain the same edition but with the addition of
a version character (e.g. from Ed.02 to Ed.02A). Version character can be used for draft or proposal edi-
tions.
Moreover, should the screen prints included in the handbook contain the product–release's
"version" marking, they are not replaced in the handbooks related to a subsequent version, if
the screen contents are unchanged.
Supplying updated handbooks to Customers who have already received previous issues is submitted to
commercial criteria.
By updated handbook delivery it is meant the supply of a complete copy of the handbook new issue (sup-
plying errata-corrige sheets is not envisaged).
A new product version changes the handbook P/N and the edition starts from 01.
In this case the modified parts of the handbook are not listed.
In most cases, a CD-ROM contains in read-only eletronic format the documentation of one product-
release(-version) and for a certain language.
In some other cases, the same CD-ROM can contain the documentation of different product-release(-ver-
sion)s for a certain language.
As a general rule:
• the documentation of system optional features that Customers could not buy from Alcatel
together with the main applicative SW.
• the documentation of system optional features (e.g. System Installation Handbooks related to
racks that Customers could not buy from Alcatel together with the main equipment).
A CD-ROM is obtained collecting various handbooks and documents in .pdf format. Bookmarks and
hyperlinks make the navigation easier. No additional information is added to each handbook, so that the
documentation present in the CD-ROMs is exactly the same the Customer would receive on paper.
The files processed in this way are added to files/images for managing purpose and a master CD-ROM
is recorded.
After a complete functional check, the CD-ROM image is electronically transferred to the archive of the
Production Department, so that the CD-ROM can be produced and delivered to Customers.
The CD-ROM starts automatically with autorun and hyperlinks from the opened “Index" document permit
to visualize the .pdf handbooks
Other hyperlinks permit to get, from the Technical handbooks, the specific .pdf setting documents.
In order to open the .pdf documents Adobe Acrobat Reader Version 4.0 (minimum) must have been
installed on the platform.
The CD-ROM doesn't contain the Adobe Acrobat Reader program. The Customer is in charge of getting
and installing it.
ReadMe info is present on the CD-ROM to this purpose.
Then the Customer is allowed to read the handbooks on the PC/WS screen, using the navigation and
zooming tools included in the tool, and to print selected parts of the documentation through a local printer.
2) and, internally, by the list of the source handbooks and documents (P/Ns and editions) by
whose collection and processing the CD-ROM itself has been created.
CD-ROM updating
The list of source handbook/document P/Ns-editions indicated in previous para. point 2) , in association
with the CD-ROM's own P/N-edition, is also loaded in the Alcatel-Information-System as a structured list.
Whenever a new edition of any of such handbooks/documents is released in the Alcatel archive system,
a check in the Alcatel-Information-System is made to identify the list of CD-ROMs that must be updated
to include the new editions of these handbooks/documents.
This causes the planning and creation of a new edition of the CD-ROM.
Updating of CD-ROMs always follows, with a certain delay, the updating of the single handbooks com-
posing the collection.
1.1 Introduction
This chapter covers the following topics:
• 1354RM Overview
• Preliminary Operations
• Map navigation
• Browser
1.2 Overview
1353NM is the Common Element Management Layer OS which can manage a large number of NE ver-
sions and types.
1354NP is the Fast Restoration NML application for controlling DXC meshed backbone networks.
1355VPN permits to manage Optical Virtual Private Networks at the end Customer premises.
1354RM provides the management of SDH/SONET, WDM, ASON and NP(Fast Restoration) sub-net-
works. Via the 1353NM, 1354RM controls the Network Elements.
– Physical Connection: It is the logical representation of fibers and coaxial cables, between network
ports
– NE: It represents a physical NE.Network port. It represents the physical port where e.g. the fiber is
connected.
Example:
A STM-16 port of a SDH NE.
An OTS port of a DWDM NE.
– Access port: It represents the physical port where the client signal is added/dropped.
Example:a PDH port of a SDH NE.
– HO (Higher Order) Trail: An HO Trail is a HO route (e.g. infrastructure pipe) between two (either
adjacent or not) SDH NEs. It is delimited by two CAPs (Client Access Points) and it can be configured
to carry LO traffic.
– Path: A path (can be at either HO or LO path layer) is a route established in the SDH/SONET net-
work. It is delimited by NAPs (Network Access Points).
Example: A VC-12 path delimited by two VC-12 NAPs
– Link Connection: It is an arc delimited by the two CTPs with the same timeslot and it is supported
by the same server Trail
Example: An Au-4 Link Connection is delimited by two corresponding AU-4 CTPs and it supported
by a MS-Trail.
• The map provides a network view partitioned in sub-networks, which can be partitioned in 2nd
level subnetworks, and nodes (sub-maps may have a geographical background). This map rep-
resentation is created during the network construction process.
A path can be in the defined, allocated, implemented, and commissioned state. The picture describes the
admitted state transitions.
During this phase the path description is stored in the data base; in the following the main information are
listed:
– Path name
– Protection type
– Rate
– Allocation/implementation rules
The path allocation can be performed either automatically (i.e. immediately after the creation) or manually
on user request.
During this phase the idle resources (link connections, cross-connections) are selected in order to assign
them to the path.
The routing search is performed on a lower cost basis applying the Dijkstra cost model, which assigns a
cost value to all relevant resources. The cost model is dynamic and it is influenced by the presence of pro-
tections.
Upon operator request the cost values can be:
– automatically modified, in order to provide a balanced load of the network when resources become
scarcer.
When this activity is successfully terminated, the selected resources are locked; please notice that at the
end of this phase the path does not yet exist in the network.
The path implementation can be performed either automatically after allocation or later, on user request.
During this phase, 1354RM sends the proper cross-connection (identified at allocation time) messages
to the relevant NEs via 1353SH/GEM.
Only if this scenario is successfully completed, the path becomes implemented, i.e. a real connection
between the selected endpoints exists in the network.
In this state it is possible to activate loop-backs on ports, in order to validate the path itself.
When test activities are terminated, the path is ready for service and the operator can declare it commis-
sioned. The alarm reporting related to the path is enabled, just in case it was inhibited before.
1.2.4 1330AS
1330AS is an ALMAP Generic Component, which is in charge to manage the network alarms generated
by 1354RM as soon as an elementary alarm affects a network resource (e.g. path, trail).
1330AS is the entry point for the operator to perform fault management and fault localization and it provide
capabilities for define alarm synthesis, alarm acknowledge, alarm archiving etc.
– Operator Administration functions: Add Operator, Remove Operator, List Operators, Change
Password, List Current Login, List Successful Login and List Unsuccessful Login.
– Console Administration functions: Add Operator Console, Remove Operator Console, List Oper-
ator Consoles, Lock Operator Console and Unlock Operator Console.
– System Log functions: List System Messages, List Archived Messages and List restored Mes-
sages.
– Backup & Restore functions: It is possible to automatically back-up data periodically, since on-line
full backup is supported. It is possible to do a complete full backup on Operator request and to get
information on planned actions. It is possible to disable automatic operation and restore a full or an
incremental backup. Restore is off-line and 1354RM shall be previously shutdown.
– System Start/Stop functions: Start System, Stop System, Show System State, Auto-start Enable/
Disable and Show Auto-start State.
Each network alarm (X.733 compliant) provides information about the affected resource, alarm type, prob-
able cause, severity, timestamp and so on.
All the current network alarm information is shown to the operator in the current alarms list. The alarm
fields are customizable by the user. After the operator acknowledgement and alarm clearing the network
alarm is moved into the historical alarm log. As default, the system provides alarms counters related the
total alarms in the domain and to each managed alarm severity (critical, major, minor, warning, indeter-
minate), and cleared alarms. The user can define other type counters according his needs.
Starting from the alarm list it is possible for a specific network alarm to retrieve information about the ele-
mentary alarms correlated to it.
Network management topological objects (NE, ring, sub-network,...) containing the alarmed object (TP,
port, ...) are graphically displayed according the color of the highest alarm severity.
1.3.1 Generalities
The users work environment can be partitioned into the following utilities:
– Keyboards: the different keys and the actions they induce will be defined.
– Mouse: the operation of the different buttons will be explained.
– Workspace: A workspace is the screen area where you bring the applications needed for your work.
– Icon: A small, graphic representation of an object on the workspace.
– Windows: the window's general layout, menu and configuration (size) will be described.
– Dialogue Boxes:
There are 3 Mouse buttons. The actions that are undertaken using the different mouse buttons depends
on their configuration.
With a left handed mouse configuration, button 3 becomes the select button.
– Selecting an object: first move the mouse pointer to the object. Then select the object by clicking
on it with the "Select" mouse button. The object appearance changes indicating that it has been
selected.
– Drag-and-drop mouse functionality: used for displacing objects or icons on the workspace. To use
it, first move the mouse pointer to the object you wish to move. Then press, and hold down, the Drag
mouse button and drag the object to the chosen area using the mouse. When the object has reached
the chosen area, release the mouse button.
It can be used:
To open the window menu, click on the window menu button using the "Select" mouse button. You can
then select an item from the pull down menu that appears. The window menu options are shown in the
figure below.
1.3.2.3 Buttons
– The graphical image representing the button. The buttons are generally of rectangular or square shape.
– The label identifying the action associated with the button. The label is placed on the button.
Each radio button represents a single choice selection. Selecting one radio button automatically deselects
the others in the set.
– menu bars,
– pull down menus,
– pop-up menus.
These types of menus are described in detail below. The details concern a view of the menu types on real
windows.
They are present at the top of a window, under the title of the window. They appear automatically along
with the window. An example is given in the figure below. They contain the titles from which pull down
menus and cascading menus are opened.
A pull down menu is pulled down from a menu item present in a menu bar. To open a pull down menu,
click on the title of the menu you need to open with the "Select" mouse button.
Cascading menus are derived from pull down menus and represent additional options for the pull down
menu item selected. Cascading menus are indicated if the ">" sign follows an option in a pull down menu.
Pop-up menus appear when you click, using the "Custom" mouse button, in the following cases:
In an opened menu (pull down or cascading), any item that is greyed indicates that you do not have access
to the menu item. Clicking on it will not activate it. You have access to all the items that are not greyed.
An example of an inaccessible or greyed menu item is shown below.
To select an item from a menu (any type of menu) place the mouse pointer over the item and click using
the "Select" mouse button. The item will appear highlighted.
1.3.2.4.6 Mnemonics
A mnemonic is a single letter that is underlined in a menu (in Menu bars, Pull down menus or Cascading
menus). To open a pull down menu press, simultaneously, the ALT key and the mnemonic of the pull down
menu you wish to open. The pull down menu opens immediately.
To select an option from the opened pull down menu, press on the keyboard the character corre-
sponding to the mnemonic of the option.
Entry boxes are windows in which you can consult, add or modify information or data.
1.3.2.7 Generalities
Dialogue boxes provide an interface between the Manager and the user. The main dialogue boxes are
described below.
A list dialogue box is generally a window that enables you to consult and select items from an existing
list. They have a Title heading indicating the purpose or contents of the List box. Depending on the size
of the List box, scroll bars are present or not.
Different types of List boxes can be distinguished.
As the name suggests, they enable you to select elements from a single list.
They contain:
They display the data in the form of multiple columns. You can choose from the list the item you wish,
and if possible, using the menu bar options undertake certain operations concerning the item.
They display messages and information. They require a confirmation of the action you wish to undertake.
Generally, work is suspended till the dialogue box is closed. This means that you first have to click on the
corresponding button (OK, Cancel, Help or other options) before resuming operations.
N.B. You are assigned the login name by the Manager administrator.
After a correct login, the login view is replaced by a transition view giving certain software copyright indi-
cations. This view is automatically replaced by the normal workspace view containing the Front Panel from
which you will be able to access the Manager functionalities.
Your workspace includes the functionalities that appear on your workstation screen after login.
The workspace Front Panel is described below.
To lock the screen simply click on the small Padlock icon situated on the Front Panel described above.
The screen will lock immediately. The following figure will appear on the screen.
Click on the EXIT icon on the front panel, using the "Select" mouse button, as shown in the figure
below.
A dialogue box opens from which you can confirm or cancel the "Logout" operation.
Access to the Regional Manager functionalities is provided through the workspace front panel as
described in the following sections.
1.5.1 Introduction
The 1354RM graphical interface is based on:
– Task subpanel.
The HP_CDE Tool panel ( See Figure 8.) has been customized to contain the TMN-OS Manager (right-
hand side).
Clicking on the Manager icon you can open the TMN-OS Management. ( See Figure 9.)
By clicking on the TMNOSs icon opens a window containing all the OSs icons, i.e. all the systems resident
on the server/ws. The colour of each icon depends on the OS process state:
The window contains a pull-down menu bar comprising the following menus:
– OS
Start System. This submenu is present both for RM and NM. The Start option is available
if the selected OS is in the Stop state.
Stop System. This submenu is present both for RM and NM. The Stop option is available
if the selected OS is in the running state.
Both options are provided if the selected OS is in the Wrong state (partially stopped).
System Config. This submenu is available both for RM and NM. It allows to configure
the system in terms of processes
– Actions (active only for resident Manager) containing a list of menus that vary depending on the OS
type (RM or SH) and on its actual status. The relevant OS icon must be selected. The available sub-
menus are:
User Interface. This submenu is present both for RM and NM. It permits to launch the user
interface
Performance Monitoring. This submenu is present both for RM and NM. It permits to
launch the Performance Monitoring display window.
Alarms. This submenu is only available for NM. It permits to launch the AS application.
SMF. This submenu is present both for RM and NM. It contains the following options:
Operator
Log
Trace
Failure
Scheduler
Backup
Restore
Cleanup
Initiator
– Global Actions (active only for resident Manager) It permits to launch the entire system actions.
It contains the following sub-menus:
Synchronize Systems
Alarm Federations
8) EML
9) NE
3) ALL HO TRAILs
4) ALL MS TRAILs
6) ALL PATHs
9) BACKBONE NETWORK
• automatically by the system for physical connections, OCH/HO-trail and (client)path at deim-
plementation time
Each row of the above sublist has been created, activated and saved; each row of the default sublist
has been deactivated and deleted. (The default sublist contains one row per each alarm severity).
a) From the Counter summary window open the Alarm sublist clicking twice on the relevant row of the
Counter summary window. As an alternative select the row and issue the Sublist: Open pull-down
menu item.
b) Select the alarm from the sublist and navigate it by selecting the Navigation: 1354RM pull-down
menu item. A confirmation dialog box appears. Click on OK to confirm.
– for PHYSICAL CONNECTION object the physical connection structure window is pre-
sented
– for O/MS TRAIL object the physical connection structure window is presented
Notice that in each view the alarmed object is marked by an alarm icon. By clicking on this icon a window
is presented, which gives details on the selected alarm.
– upper arrow. If you click with the left mouse button on it, the icons contained in the layered icon area
will shift to the top side of the area itself.
– TASK BAR. It contains the Alcatel logo and the icons of the tasks customized by the user. If you click
with the left mouse button on the icon of task, this causes the task to start. The task bar is custom-
izable by the user, i.e. the user can add task buttons of the most frequently used applications by
means of the utility pop-up menu, available on each system menu item. See example in the following
pages. On the other hand the user can remove a less frequently used application icon by means of
the task bar pop-up menu ( Remove item ). The user can drag these icons by pressing the middle
mouse button.
It contains:
– left arrow. If you click with the left mouse button on it, the icons contained in the layered icon area
will shift to the left-hand side of the area itself.
– TASK BAR. It contains the Alcatel logo and the icons of the tasks customized by the user. If you click
with the left mouse button on the icon of task, this causes the task to start. The task bar is custom-
izable by the user, i.e. the user can add task buttons of the most frequently used applications by
means of the utility pop-up menu, available on each system menu item. See example in the following
pages. On the other hand the user can remove a less frequently used application icon by means of
the task bar pop-up menu ( Remove item ). The user can drag these icons by pressing the middle
mouse button.
– layered icon area. This area contains the icons of the browser windows actually opened. If you click
with the left mouse button on the icon of a browser window, this causes the window to open.
System Menus can be started from the logo icon. See para 1.5.5.2.1 on page 59.for details.
1.5.5.2 Menus
INTRODUCTION
-To lauch the application/function associated to a single item, select the item with the left mouse button
MENU DESCRIPTION
Point with the right mouse button to an empty area of the horizontal task bars.The main pop-up menu is
displayed. See below figure.
– System menus. System menus contains a cascode menu of the main system applications.
– User menus. This menu is customizable by the user by means of the utility pop-up menu, available
on each system menu item. See example in the following pages.
– Close main panel. This menu item closes the panel. The panel opens automatically at browser star-
tup.
This option allows to create a new panel: edge panel (horizontal) or corner panel (vertical)
Figures which follow show the icons of the corner and edge panel
– Move applet. If you click on this menu, you will be able to move the involved icon by dragging it by
means of the left mouse button. It is the same as using the middle mous button ( pressed ) to drag
icons
– Properties...
Edge panel:
Background:
The Global Properties menu item, if selected, allows to display/modify panel configuration. Figure which
follows shows the Global Panel Configuration first dialog box: Animation.
Animation
– Auto hide animation speed ( in ms ) = delay to disappear of the panel when you move the pointer
outside the panel. This modality is in effect if you previously selected Auto-Hide in the Panel Prop-
erties: Edge Panel view. ( see previous paragraph.)
– Explicit hide animation speed ( in ms ) = delay to disappear of the panel when you move the pointer
outside the panel and a window overlaps the panel. This modality is in effect if you previously
selected Auto-Hide in the Panel Properties: Edge Panel view. ( see previous paragraph.)
– Auto Hide minimize delay ( in ms. )=delay to appear of the panel when you move the pointer inside
the panel. This modality is in effect if you previously selected Auto-Hide in the Panel Properties: Edge
Panel view. ( see previous paragraph.)
– Auto Hide minimized size ( pixels )=size of the remaining bar when the most part is hidden ( the sur-
vivor, look carefully...)
Miscellaneous
If you click on Miscellaneous button, a different set of parameters is displayed. They are:
– Tooltips enabled=enables the display of the icon help textstrigs which appear when you move the
mouse pointer over the icon
– Show buttons. If this option is enabled, the last submenus of the panel is is not available and is
replaced by a button ( see below figure). If you click on a button, the utility pop-up menu is provided,
allowing to customize groups of commands.
– keep menus in memory. This option can be used to speed-up panel performance.
The user can add task buttons of the most frequently used applications by means of the utility pop-up
menu, available on each system menu item ( see figure below ). This menu, opened via the right mouse
button, contains the following options:
On the other hand the user can remove a less frequently used application icon by means of the task bar
pop-up menu ( Remove item )
a) Point with the mouse to an empty region of the panel, press the right mouse button to open the pop-
up menu. Select Global Properties menu item.
b) From the Global Panel Configuration window click on Miscellaneous button. The Miscellaneous dia-
log box page is displayed. Select option Show...buttons. Click on OK button to confirm and close the
dialog box. If you click on Apply to confirm, the dialog box remains open.
c) Select the command or the group of commands you want to customize, marked by the button shown
in the figure below.
Select with the left mouse button the button placed on the right side of the command group line.
a) If you select Add this as drawer to panel, the Path Provisioning icon will be added to the
panel, as in Figure 29.herebelow. Clicking on the icon a vertical panel is raised, containing
the icons of the commands included in the subgroup of commands.
b) If you select Add this to personal menu, the Path Provisioning icon will be added to the
panel. Clicking on the icon a vertical panel is raised, containing the icons and the text-
strings of the commands included in the subgroup.
c) If you select Add this as menu to panel, the Path Provisioning icon will be added to the
personal menu. Clicking on the icon a vertical panel is raised, containing the icons and the
textstrings of the commands included in the subgroup.
Select with the left mouse button the button placed on the right side of the command group line.
a) If you select Add this launcher to panel, the Path Creation wizard icon will be added to the
panel. Clicking on the icon with the left mouse button, the application starts.
b) If you select Add this to personal menu, the Path Creation wizard icon will be added to the
panel.
Referring Figure 31., if you want to add the icon of the path create to the task bar, select System menus
-> Path Provisioning -> Path Creation Wizard-> Add this to launcher panel
Figure 31. System menus: Path Provisioning: Path Creation Wizard: Add this to launcher panel
N.B. The window icon pop-up menu allows to close or restore the window
1.6.1 Overview
The User Interface of the 1354RM is the Browser. It allows to open many applications.
Netview allows to create and display the topological objects (Network, Subnetwork, Ring, Node, SDH
Port) and the physical connections involved.
In any submap, by clicking twice on an object, the submap associated to the object opens.
The different submaps are described in next Chapter "Navigation". It describes the Navigation procedures
among the Netview submaps.
– Network submap.
– Subnetwork submap.
– Link submap.
– a main view which allows to navigate among all the topological and connectivity objects;
• LO Paths in a HO-TRAIL
• Node view
• Nap view
• Path List
• Trail List
• NAP List
• CTP List
• CAP List
• Port List
• Performance Measure List
• Alarmed Object List
• Alarm Profile List
1.6.2.1 Wizard
Wizards make use of a driven approach to better help the user in executing the requested procedures.
Each wizard is constituted by a fixed sequence of dialog boxes. For each dialog box the user is requested
to enter some parameters, names or values, and after filling the box the user passes to the subsequent
box by clicking on Next button.
Each box ( with the exception of the first one ) contains also the button Previous, which allows the user
to check / change the previously entered values.
The last dialog box contains the button Finish, which launches the execution of the procedure concerned.
1.7.1 Introduction
It is possible to start The Netview application from browser, pointing to the Network domain icon and issu-
ing the pop-up menu Display: All Related Items.
Select item Network Domain view and click on No Filter. Netview opens, showing the Network icon(s).
PULL_DOWN MENU
SHOW/
ATTRIBUTE
GET PARENT
GET PARENT
EXIT OBJEC
POP-DOWN SHOW
ALIGN
GET RELATED OBJECTs ITEMs USER
SAVE
HIDE BACK-
COORDINATES
GROUND
RESIZE OBJECT
N.B. Menus and tool buttons change according to the selected object. By moving the mouse over
the tool button icon, a ballon help is shown, explaining the operation invoked by the button itself.
– Zoom In to enlarge the working area of the map view. This item allows the operator to increase the
current scale factor. The view center point does not change.
– Zoom Out . This item allows the operator to reduce the scale of the current scale factor. The view
center point does not change.
– Fit. This item allows the operator to return to the original size and center of the view.
Release mouse button. The selected rectangle fits the working area.
b) Clicking twice on the network icon, the network map is opened. It contains the subnetwork symbols
along with their physical connections (see example in Figure 37.)
d) Clicking twice on the icon of the 2nd level Subnetw, the submap of the objects belonging to it is pre-
sented (see example in Figure 39.on page 75)
Select the Physical Connection and click on icon Physical Connection structure. The Physical Connection
structure opens.
On each object represented in the map, the object pop-up menu can be opened. See Figure 42.
By means of the selection button on the horizontal palette you can select the layer, e.g. TU-12, as in figure
below.
The three numbers beside each link represent the amount of total, busy and free resources.
1.9.1 Introduction
The Browser is an application which provides multiple navigation views. It supports full view of MIB data
objects or tailored views. The commands available in the browser depend on user's profile.
• Help on item (Balloon help). A textstring describing the function is presented if you leave the
mouse more than one second on the functional button/object.
• Context-sensitive help. If you select the object and the pull-down menu Help on selected object,
the Worldview application starts and displays automatically the description of the selected
object class.
The Browser is based on the approach to enable navigation into all, a portion or a view of the containment
tree.
• An icon related to the class (a bitmap) that can be related to one or more attribute values. Exam-
ple:
• An alarm icon that appears only when the object is alarmed, whose color is related to the alarm
status value.
• Indentation
• Search (Display)
• Details
– logo
• help area providing the following information:
• values of displayed attributes.You get this information moving the mouse to the
involved object in the work area.
• function button description. You get this information moving the mouse to the
involved button in the button box.
• events flag indicator (Create not processed, Delete and Update processed).
– Display parent item. It corresponds to the pulldown command Actions:Search:Parent and/or to the
popup command Search:Parent.
– Align item(s). It corresponds to the pulldown command Actions::Align item(s) and/or to the popup
command Align item(s).
– Topology tools. If you click on this button a submenu is opened. It includes the following buttons:
• go to parent menu
• go to home menu
• Create Node
• Create Physical Connection
• Shared Risk Group Management
Configuration Tools (CFG). It shows the configuration tools. If you click on this button a submenu is
opened. It includes the following buttons:
• go to parent menu
• go to home menu
– Path tools. If you click on this button a submenu is opened. It includes the following buttons:
• go to parent menu
• go to home menu
• Create path
• Add Constraints to a path/trail
• Add leg to a path
• Show scheduled operations
• WDM Connectivity Tool
• Add/Remove protection
– Alarms tool. If you click on this button a cascode submenu is opened. It includes the following but-
tons:
• show alarms at server layer
• Report elementary alarm correlation
• Show active alarms
• Create Alarm profile
• Alarm Management wizard
– PM. It shows the performance monitoring tools. If you click on this button a submenu is opened. It
includes the following buttons:
• Create Measure
• Correlate transport to a measure
• Merge measure
• Show PM Data
– Tools
• go to parent menu
• go to home menu
• Active counters
• Event Log. It starts the Event Log application.
In the Total, Visible and Selected field are shown respectively the total number of displayed items, the
number of visible items and the number of selected items.
In the Browser main window work area are displayed the retrieved items that are configured to be shown
in that window (eg. Nodes in topology from the ET). Retrieved items can be also displayed in Drawing Win-
dows and in Multicolumn Windows (eg. All nodes from Network, Network Domain and Root Domain) and
will be detailed in the next paragraphs; in these cases a group icon that refer to the relative window is dis-
played in Browser Main Window work area.
Object filtering and scoping is supported through the Search:Main related items and Search:All related
items. Filtering can be performed with:
Using the popup Search:Main related items or Search:All related items, or selecting one or more items
and using the icon button Display Related Items or the pulldown Actions:Search:Main related items or
Actions:Search:All related items a Chooser window of available navigation is shown:
Clicking on the Options ... button the Define Query For window is shown (see next paragraph)
The DEFINE QUERY window is used to display a list of attributes of the selected object. This window has
a standard structure, described in the following:
– Window label The window label is: DEFINE QUERY FOR <object class name >
– Parameter group buttons The parameters are divided in groups. Each button activates the display
of the parameters belonging to that group
– Selection parameters The selection parameters are structured in three columns: attributes, filter-
criterion , value.
– Control buttons Three control buttons are provided: Apply, Cancel and Help
The left-hand column contains the list of all the attributes of the selected object
The central column (option button) specifies the filter condition. A pop-up menu can be opened, which
allows to select among the options.
If attribute is of type string the pop-up menu which can be opened is the following:
– Start with.This filter condition provides the instances which start with the specified string in the rel-
evant MIB data.
– Match exactly.This filter condition applies an exactly match between the field specified and the rel-
evant MIB data.
– Contains. This filter condition provides the instances which contain the specified string in the rele-
vant MIB data.
– Doesn't contain. This filter condition provides the instances which do not contain the specified string
in the relevant MIB data.
If the attribute is of the type enumerated, the pop-up menu which can be opened is the following:
– None
– Equal to
– Not Equal to
The right-hand column contains the attribute values. The value can be entered in text field, for the types
integer, date and string. The value can be entered as option for the type enumerated.
The function of the filter is an AND of all the previously specified conditions.
In case the selection is handled by pointers instead of containment tree, the filter is disabled.
The Show attribute operation is startable from popup Details:Show/Set attributes, from the pulldown
Actions:Details:Show/Set attributes and from Show/Set attributes icon and allows to display the
"ATTRIBUTE VALUES FOR" window that shows the item attributes retrieved.
The "ATTRIBUTE VALUES FOR" window is quite similar to the "DEFINE QUERY" window and is used
to display or change value in MIB of the selected object's attributes. This window has a standard structure,
( see Figure 50.) described in the following:
– Window label The window label is: ATTRIBUTE VALUE FOR <class> <item label>
– Parameter group buttons The parameters are divided in groups. Each button activates the display
of the parameters belonging to that group
– Parameters The parameters are structured in three columns: attributes name, set buttons (set and
set to default) present only if the attribute is modifiable, fields or option buttons.
– Control buttons Three control buttons are provided: Apply, Cancel and Help
N.B. It is possible to copy a set of attributes from a certain object and paste them into another object
of the same class. Select the source object from the object list and issue Edit: Copy Attributes.
A selection box is opened, which allows to select, among the ‘clonable’ attributes, the attributes
to be copied.
Then select the sink object from the object list and issue Edit: Paste Attributes.
– select within a path list already displayed in the browser, all the paths where the configuration state
is allocated and the customer name matches a given value or pattern. After the selection, the con-
figuration action required can be issued.
The available commands and the behavior result from the following table:
Select All Not available All the items in the current Not available
multi column list are
selected
Select All the children of the given Not available Not available
All related items selected object are
selected
Unselect All All the selected objects are All the selected objects are All the selected objects are
unselected unselected unselected
Select related A mask with the possible Not available A mask with the possible
items .... children classes for the classes displayed in the
selected object is pre- view is presented.From
sented. From this mask, this mask, the user can
the user can select a class select a class and, option-
and, optionally, the ally, the detailed filter to be
detailed filter to be applied applied (see description for
(see description for multi- multi-column view).
column view)
Select .... Not available A mask with the attributes Not available
of class displayed in the list
is presented. The user can
define a sequence of con-
ditions in order to perform
the needed selection.
The purpose of this procedure is to retrieve from the MIB data base the main information related to the
selected object. The relationship between the selected object and its related items is described in the
object containment tree. In detail, this relationship can be though as a father-child relationship or a pointer
relationship.
This operation can be executed either from the Actions pull-down menu, that starts the get operation of
all selected objects (they MUST belong to the same class) or from the object pop-up menu that starts the
get operation only on that object.
This operation can also be launched by double-clicking the object or clicking on the Get object from MIB
icon of the icon bar.
SEQUENCE
a) Select (left click) one or more object to browse and Actions: Search: Main Related items....
The related item selection window is displayed. This window contains the list of child classes of the
selected object.
b) Select the class to display and the search mode (Filter/No Filter). If you select No Filter the related
objects (children) of the selected object are displayed below the father icon.
If you select Filter the Define Query window is displayed (See Figure 49.).
The box containing the available related objects is indentated with respect to the symbol of the father.
c) You can continue displaying related items for an object selecting again Search: Main related items
pop-up or pull-down menu item, according to the database hierarchical tree.
This command is analog to the command Actions: Search: Main Related items... (see paragraph
1.9.2.6) The only difference is that all related items are available to be displayed.Actions: Search: Parent.
The purpose of this procedure is to retrieve from the MIB data base information related to objects that con-
tains the selected one. The relationship between the selected object and its parent is described in the
object containment tree. More in detail, this relationship can be though as a father-child relationship or
a pointer relationship.
This operation can also be launched by clicking on the Get parent object from MIB icon of the icon bar
or from the object pop-up menu.
The Parent object is displayed in the Browser window below the icon of the child object.
This menu, if selected, provides a mask with the possible children classes for the selected object.
From this mask the user can select a class and, optionally, the detailed filter to be applied.
This operation can be executed also from the object pop-up menu.
This operation can be executed also from the object pop-up menu.
This operation can be executed also from the object pop-up menu.
The purpose of this procedure is to remove the selected object and its opened children from the window.
This operation can be executed also from the object pop-up menu.
The purpose of this procedure is to remove from the window the specific child class of the selected object.
This operation can be executed only from the Actions pull-down menu.
b) Make use of the Actions pull-down menu. Select Close: Items by Class.
c) The child selection window is displayed. One/more child class can be selected (left click).
d) Pressing the OK button the select classes are removed from the screen.
This command removes from the window all displayed children of the selected object.
This operation can be executed also from the object pop-up menu.
a) Select (left click) one/more object/s whose related items have to be removed.
The purpose of this procedure is to align the data displayed on the screen to MIB data.
This operation can be executed from the object pop-up menu and the pull-down menu.
b) Select Actions: Align item(s) or by using the right mouse button, select Align item(s)
This allows to show attributes of an object or modify the value of the simple attributes (Modifiable at UI)
in the MIB data base.
This operation can also be executed by clicking on the Show/Set attributes icon of the icon bar or from
the object pop-up menu.
b) Select Show/Set attributes. A dialog box is presented. It contains the object's attributes.
The attribute that cannot be modified is displayed without any
If the user selects the option Set, will enter the new value in the area of the field (string, integer and
date type) or set the new enumeration value.
If the user selects the option Set to default, the attribute will be set to the default value.
c) After entering the modifications, select Apply. The attribute will be modified.
The Show/Set dialog box also contains the Cancel button, which causes to abort the procedure and
close the window and the button Help providing the relevant Help information.
The purpose of this procedure is to display the information relative to the selected object class.
This operation can also be executed by clicking on the Details on the displayed information icon of the
icon bar or from the object pop-up menu (Details: Displayed info..).
SEQUENCE
Same as 1.9.2.16
1.9.2.18 View:Report
These options specify if the pull-down Search Related Items action is filtered or not when only one child
class exists.Options: Overlay windows
The purpose of this option is to overlay or not the opened browser windows.
The purpose of this option is to break off the talking between browser and AS application
The purpose of this option is enable/disable the task bar to contain iconified browser windows. The fol-
lowing selections are allowed: Vertical / Horizontal / Show / Hide.
– pop-up ( or double click ). This menu, if selected, causes the re-display of the iconified window on
the screen.
– pop-down. This menu, if selected, iconifies in the browser working area the relevant window.
– close. This menu closes the window.
1.9.2.22 Specific
It contains menus which depends on the selected item (typically specific actions).
1.9.2.23 Windows
It contains the list of opened windows (views and multi column lists). Iconified windows can be deiconified,
deiconified windows can be iconified.
1.9.3 Navigations
It allows to open views containing items built after AS navigation and navigation from external tools
(eg: setup trail, path creation). The menu has following submenus:
– from AS. It opens a browser instance containing objects navigated from the Alarm Surveillance
application.
– from Others. It opens a browser instance containing objects navigated from the Netview application.
A simple but complete GUI allows the user to perform these tasks (creating/modifying/deleting counters
(with their conditions) and monitoring objects) easily and quickly.
1.9.4.1 Overview
This section briefly describes how Active Counters feature works while illustrating the structure of this doc-
ument.
Every counter is defined by a name (its identifier), a description (generally longer than the name and useful
to understand/remember the meaning/use of the counter) and a condition.
A counter's condition is defined by the class to which is applied (route, high order CTP, TMLSTrail, etc.)
and a list of "terms" that represents the sub-conditions to apply to the single attributes of the class' ele-
ments (see 3.1 - Conditions).
In addition to schema classes, metaclasses (see 2 - Metaclasses) can be used to define conditions
– the number of objects "losing" the condition since the epoch (out)
– the number of objects "taking" the condition since the epoch (in)
– the objects repeatedly losing and taking the condition since the epoch (ups-and-downs)
These four values are called subcounters (of the counter) and are the values that the user will monitor.
The Active Counters feature uses as an epoch the time at which the user activated it. While the feature
is active the user can reset the epoch of any of the counters (or all of them) to the current time, so to restart
the count.
1.9.4.2 Metaclasses
Metaclasses are "virtual groups of classes", in order to handle counters defined on more than one class
Metaclasses have no real disadvantages over multiple classes while having two main advantages:
– the logic of the feature is simpler, thus keeping the design simple and, therefore, lowering the cost
of implementation and maintenance;
– from a user perspective, conditions that spawns multiple classes behave exactly as single-class con-
ditions. Moreover the user doesn't need to know whether he's dealing with a single class or a meta-
class.
Metaclasses are configured on a per USM machine basis, so they are stored in the file system of the
machine that hosts the USM. This means, amongst other things, that, if there is more than one USM
machine, is to the administrator to supply every machine with its own copy of the metaclasses configu-
ration file.
Metaclasses can only be defined/modified/removed by the administrator while other users can only use
them.
In this document we will talk of simple classes when we wish to refer to schema classes, we will talk of
metaclasses when we wish to refer to metaclasses and we will talk of classes referring to both schema
classes and metaclasses.
– the name of the metaclass must be unique among class name, i.e. it can't have the same name of
an existing simple class or of another metaclass;
As already told, metaclasses have been designed to minimize their impact on design, while needing some
support at implementation level.
In practice, a counter based on a metaclass is implemented creating one counter for each joining class.
Each "derived" counter has a condition obtained converting the original (meta)condition, in this way:
– the terms of the derived condition are the original terms, except that:
• if the metaattribute of the original condition is handled by the joining class, the attribute of the
derived condition is the joining attribute for that joining class;
• if the joining class does not handle the metaattribute of the original condition, the term is not
included in the derived condition.
In spite of all this deriving/translating work, the end user only sees the original counter, while the derived
counters are invisible to him.
1.9.5 Counters
Every counter is defined by:
– a description: generally longer than the name and useful for the user to understand/remember the
meaning/use of the counter;
– a condition: a counter's condition is defined by the class to which is applied (route, high order CTP,
TMLSTrail, etc.) and a list of "terms" that represents the sub-conditions to apply to the single
attributes of the class elements
Given the counter's condition, if we define a time origin that we call "epoch", at a given time (equal to the
epoch or after it) we can calculate four values:
– the number of objects "losing" the condition since the epoch (out)
– the objects repeatedly losing and taking the condition since the epoch (ups-and-downs)
These four values are called subcounters (of the counter) and are the values that the user will monitor.
The epoch is the time at which the user activated the Active Counters feature. While the feature is active
the user can reset the epoch of any of the counters (or all of them) to the current time, so to restart the
count.
In addition to the concise view of subcounters, the user can inspect the situation with greater detail dis-
playing the list of the items that are counted by a specific subcounter. These lists are implemented using
the standard Browser's list, with the notable exception of lists opened for counters base on metaclasses.
In this case, in fact, we have implemented a special multilist widget that, visually similar to a standard
browser's list, is capable of displaying multiple lists of items in the same window.
Active Counters are defined and used on a per user basis, so that every user will have/will be able to create
its own counters independently from other users. Note that different Unix logins, even impersonating the
same operator, are considered different users.
A requirement for Active Counters is persistency for different sessions of the same user.
This current implementation supplies a per USM machine persistency, i.e. the counter definitions are
stored in the file system of the machine that hosts the USM. This means that different machines hosting
the USM will have different counter definitions. Moreover, because of the per user nature of the counters
a unique configuration file in the user's configuration directory will store its definitions.
1.9.5.1 Conditions
A condition is defined by the class to which is applied (route, high order CTP, TMLSTrail, etc.) and a list
of "terms" that represents the sub-conditions to apply to the single attributes of the class' elements.
Classes that can make part of conditions can either be simple classes or metaclasses. But non all simple
classes can make part of conditions: in fact, not all simple classes are suitable/sensible to be counted (e.g.
classes that are never instantiated, but serves only as base classes to derive from). The subset of count-
able classes is not configurable by the end user.
Not all attributes of countable classes are allowed to make part of terms, in fact, only enumerated or string
attributes are allowed and only if they are primitive attributes (so IATTR and XATTR are excluded).
· if the term's attribute is an enumerated one, the possible operators are: equal and not equal;
· if the term's attribute is of string type, the possible operators are: starts with, matches exactly, con-
tains, ends with, doesn't contain and differs from.
1.9.5.2 NAD
From an NAD point of view, active counters created by a certain user take into account only objects that
such user can access (or at least objects on which it has some visibility). Then:
– every object's security label is known: i.e. AVC events (and also other events) must bring security
label;
– a function that, knowing the user's rights, filters incoming events basing on the user's access rules.
Currently these two requirements can't be achieved, therefore, at least for this first release, the active
counters feature will behave differently, depending on user type:
– for administrators: objects handled by the feature will be all the object accessible by the operator (i.e.
all);
– for non-administrators: each counter will count every object satisfying its condition (also those not
visible/accessible by the user), but only accessible objects will be displayed by lists.
1.9.5.3 FAD
As for NAD, there is a different access/use of functions whether the operator is an administrator or not:
– operator will be able to define new metaclasses and/or modify existing ones , to be used by all the
operators;
– all the lists opened through the Status Window will update in real-time, thus reflecting the respective
counter's status ;
– any lists opened through the Status Window will not update, unless the user requests a refresh.
– the Status window: a flying window that allows the user to display and manage the counters;
– the Create/Modify/Show Counter widget: a widget that will allow the user to create, show and/or mod-
ify existing active counters;
– the Multilist widget: a modified Browser's list that displays item's from different classes.
1.9.6.1 Monitoring
The Status Window is a standard window provided with its own menu, its own toolbar and the list of active
counters defined by the user.
The user will open the Status Window through the Tools menu of the Browser's main window .
The counters are presented in a table-like layout, showing for each active counter the following items:
– the Counter name: a user defined label used to identify the counter
– the Tot (Total) count: the absolute number of objects that match the condition;
– the In count: the number of objects "taking" the condition from the last reset command;
– the Out count: the number of objects "losing" the condition from the last reset command
– the Up&Dw (Ups-and-downs) count: the number of objects "double-flipping" the condition from the
last reset command.
The monitor window displays all the active counters defined by the user and allows him to:
– show an existing counter definition either via the Actions menu (that will show the selected counter),
via the popup menu (that will show the active counter on which the right click has been performed)
or using the toolbar;
– modify an existing counter definition either via the Actions menu, via the popup menu or using the
toolbar;
– remove an existing active counter either via the Actions menu, via the popup menu or using the tool-
bar;
– reset an existing active counter (resetting In, Out and Ups-and-downs values) (via the Actions menu,
via the popup menu or using the associated toolbar icon);
– reset all existing counters (via the Actions menu, via the popup menu or using the associated toolbar
icon), after a user confirmation;
– create a new active counter (via the File menu or using the associated toolbar icon)
– counter save (via the File menu or using the associated toolbar icon); If a counter is changed and
the operator doesn't use this save, when he will close the Status Window a popup will point out the
loss of modification if the save is not invoked and the confirm of the exit operation.
– show the list of counted items via the Actions/Lists menu, via the Lists submenu of the popup menu
or as follows:
• double clicking on the Out value will open the list of objects "losing" the condition of the active
counter from the last reset;
• double clicking on the Tot (Total) value will open the list of objects that match the condition of
the active counter;
• double clicking on the Up&Dw (Ups-and-downs ) value will open the list of objects double-flip-
ping the condition of the active counter from the last reset.
The lists opened are not up-to-date, they can be up-to-date using the refresh function.
Even if not shown in the above figures, the columns for the four subcounters have different background
colors, in order to quickly recognize them. In addition, when a subcounter leaves the reset state its cell
is highlighted to capture the attention of the user.
The approach proposed is the bottom-up type and consists to create before the terms of condition and
In this form all is disabled but the two text fields (name and description of counter), the option box for the
choice of the class to monitor and the cancel button to annul the counter creation.
After attribute selection, the window changes to allow the selection of the operator and the value(s), so
that:
– if the attribute is an enumerated one, an option box with the two foreseen operators ("equals", "not
equals") is followed by a list box with the attribute possible values:
– if the attribute is of type string, an option box with the string operators ("Starts with", "Matches
exactly", "Contains", "Ends with", "Doesn't contain" and "Differs from") is followed by a text box in
which the user will type the string to compare to the attribute:
When the first term is created, the option box Monitored Class is disabled and it is not possible to change
the class. If all terms are removed the option box is enabled again.
– the list with the multiple selection Subconditions, lists all terms created by user and all partial con-
dition created joining two or more terms;
– in every moment, it is possible to create new terms clicking on Add new up to the maximum limit of
six terms;
– if a term is selected in Subconditions and you click on Modify, the term modify form is opened.
– if one or more elements (simple terms or partial condition) are selected, it is possible to delete clicking
on Remove (with a confirm by the user);
– if two or more elements (simple terms or partial condition) are selected, it is possible aggregate them
using AND Join or OR Join, so a new partial condition with the selected elements joined by AND
or OR (according to the push button selected) is obtained. Moreover, the original elements are elim-
inated. If, for example, we select the fist two terms and clicking on AND Join we obtain:
– if one or more elements that represent partial condition are selected, it is possible to decompose
them using the Split button. See above figure. Split cancels the previous aggregation operation. So,
selecting on the first row of the above figure and clicking on Split, the following arises:
– since the partial condition can became long, can be difficult for the user examine a partial condition
only using the Subconditions list, so the last partial condition selected is displayed completely in
Selected subcondition field;
– the Overall condition shows as would be the final condition if all partial conditions were aggregated
using the function button (AND or OR) ;
– the OK button confirms the counter creation with the condition shown in condition
1.9.7.1 Modification
The form of counter modification is equal to the creation one but the differences described below:
– The form shows counter data (name, description, class and condition);
To modify the active counter, first select the counter and the issue the Modify pop-up menu. See Figure
68.herebelow.
1.9.7.2 Visualization
For the visualization of Active Counters, issue the pop-up item Show. The same form of modification is
used except that user cannot modify values. See figure which follows.
Lists are displayed using the standard Browser's lists, sole exception are lists for metaclasses that are
displayed using the special Browser's multilists that allow to display multiple list of objects of different
classes into the same window.
The lists opened from Status Window (with double click on the column chosen) have as title the column
name ("In", "Out", "Tot", "Up&Dw") followed by the "counter name".
1.10.1 Introduction
Drawing windows support:
• Help on item (Balloon help). A textstring describing the function is presented if you leave the
mouse more than one second on the functional button/object.
• Context-sensitive help. If you select the object and the pull-down menu Help on selected object,
the Worldview application starts and displays automatically the description of the selected
object class.
• Icon bar
– Close window. It forget the window and all its opened ones. This operation can also be executed
from the pulldown menu (File:Close).
– Hide window. It hides the window. It can be redisplay without any re-get. This operation can also
be executed from the pulldown menu (File:Popdown).
– Go to the parent window. It goes to window from which this one has been opened. The current
drawing is hidden or not, depending the status of Options:Close window going to parent on browser
main window (see paragraph 1.9.2.21)
– Display Main Related Items. It navigates the selected object(s) on browser main window. The chil-
dren chooser is automatically proposed (Main related items). This operation can also be executed
by double click on object or from the object pop-up menu (Search:Main related items)
– Show/set attributes. This allows to show attributes of an object or modify the value of the simple
attributes (Modifiable at UI) in the MIB data base. This operation can also be executed from the
object pop-up menu (Details:show/Set attributes) or from pulldown menu (Actions:Details:show/Set
attributes)
– Align items (s). It alignes the data displayed on the screen to MIB data. Almost one object must be
selected. This operation can also be executed from the object pop-up menu (Display:Align items(s))
or from pulldown menu (Actions::Align item(s))
– Refresh this window. It deletes all items and re-gets all data. Note that all children views/multicol-
umns lists are closed.
– Order Items. It allows to manage the order and size of the table columns
– Hide/Show attribute counter. It allows to display the attribute counters referred to the displayed list
The second row depends on the specific view. It typically allows to open an application (eg. Setup trail,
Payload configuration, Path/Trail constraints) or views to create instances or to correlate objects to each
others).
The third row depends on selected class. It dynamically shows icons to open view/multicolumn list asso-
ciated to selected object.
a) From the Node list ( see Figure 71.) select the node and click on Navigation button. The Node icon
is displayed in the Browser main window. ( already selected ).
1.12.1 Overview
The help is based on world wide web technologies. The topics are written in html. Netscape Gold is the
browser used to navigate through the html pages and it is also used to edit the user personal pages. Nav-
igation through the help is also possible using a customized navigation bar permanently displayed in the
left of the help screen
The menu options are in fact entry points to the main help system. Once you have entered the help system
via one of these menu options, hyperlinks enable you to navigate to other parts of the help system and
to view other help topics.
2.1 Introduction
Network operation comprises the following topics:
– Topology management
– Configuration
– Transport management
– Network modifications
– Statistics tables
– Network Construction
– Payload Configuration
– Upload NAPs
The network construction consists in representing the whole managed network with the necessary sub-
maps and creating all the required objects in the RM-MIB data bases.
For each submap you can add a background. Select Save Background, select the suitable background
and click on OK.
SEQUENCE
a) From browser, point to the 1354RM network domain and issue the Create: Network pop-up menu.
See Figure 76.on page 120
b) In the Create dialog box enter the Network name and click on Create button. See Figure 75. The Net-
work icon appears in the New Object Holding Area. Drag (holding the middle mouse button) the icon
into the window.
N.B. Many networks can be created. It is not possible to interconnect the networks to each other
N.B. Alternatively, from browser, point to the 1354RM network domain and issue the Create: Net-
work pop-up menu. See Figure 76.on page 120
SEQUENCE
a) The subnetwork objects are created in the Network submap pointing to the network icon and issuing
the Create: Subnetwork pop-up menu.
b) In the Create:Subnetwork dialog box (see Figure 79.) enter the Subnetwork name and click on Cre-
ate button. The Subnetwork icon appears in the New Object Holding Area
c) Drag the icon to the window work area. See Figure 80.
SEQUENCE
a) The 2nd level Subnetwork objects are created in a Subnetwork submap pointing to the subnetwork
icon and issuing the Create: 2nd level Subnetwork pop-up menu. See below figure.
a) The Create dialog box is presented. See Figure 82. Enter the following values:
• name
b) Click on Create button. The 2nd level Subnetwork icon appears in the New Object Holding Area
c) Drag the icon to the center of the window. See following figure. Double click on the icon to open the
submap.
SEQUENCE
The Node object is the representation of the network element in the 1354RM map. A node can be inserted
either in the Subnetwork submap or in the 2nd level submap.
a) Select the Subnetwork or the ET where the new node has to be inserted and issue the menu Actions:
Create: Node. See Figure 85. The Node Creation wizard is displayed. See Figure 86. Notice that
NAP automatic upload is the default.
b) Click on NE list button. The list of the available NEs is displayed. Select the NE and click on Apply
button. The selected NE icon is now present in the list of the wizard.
– the NE is pasted to the map in the new object holding area (See Figure 88.) and its related node is
created in the data base.
d) Drag the node/s just created to the map working area. See Figure 89.on page 128
SEQUENCE
a) Select from the map the topology (subnetwork or ET), which will contain the new External Network
and issue: Create : External Network.
b) The Create External Network wizard is displayed. Enter userlabel and location and click on Finish
button. See below figure.
c) The External Network Reference is created and displayed in the New Object Holding area. You can
drag the object to the center of the map.
a) From the map select the external network/s to connect and issue Actions: Create: Physical Con-
nection.
c) Select the connection type, enter the connection name and click on next button
d) Select the real node from the node list and enter the external network name. Click on Finish button.
NOTE
After creating the virtual objects, you could follow the usual procedures:
NOTE
The user can modify, by means of the Show/Set Attributes window, the userlabel of an external network
and the userlabel of a port belonging to an external network.
The Create Connection can be started from the map by selecting source node / destination node and issu-
ing the command Actions: Create: Connection.
The Create Connection wizard allows to select the connection type among:
– SDH-CBR/WDM interworking, where CBR=constant bit rate. See Figure 97.on page 135
If you select connection type=SDH, you will further select the STM type
If you select connection type=WDM, you will further select the WDM connection type between OPS and
OTS, where:
OTS (Optical Transmission Section) is used for connections between different WDM nodes.
OPS (Optical Physical Section) is used for connections within the same WDM node, originated and ter-
minated to the same node.
SEQUENCE
a) From the create connection wizard, select connection type=SDH, STM type and enter the connec-
tion name. Click on Next button.
b) Click on A-Term Node List. From the A-termination Node list (upper-right part of), select the node
to connect and click on Apply button. The icon of the selected Node is now present in the Create con-
nection dialog box.
c) Click on A-Term Port List. From the A-termination Port list select the port to connect and click on
Apply button. The icon of the selected Port is now present in the Create connection dialog box.
d) Execute the selection of the terminating node/port following the modality explained at above points
b) and c). Click on Next button.
g) Select the transport (physcon) alarm enabling rule (when created, when implemented)
i) Enter the allocation cost. This is the nominal cost of the physcon which will be used by the allocation
algorithm (Dijkstra static)
j) Select the saturation profile. Click on selection button. The list of the Saturation Profiles is displayed.
See below figure. Select the profile and click on Apply to confirm. For detailed information see SEC-
TION Technical Annexes.
The noExtraCost saturation profile will be used for no saturation policy in path allocation. The noExtraCost
saturation profile is the default.
The predefinedExtraCost saturation profile has been defined in order to satisfy configurations with dif-
ferent physcon costs
scroll left
scroll right
k) Select the fragmentation profile. Click on selection button. The list of the Fragmentation Profiles Pro-
files is displayed. See below figure. Select the profile and click on Apply to confirm. For detailed infor-
mation see SECTION Technical Annexes.
NOTE. The defragmentation is a structured (traffic) mechanism which helps resource(trail,physcon) fill-
ing. In practice, depending on the traffic distribution on the resource, an additional allocation cost is eval-
uated, if the allocation being requested rejects the possibility of subsequently allocating a rate higher than
the one being requested. It is obvious that in a resource nearly empty, the allocation cost of a new traffic
is greater than the allocation cost of a resource almost filled.
For easy of understanding, an analogous mechanism is applied for last minute trips or for some young/
old resources.
scroll right
The Previous button allows to revert to the previous screen, in order to modify node/port selection,
connection name...
m) Wait... After the connection create the physical connection structure view, if required, is displayed.
See below figure.
• Having created the connection, an external connection symbol is created in the submaps which
contain the connected objects. The external connection symbol label contains the name of the
object connected at the other end plus the connection name.
Linear MSP schemes need to be carefully managed by the operator. For detail see paragraph
which follows.
The user can create new saturation and fragmentation profiles, if needed in network planning.
From the Create Connection step2 wizard click on button Saturation or Fragmentation profile creation.
p) Figures which follow, show respectively Saturation or Fragmentation profile creation dialog boxes.
For detailed information see SECTION Technical Annexes.
NPAs are:
SNCP, 2f MS-SPRings, 4f MS-SPRings, Linear MSPs (e.g. 1:n, 1+1), ASON /Fast Restoration
SNCP rings do not use any dedicated protection mechanism related to the ring itself, but, RM treat them
in a special mode for the path routing and protection.
– The interconnections between the Nodes (physical connections) entered manually or using the auto-
discovery function (based on J0 or on NE cables)
No strict relation exist anymore in RM between topologies (used for partitioning) and protections. In pre-
vious RM, ET topologies were used to represent both a protection and partitioning of the network.
The ET (Elementary topology) can be considered a second level sub-network removing the payload con-
figuration capability and the statistics related to the configuration
N.B. For the scenario "adding a DXC NE in an MS-SPRing" (with split operation), the work-around
is to configure the MS-SPRing on SH before enabling the download on DXC NE.
N.B. For the scenario "removing a DXC NE from an MS-SPRing" (with join operation) the work-
around is to de-concatenate the concerned AU4s from CT before enabling the download on
DXC NE.
N.B. In MS Spring-2F it is possible to insert a Network Element not managed by 1354RM. This fea-
ture is managed also by RM batch utility. For details refer to the Administration Guide.
SCOPE
• the type,
the involved physical connections and, if applicable, their associated role (e.g. Working or Pro-
tection for 4f-MS-SPRing, and Linear MS-P).
For ASON NPA, the user must specify also the physical connections used for the interworking with the
rest of the network
Within the tool, the involved physical connections can be retrieved browsing from the initial topology(*)
or from a different one reached through up & down navigations.
The NPA definition ends with the creation in RM of a NPA and its visualization on the user Interface
The NPA can be created even if not valid (e.g. a ring can be open or even empty) but RM always provides
to the users the proper warnings.
Dependently from the type of NPA to be created, the creation activity requires different information and
performs different checks:
A SDH physical connection can only belong to one NPA with the following exceptions:
A SDH physical connection is present in RM also when supported by a WDM network. The server OTS
or OPS physical conn. Are, in RM, not part of any NPA
SNCP rings must have the same uniform rate and east/west sequence is checked for first gen. NEs
SEQUENCE
b) The Create: Npa: Step 1: dialog box opens. The following cases may arise:
It is an extra cost to pay for the usage of a NPA. It has the target to make costly to enter and to exit from
a Network Protection.
As bigger is set as more the routing in the current NPA will be preferred compared to a less expensive
detour outside the NPA in the meshed network or in another NPA.
It is not considered for the spare that uses the same ring of the main.
If set to more than half of the cost of a physical link (Default value TBC), the routing is done as it would
be having only not stacked protections and an internal route is preferred to an external one even if it has
a double cost.
By default the NPA Usage Cost cost is set to an RM installation default value but can be modified by the
user. For example if L is the default cost of a physical connection, a meaningful default value for the NPA
Usage Cost can be L/2+1 ( i.e. (L/2+1)*2 )
With the proposed NPA Usage Cost, the routing algorithm behaves for stacked and not stacked ring con-
figuration in a similar way (i.e. for the routing, it is like to have a physical link between two stacked rings)
An additional example of the stability effect of the NPA Usage Cost is the behavior in case of stacked and
unbalanced rings.
The NPA cost factor is an additional parameter of each NPA, enabling a percentage cost reduction for its
links. This cost reduction has the target to balance the NPA Usage cost and makes more attractive the
routing inside a NPA compared to the one outside at least for route longer than a given number of arcs.
In the fact, it is an indicator on how much a Main/Spare routing in a NPA has to be preferred compared
to an external route. It works together with the NPA Usage Cost making more attractive long routes in a
NPA.
As bigger it is set as more the cost of NPA internal route is reduced and as more the NPA attracts the rout-
ing.
In case of particular unbalanced configurations, if the NPA Usage Cost is not enough to avoid the ring
changing, the user needs to properly set the costs of physical connections
This is equivalent to say that it is preferred a routing in the ring compared to the best route if its nom-
inal cost is no more that k times the external optimal route
– If the spare uses the same links and pass-through connection of the main, the cost is considered
zero. This tries to prefer main and spare overlapped and finally gives more priority to a D&C con-
figuration
The overlapping on Drop/Insert connections between main and spare is forbidden. This is the driver
to differentiate main and spare and has its effect mainly forcing a diversity outside the ring
– The cost of using the ring for the spare in opposite direction compared to the main is increased of
a cost n. In the previous versions of RM this opposite direction was totally disabled.
2) Selection of NPA type=2 F MS Spring or 4 F MS Spring. Enter NPA name and click on Apply
3) Selection of NPA type=Linear plus, i.e. 1 + 1 protection. In this case the user must enter:
4) Selection of NPA type=Linear colon, i.e. 1 to N protection. Enter NPA name and click on Apply
6) Selection of NPA type=Fast restoration. Enter NPA name and click on Apply
N.B. RM can handle only one NP control plane. Then only one NPA fast restoration in Flow Through
context can be created.
Select the relevant Physical connections and click on Apply button. The icon(s) of the Physical connec-
tions are now present inthe main window. Click on Finish button to launch the creation.
N.B. In case of 1 to 1 NPA or 1 to N NPA the selection dialog box contains two subwindows, one to
select the main Physical connection (s), one for the protecting one. See example of 1 to N NPA
in the following figure
Figures which follow show the action creation report and the NPA highlight on the map.
Actions after NPA create : Modify NPA, Modify Ring Map, Implement and Unlock physical connections
NPA highlight : shows the nodes connected by physical connections involved in the NPA on the map.
• The sub-networks (level 1 & 2) containing at least a Node (not a physical connection) involved
in a NPA.
• A physical connection involved in a NPA. A specific graphical flag shows that a Phys.Conn.
belongs to a NPA. This flag is represented on the payload structure view
• The routing display of a path crossing one or more NPAs (LIN MS-P is under analysis). See spe-
cific information on Routing.
A map of a topology containing at least a Node involved in a NPA (different from linear MS-P) visualizes
a flag with the type and the name of the NPA :
The flag placement is in charge of the user (e.g. close to the right Nodes)
From the flag it is possible to retrieve the NPA and its view.
SEQUENCE
SNCP Rings, 2f MS-SPRings, 4f MS-SPRings can be modified adding or removing physical links by
means of the commands Join/Split Physical Connection.
MSP NPA, ASON NPA and Fast Restoration NPA can be modified adding and removing internal or inter-
working physical links . See procedures Remove the Physical Connection from RM: SET LOCKED
and Insert the Physcon in the NPA
As a specific tool for MS-SPRings, the user can also visualize and modify the NE sequence numbers in
the NPA ring to allow a hitless take-over.
The form display the current sequence of the NE protection blocks and allows the definition of a new con-
sistent one.
The implementation creates the needed structures / protection blocks in the NEs.
No paths must be present in case of Rings, ASON, Fast Restoration, with the exception of SNCP Rings.
No paths must be present on the spare in case of 1+1 Linear MS-P or 1:n Linear MS-P with no-extra traffic.
NPA: Specify ring map ( only for 2F / 4 F rings), allows to change/display the Node position in NPA ring
and the Node Id in NPA.
The user can change these attributes, according to the NPA ring.
The scope of this procedure is to create a 4-Fibre NPE ring with 1664SM equipment.
SEQUENCE
a) The ring (Elementary Topology) objects are created in a Subnetwork submap using the command
Construction:Create:
The Creating of the Connections is described in the previous paragraph Create Connection. Notice that:
TX
RX
SLOT 17 SLOT 19
AGGR. WEST 1 AGGR. WEST 2
WORKING PROTECTION
SLOT 18 SLOT 20
AGGR. EAST 1 AGGR. EAST 2
WORKING PROTECTION
N.B. The 1644SM network element, when inserted in a NPE ring is equipped with 4 STM-16 aggre-
gate boards, as shown in Figure 125. This figure is part of the 1353NM equipment view.
N.B. West 1 and East 1 aggregate ports support the working capacity, West 2 and East 2 aggregate
ports support the protection capacity.
d) Implement NPA
SEQUENCE
a) Create the NPA 4-f for the topology which represents the existing ring
b) At the NE/EML layer read the information of Node Id and Node Position per each node
of the ring and move these information to 1354RM map.
c) Issue NPA: Specify Ring map setting Node Position and Node Id.
g) Enable download
The scope is to create and implement a STM-64 4-Fibre NPE ring with 1670SM equipment.
SEQUENCE
b) Create all the connections “main" (clockwise). The following assignment is suggested:
1) Create the connection main A to B, selecting board 24 on node A and board 32 on node B
2) Create the connection main B to C, selecting board 24 on node B and board 32 on node C
3) Create the connection main C to D, selecting board 24 on node C and board 32 on node D
4) Create the connection main D to A, selecting board 24 on node D and board 32 on node A
c) Create all the connections “spare" (clockwise). The following assignment is suggested:
1) Create the connection spare A to B, selecting board 28 on node A and board 36 on node B
2) Create the connection spare B to C, selecting board 28 on node B and board 36 on node C
3) Create the connection spare C to D, selecting board 28 on node C and board 36 on node D
4) Create the connection spare D to A, selecting board 28 on node D and board 36 on node A
The first port, which has been selected while creating the A to B main connection (board 24 on node
A) is now distinguished by the attribute SDHPORTROLE=WEST MAIN. The second port, which has
been selected while creating the A to B main connection (board 32 on node B) has now the attribute
SDHPORTROLE=EAST MAIN. The remaining ports of the NPE ring are marked accordingly.
The first port, which has been selected while creating the A to B connection (board 28 on node A)
is now distinguished by the attribute SDHPORTROLE=EAST MAIN. The second port, which has
been selected while creating the A to B spare connection (board 36 on node B) has now the attribute
SDHPORTROLE=EAST MAIN. The remaining ports of the NPE ring are marked accordingly.
SEQUENCE
a) Create the NPA 4-f for the topology which represents the existing ring
b) At the NE/EML layer read the information of Node Id and Node Position per each node of the ring
and move these information to 1354RM map.
c) Issue NPA: Specify Ring map setting Node Position and Node Id.
g) Enable download
the Upload Tools wizard can be started from network, subnetwork, node.
J0 set-up can be entered from the Network, Subnetwork or Node, issuing the command Actions: Con-
figuration: Upload Tools.
From the Upload Tools dialog box (see following figure), select option Automatic Generation of Trace Iden-
tifier, which means J0 definition and click on Finish button to confirm. The following string is automatically
entered:
R$NDMPORTIDENTI
As an alternative, sent and expected J0 can be entered by the operator by using the CT/NM when the
fiber pair in put in service.
SCOPE
The scope of this procedure is to upload the physical media adjacency of the network. This means that
SDH/SONET physical links are automatically created in RM, when a fiber pair is connecting two ports.
CONDITIONS
SEQUENCE
a) The upload command is performed on one of the two NEs. Issue Configuration: Upload Tools. Select
option Upload Physical Connectivity
The action responses are directly displayed in the 'upload NPA' box at the User Interface.
SCOPE
The scope of this procedure is to upload the Protection Schemes. This means that the protection schemes
are discovered and the relevant NPA is automatically created in RM.
where portId is the identifier of the port marked with channel number 0 (main)
CONDITIONS
SEQUENCE
a) The upload command is performed on one of the two NEs. Issue Configuration: Upload Tools. Select
option Upload of Protection Schema
It is possible to set the auto implement option: the discovered NPA, after creation in RM database,
is implemented.
The action responses are directly displayed in the 'upload NPA' box at the User Interface.
As an example, figure which follows, shows the discovered 2-F MS Spring NPAs
RM allows to manage a Physical Connections between ports of the same NE: this is mainly for WDM NE
management but it can be used in particular SDH application.
Note that Physical Connection(s) between ports of the same Node are not displayed on the maps.
Internal Physical Connections can be retrieved through inventories requiring all Physical Connections that
are present in the topology where the Node is included, or that are starting-ending in the Node.
The scope of this procedure is to enable/disable the retiming functionality, i.e. to manage a 2Mb/s syn-
chronous timing source going out from a certain NE port, used to synchronize the PDH network, in order
to reduce the pointer justification wander.
The value of the retiming is not reset to the default value when the path is de-implemented, but
it is persistent and it is taken into account when the path is again implemented.
This feature allows the enabling/disabling of the retiming functionality. This functionality is used to process
a 2Mb/s signal, going out from the NE, which can be used as synchronous source in a PDH network, so
that it does not have the wander created by pointer justification. When retiming is activated, the outgoing
signal is retimed with a clock free of the wander.
This procedure includes also the configuration of the action to perform in case of loss of synchronization.
– timingPDH (default) . Timing of the outgoing signal is synchronized by the incoming signal
CONDITIONS
The functionality is applied at path level. The functionality can be enabled/disabled on the ports related
to the path. The retiming can be defined only for an already implemented or partially implemented path.
The retiming functionality is applicable only for 2Mbit/s signals and on ports belonging to Q3 NEs
SEQUENCE
a) Point to the path whose port is to be used as synchronization source and open the pop-up menu.
Select Configuration: 2Mbit/s Retiming management. See Figure 134. The Path Retiming wizard -
step 1 is displayed. See Figure 135.
The Operator can modify the retiming and the related consequent action on the displayed ports. For uni-
directional or broadcast path, only the "sink" ports supporting the retiming functionality are presented to
the Operator. In addition it is possible to navigate on the 1353NM in order to get further information.
The consequent actions are applicable only for ISDN-PRA or Leased Line signals and can be configured
only for bi-directional paths and only if the retiming functionality has been enabled.
In case of NPE MS-Spring the Topology Implementation process performs the following steps:
a) starting from the “sequence number in et" node attribute (it provides the position of each node in the
et), it builds the string corresponding to the ring map info attribute of the 4f MS Protection Block MOC
1) it creates, 'contained' in the node, the MS Protection Block MOC filling the Configuration State
attribute with the “virtual" value
a) To execute the network implementation select the Network/Subnetwork/Ring icon in the Root/Net-
work/Subnetwork window and issue the command Actions: Configuration: Implement.
2.2.15.1 Introduction
A HO-Trail can be created only between nodes external to the NPE MS-Spring.
The Trail creation wizard function is used to create, allocate, implement and configure an HO-Trail within
the SDH Network. A HO-Trail is a transport connection between HO-TTPs (HO-CAPs) related to SDH
ports. A HO Trail provides LO resources (LO-LCs) to carry LO traffic (i.e. LO paths).
Being a wizard, the user is driven by a series of steps to execute the procedure; subsequent boxes are
to be filled with requested parameters or values; in the first part of the boxes some comment helps the
user filling-in the fields; the Next button go to the next step/box and the Prev button allows to change pre-
viously entered values; the Finish button gives the execution of the procedure.
2.2.15.2 Operation
a) Select the Trail Termination points to be created on the map and then on the menu Actions: Create:
Trail. A sequence of boxes will open-up together with a browser window (if not already open).
On the upper part of Step1 box figure, there are helpful notes about choosing/selecting the parameters
and values.
b) Step1 of the trail creation box allows to set up many parameters, divided into folders:
– configuration
– protection
– PM
– Routing
– CP Restoration
The explanation of all parameters is the same as detailed at para Path Create
The subsequent steps to complete trail creation are the same as described in paragraph Trail setup
including an external network.
As a result of this command, PDH ports are assigned to the Regional Manager and the related TTPs are
created in the RM database.
This command can be issued for the whole network, for a subnetwork only, or a single Node.
This command is not required for QB3 NEs. As a default NAPs are uploaded upon Node create.
SEQUENCE
a) From the browser window point with the mouse at the topological object whose NAPs are to be
uploaded and open the pop-up menu. Select menu item Configuration: Upload NAPs. See Figure
150. A dialog box alerts that the action has been correctly started.
This feature allows to upload the retiming configuration from an existing network.
CONDITIONS
This feature is useful when the retiming has already been configured in the network (e.g. from SH) and
RM has to take in charge this configuration
SEQUENCE
a) the Synchronize NE command has to be executed on all the NEs that can support 2Mbs ports. As
a consequence, the retimingSupported attribute of the port is aligned
c) a dedicated script has to be executed. This script contains the following steps:
• the Consistency Audit (notify modality) has to be performed on all the ports involved in a path
and with the retimingSupported attribute different from notSupported. (through a dedicated
script). As a consequence, the consistency status of all the ports with the retiming enabled in
the NE is set to consistencyMismatch.
• the retimingStatus attribute of the paths involving ports with the consistencyStatus attribute
equal to consistencyMismatch is aligned (set to enabled. As a consequence, the retiming
attribute of the involved ports is aligned (set to enabled)
When a raw connection is transformed in a client path, RM automatically creates, for each end point of
the created client path, the following PM TPs:
PM TPs are created taking into account NE restriction. For example, in case of 1696MS, only the PM TP
for the adjacentBoundary CTP can be created.
N.B. The automatic creation of PM TPs can be disabled thought an environment variable set at
installationtimeManual Management of OADM Connectivity
– Path Constraints
– Add Leg
– OS driven restoration
– Join/Split path
– Join/Split trail
N.B. After a 1354RM merge operation the Join/Split procedures will be used in the following order:
1-join path 2-join trail 3-join physical connection
– ISDN management
2.3.1.1 Introduction
The path creation can be executed only in an implemented network with already uploaded NAPs.
– path allocate. make reservation of the route within the network. The route includes all relevant ele-
mentary connections (connections in topology). Path deallocate is the reverse operation
– The allocation algorithm chooses the less costly route by applying the Dijkstra algorithm
– path implement. transmit to the network the commands to activate all included connections in topol-
ogy, thus implementing (i.e. activating) the whole path. Path deimplement is the reverse operation
– path Commission, Decommission is only a lock which can be set / removed to / from an imple-
mented path
– path constraints. Used by the allocation algorithm, which is forced to follow user's preferences in
selecting the path route
You can then display the path route using the SDH netview or browser application.
Examples of path create commands (pull-down and pop-up, respectively), are shown in Figure 151.and
Figure 152.
With the ISA BCE board - 2Mbit/s application, the customer device (remote NTU) receives, from a cus-
tomer localPDH interface, E1 traffic and encapsulates it in a VC12, which is carried by SHDSL copper to the
ISA BCE board.
SHDSL is terminated on LTU side (ISA BCE board), VC12 is extracted and cross-connected in the OMSN,
then transmitted over SDH network.
The PDH port is characterized at the interface in such a way to allow the RM to distinguish it from a normal
PDH.
Allocation/de-allocation
When the command is started, a window is opened by the browser and a message is displayed to inform
the user if the operation is correctly started or not.
At the end of the command a message is displayed to inform the user if the operation is correctly finished
or not. If not, a raw error reason is provided to the user and he can have more details using the Path failure
Implementation/de-implementation
When the command is started, a window is opened by the browser and a message is displayed to inform
the user if the operation is correctly started or not.
During the execution of the command some additional information can be displayed to the user. It can be
indication for the user, warning or error result related to an elementary operation (e.g. a cross-connection
creation failed).
At the end of the command a message is displayed to inform the user if the operation is correctly finished
or not. If not, a raw error reason is provided to the user.
Remove
The remove command of a path/trail is allowed even if the path/trail itself is implemented, partially imple-
mented or allocated.
When the command is started, a window is opened by the browser and a message is displayed to inform
the user if the operation is correctly started or not.
During the execution of the command some additional information can be displayed to the user.
– path allocate. make reservation of the route within the network. The route includes all relevant ele-
mentary connections (connections in topology)
– path implement. transmit to the network the commands to activate all included connections in topol-
ogy, thus implementing (i.e. activating) the whole path
SEQUENCE
a) Launch the path create application. The path create wizard is displayed. See Figure 153.
N.B. The user creates a network with different subnetworks. On these subnetworks, the user creates
some Ets with many adms. The user tries to select simultaneously two adms between two Ets
and it is possible. But, once opened the path window, only one element is present, the first one
selected. This is due to the structure of ilog maps. Namely, it is possible to select a couple of
nodes only if they belong to the same map view.
1) If you select PDH, selectable service rates are those shown in Figure 154.
4) If you select Service type=DATA, selectable service rates are shown in figure which follows:
– SNCP type
it describes different types of SNCP protection schemes for a path/trail. Allowed schemes are:
-SNCP/I (Inherent)
-SNCP/N (Not-intrusive)
SNCP/N switch criteria: Server Signal Failure, Signal Degraded, Trace Identifier Mismatch, Excessive-
BER and Unequipped
The user can specify the preferred type of SNCP protection using the Path Creation (for paths) and Set
up Trail (for trails) commands. Anyway, the type of SNCP protection can be modified, in a second step,
even if the path/trail is implemented.
If the user wants to add the protection to an unprotected path/trail, he has to use the Add Protection com-
mand. The preferred type of SNCP protection has to be previously chosen by the user modifying the
related attribute of the path.
Since this feature is not supported by all the NEs, a path/trail may have SNCP/I and SNCP/N protections.
RM does not provide provisioning of SNCP/N switching criteria (i.e. Excessive BER, Signal Degraded).
NOTE: For a path/trail, the management of this feature foresees the introduction of the following new
attributes:
sncpType: it specifies the type of the protection of the path/trail. The allowed values are:
• -sncpIpreferredNoAlr: the SNCP/I type has to be preferred for all the protected connections
of the path/trail
• -sncpIpreferredAlr: the SNCP/I type has to be preferred for all the protected connections of
the path/trail.The alarms have to be enabled on the unreliable CTPs involved in
the protection (default value)
-sncpNpref: the SNCP/N type has to be preferred for all the protected connections of the path/trail
D&C
For paths and trails with the protection type set to D&C, RM should be able to perform the automatic add-
ing of drop & continue connections when the main and the spare cross the same SNCP NPA ring.
In case of unsatisfactory results of the automatic algorithm, D&C can now be added or removed manually
specifying the start and end points.
– The D&C must use only the resources of the NPA and protects only one direction.
– D&C related to adjacent NPAs are merged together producing dual node cross-connections in the
involved NEs
– Unneeded changes of rings is one of the possible source of wrong D&C protections
The NPA can be used as a type of constraint for paths & trails. The constraint types are:
– Use main. The main route of the path must use at least one of the physical links belonging to the
NPA. At Lower Order the LC satisfying this constraint must be completely contained in the NPA (i.e.
its server trail must use only physical connections internal to the NPA)
The add protection and D&C can now be performed without any limitation related to the partitioning (i.e.
to the involved topologies): any Node of the main can be selected as a starting or ending point of an added
spare protection.
No constraint exists anymore on the way to perform the network construction in order to allow path/trail
protections
The add/remove protection and add/remove D&C is performed from a wizard that allows to select the right
TPs or Nodes for the specified operation (protection in a NPA to be confirmed)
– MS Protection Usage Profile. For details see explanation at section Technical Annexes.
c) Click on Next button. The wizard presents now the Step 2 dialog box.
d) Step 2 wizard (see figure above) is designed to support the creation of the multicast path (both X and
Y configuration). The part related to the A spare and Z spare is displayed only if the user requires
to add the spare (A or/and Z) by means of button Add Backup. This button is enabled only if the
path is protected SNCP or D&C SNCP.
e) End Points selection: Node selection: request the list of the available nodes. A list of nodes is shown,
with the following characteristics: (alternatively it is possible to use the drag&drop functionality)
External Networks with idle CTPs at the rate of the path (in this case the user can specify the name
of the client port to be created on the External Network)
nodes with boundary HO CTPs belong to an HO-trail with at least one idle client link connection at
the rate of the path (only for a LO path)
External Networks (in this case the user can specify the name of the client port to be created on the
External Network)
N.B. For each node in the list, it is indicated if the node contains LO CTPs, HO CTPs or both.
It is possible:
to request the list of the available SDH ports. In this case the system shows a list of ports, according
to the selected node and with the following characteristics:
• External Network: SDH ports with idle CTPs at the rate of the path
• real NE: SDH ports with idle boundary CTPs at the rate of the path
• SDH ports with boundary HO CTPs belong to an HO-trail with at least one idle client link con-
nection at the rate of the path (only for a LO path)
N.B. The user can avoid entering SDH port and time slot (only if the node is an External Network).
In this case, they are automatically chosen by the system at allocation time: SDH port to min-
imize the path cost and the first free time slot.
It is possible:
to request the list of the available time slots. In this case the system shows a list of time slots, accord-
ing to the selected node and port, with the following characteristics:
port of an External Network: time slots related to idle CTPs at the rate of the path
time slots related to idle boundary CTPs at the rate of the path
time slots related to the CTPs at the rate of the path ending, on the External Network side, the
idle link connections of the HO-trails related the port (only for a LO path)
to enter directly the time slot. The time slot is a string with the following syntax:
AU4#
AU4#/TUG3#/TU3#
AU4#/TUG3#/TUG2#.TU12#
the user can avoid entering the time slot. In this case the first free time slot is automatically chosen
by the system
h) At the end of the operation, when the Finish button is pressed, the command to create the path is
sent to the Transport Service Agent with the following information:
the node
the External Network and, optionally, the name of the client port
the External Network, the SDH port, and the time slot and, optionally, the name of the client port
the real node, the SDH port and the time slot
• the CTP at the rate of the path on the External Network is marked ("userReservation" attribute
set to "forPath")
N.B. If the SDH port and the time slot of the External Network are not provided in the request,
the CTP will be chosen and connected to the NAP by means of a flexible connection at
allocation time. The CTP itself is not marked as reserved ("userReservation" attribute not
modified).
i) Click on Next, passing to Step 3-Attributes selection. See figure which follows. Select:
– Allocation Rule: it specifies if the path has to be allocated automatically after its definition
or subsequently upon user's command.
– Algorithm (Automatic)
ALARM
– Propagation rule (when defined / when allocated / when implemented /when commissioned)
ROUTING
Percentage discount on NPA usage cost (NPA thru cost), only for spare route evaluation, while the main
already is crossing that NPA.
Percentage of cost to avoid spare route direction different from main route direction. This percentage cost
is added to physcon basic cost if used in the direction opposite to the main route direction.
N.B. If the user, when creating the path, selects Alarm Enabling Rule: Manual, for this Path it will be
possible to enable / disable the involved alarms (from the Path List: menu Actions: SDH/PDH
Alarms enable/disable.
– Path Group, to be used when defining multiple paths belonging to the same path group
– Automatic Monitoring (True/ False). If true starts the 24 h PM activity on path implementation
CP RESTORATION. It contains:
j) Click on Finish button. The path is created and the routing view is displayed.
N.B. Fast Ethernet boards have been already correctly set-up on the Equipment via 1353NM.
The 10/100 Fast Ethernet board acts as a gateway towards the SDH network and is connected to the SDH
matrix via a STM-4 equivalent interface. Each of the 10 or 100Mb/s Ethernet traffic interface of the board
is mapped in a set of VCn (n=12, 3 or 4).
The Ethernet traffic is transported transparently in the SDH network: the board on the OMSN NE drops
Ethernet traffic towards switches or router without "terminating" the Ethernet frames.
Two cards constitute the board: an access card that provides 14 interfaces and a main one that provides
11 interfaces. The Ethernet traffic, mapped in the SDH transport structures, is then sent towards the SDH
matrix via a STM-4 equivalent interface.
To set-up an SDH path supporting, as client, the Ethernet traffic, execute the following steps:
a) upload the Data ports. The uploaded ports are created in the RM MIB. The technology of the ports
is "Data"
b) upload the Data NAPs. As a consequence of this operation the generic Data NAPs are created in
the RM MIB (no interaction with the NE)
c) create a path connecting two Data NAPs. The user enters the following information:
the type of the server SDH container (tu12, tu3 or au4) or (tu12-nV - tu3-nV). If the user selects the
virtual concatenation (tu12-nV - tu3-nV), he will enter the number n (no. of TUs).
In the fact the path creation includes the specification of the VCs. As a consequence, data NAPs are
created in the NEs accordingly.
If the Operator selects the Multipath Create button, (see above figure), a dialog box is displayed. The fol-
lowing values must be specified:
If Append is selected, the path sequential numbering is added as a suffix to the name of the path.
If you want to insert the sequential numbering in the inner of the path name, the userlabel containing the
%nd characters should be written where "n" corresponds to the numbering field size. In this case you have
to select "Replace".
The Associate feature is provided (same route) if the following are selected:
starting any
This feature allows to associate as constraint the first created path. The user can carefully setup the
first created path. The remaining ones will have the same route.
- multiple path creation without port and time slot (allocation rule = user)
- force paths to overlap the first one created (select button "associate as constraint the first created path"
in the last step of the wizard)
- open constraint wizard for the first path and add drop CTPs as constraints
- allocate all the other paths (their route will overlap first path because it was specified in creation to over-
lap the first one)
2.3.2.4 Constraints
SDH routing is performed on a cost basis. This means that a route having the least cost will be used when
setting up a path.
The user can specify some constraints to be used by the allocation algorithm either during the path allo-
cation or the path add protection activities. These constraints are used to:
• specify if the constraint has to be applied to the path main route or to the spare one or both;
– Path constraints allows the user to specify the constraints to be used by the allocation algorithm dur-
ing either the allocation or the protection activity or the addition of a leg in a broadcast path (i.e. Allo-
cate path and Protect path services broadcast path end point add). The user specified constraints
overrides the cost based allocation policy.
• Involved resources: they can be sub-networks, ETs, nodes, link connections, physical connec-
tions, CTPs, server trails and routing links.
• Constraint type : it specifies whether the path must use the specified resources or not
• Route Type : it specifies if the constraint is applied for the main route only, for the spare route
only or for both routes.
Path routing display of a defined not terminated path in addition to the NAP on the External Network,
shows:
N.B.: During the add end points operation, the user can decide either associate the new end points to the
path or automatically allocate/implement the spare route.
a) Select Add ends/Remove ends option of the Path ends modification tool
b) From the following box, select the Backup end point to add
c) Click on Finish button to confirm. Figure which follows shows an example of modified routing display.
If Remove End Point option has been set at above step 1, following selection dialog box is presented.
Select the points to remove and click on Finish button.
The following table lists the services supported by RM and the mapping with the Transport rate inside
the Transport Network:
AU4
DEFINITION
The 1 Gigabit transparent path makes use of a virtual concatenation of 8 AU4s to support the AU4-8V con-
nection rate.
The connections in topology between the 1 Gigabit NAP and the CTP are fixed, i.e. they cannot be
changed or deleted by 1354RM.
With reference to Figure 176., the 8 trails, which are virtually concatenated can be allocated to different
routes within the network
CTP CTP
The path routing display is shown in the following figure. Notice that the link connection configuration state
is implemented. Click on Server trail icon. The trail list of the 8 virtually concatenated trails is displayed.
See Figure 182.
Or, to highlight an Ethernet path issue, for the path : Search: Related Items: Server Trails.
If all 8 trails are allocated, the attribute Server connectivity of the path is equal to fully connected.
If only some trails are allocated, the attribute Server connectivity of the path is equal to partially con-
nected. In this case the operator may add resources and subsequently allocate trails whose working
state is fail to allocate.
It is possible to launch path implementation also on a path having some trails allocated and some
defined. In this case the path goes implemented, its defined trails remain defined, the allocated trails
go implemented or partially implemented.
2.3.5.4 EXAMPLES
EXAMPLE 1
A path has 7 trails allocated and 1 trail fails to allocate. By launching the implementation on the trail failed
to allocate, the server connectivity of the path goes fully connected.
EXAMPLE 2
A path has 1 trail allocated and 7 trails defined. By launching the deallocation on the allocated trail, the
path goes defined and all involved trails are deleted.
EXAMPLE 3
A path is allocated. By launching the implementation on one trail, the path goes partially implemented
The Add Protection operation is available for the entire path or at trail level.
2.3.5.6 Constraints
Constraints can be given at level of path or at level of trail. As usual, the system makes use of constraints
during allocation phase.
The 1 Gbit/s Ethernet Rate Adaptive path can have rate AU4-nV with n=1-7.
The User, directly to a Server HO Trail, can perform the Allocation, De-allocation, Implementation, De-
implementation, Add protection, and Remove protection operations.
The operations allowed on the server HO Trail depend only on their configuration state, regardless the
GbE concatenated path configuration state. The path working state is checked in order to avoid concurrent
operations.
The configuration state and server connectivity of AU4-1v link connection and concatenated path are
always re-evaluated. After an add/remove protection applied to a server trail, also the path protection type
is re-evaluated.
2.3.5.7.2 GbE Path Route, Server HO Trails and GbE Path Attributes display
The Operator can visualize the routing of a GbE Path and from the route display of GbE paths, starting
from the AU4-1v LC, it is possible to retrieve all the server HO Trail.
In addition for the HO Trail participating in the virtual concatenation group (also if only in this particular
case), it is possible to retrieve the client GigE Path or the AU4-1v LC.
2.3.5.7.3 Redo-log
The system will trace in the redo-log all the operations performed by the User on a concatenated path and
on the server HO trail.
Elementary Alarms related to the GbE Ports, NAPs, CAPs, CTPs are correlated to the Server HO Trail
and GbE Path, which affect the GbE functionality.
Alarms related to the HO Trail are managed as usual, while alarms related to a GbE Paths are issued when
the GbE service is affected.
The system, as for all the other type of paths, allows to highlight on the Map where a GbE Path is passing
through.
– boards belonging to the Integrated Service Adapter (ISA) board family, named ES1 and ES4. The
ES1 board has a throughput, towards the SDH network, of 155Mb/s while the throughput of the ES4
one is 622Mb/s.
The management of these boards makes use of LCAS (Link Capacity Adjustment Scheme), which is a
protocol that improves Virtual Concatenation, allowing to:
– temporarily remove a member link that was affected by a failure (this member is hitless added again
after failure recovery)
– Path creation
The usual information to create this type of path has to be provided by the user.
2.3.6.1.2 10/100Eth Rate Adaptive (virtual conc.) & 1Gbit Eth Rate Adaptive services
– serviceType=Ethernet
– type of the server SDH container to be used to transport the traffic (transportRate). The allowed val-
ues are:
– all the other information required for the path creation (user label, ...)
The list of the NAP is available to the user, satisfying the following conditions:
If the user selects the NAP's, the compatibility of the two selected NAPs is verified accordingly.
N.B. The user can select the node instead of one or two NAPs. The compatibility of the two NAPs
is automatically verified.
At this point, the lcasControl and the diversesrvTrailsRoutingPreferred attributes of the path are set
according to the following table:
A-end type Z-end type LCAS control server trails rout- proposed/modifi-
ing able to/by the user
NOTE 2
N.B. The values of the two attributes are calculated by the TRS (Transport Management process)
taking into account the type of the two NAPs chosen by the TRS itself.
– the lcasControl attribute is set according to the value of the lcasControl attribute of the path. In par-
ticular:
• if the lcasControl attribute is equal to enable, the lcasControl attribute of the two involved NAPs
is set to enable
• if the lcasControl attribute is equal to disable, the lcasControl attribute of the two involved NAPs
is set to disabled
– if the lcasControl attribute is equal to notAvailable, the lcasControl attribute of the two involved NAPs
is set to notAvailable. Anyway, if one of the two NAP has the concatenationType attribute equal to
virtualLcas, the lcasControl attribute of the NAP itself is set to disable
If the user, during the path creation selects the diverse routing option (diversesrvTrailsRoutingPreferred
attribute of the path equal to diverseRoutingPref), the allocation of the server trails will apply the diverse
routing mechanism. In particular: the trail numbered n+1 (even) has to have a different routing from its
previous trail numbered n (odd). So a fault (i.e.cut fiber) impacts only a route providing anyway a minimum
level of functionality.
If there are not resources problem, this diverse routing mechanism allows:
– to have the 50% of the server trails on a route and the other 50% on another route
– to add and remove bandwidth maintaining the distributions of the server trails on the two diverse rout-
ing
These points cannot be guaranteed when the network resources are not enough to allow the diverse rout-
ing. In this case, the odd and the even trails could have the same route (partial or total).
N.B. The user can modify the srvTrailsRouting attribute of an already created path in any allowed
configuration state (confSt equal to defined, allocated, implemented, ...). In this case the new
provided value will be taken into account for the allocation of new trails (the already allocated
trails are not re-routed).
When a path is removal, the lcasControl attribute of the two involved NAPs is set according to the Port/
NAP configuration table paragraph in this document.
The trails are added/removed starting from the last existing trail. This means that no intermediate trails
can be added or removed.
The intermediate trails can be activated/de-activated, that is included/excluded in/from the concatenation
group. In case of de-activation, the transport resources are not released.
The lcasControl attribute allows the inter-working between an NE not providing the LCAS protocol and
another providing it. A path can be allocated between an end point supporting the LCAS protocol and the
other not: the LCAS protocol has to be disabled on the end point supporting it.
To have the LCAS functionality, the LCAS protocol has to be enabled on both the end points.
The user has to select the path and to choose the LCAS control command on the User Interface.
N.B. LCAS protocol can be enabled/disabled also in the path creation phase. See following figure.
The ports supported by the 16xGbE board in the 1678MCC R3.1A or later are compatible with all the
portsproviding a 1GbEth Rate Adapter service. The particularity of these ports is that they can work only
with a fixed rate (vc4-7V).
To create a path involving one or both these ports, the usual information to create a normal
eth1GbRateAdapt path have to be provided by the user. Concerning the concatenation level value, RM
does not check that it has to be equal to 7. This means that if the user specifies a different concatenation
level value RM does not return any error: the error will be returned only by the NE.
It has to be noted that the server trails related to the path (or only a part of them or none) can cross the
ASON domain.
SCOPE
The scope of this procedure is to modify the bandwidth of a rate adaptive path.
SEQUENCE
a) From the path list point to the rate adaptive path and select Path: Modification: Bandwidth. The wiz-
ard dialog box opens.
• Increase bandwidth
Click on Finish button to complete the action. The action report is provided.
The created trails are added as the last items of the trail list
• Decrease bandwidth
• Activate trails
Trails are activated sequentially starting from the first idle trail.
• De-activate trails
SCOPE
This procedure allows to define the Protocol format to be used for an Ethernet path.
CONDITIONS
SEQUENCE
a) Point to the Ethernet path and select Configuration: Ethernet mapping. The relevant wizard is dis-
played.
SEQUENCE
a) Launch the path creation. In the create step 1 dialog box enter:
Service Type=Ethernet
Service Rate=1 Gb Rate Adaptive
Transport rate=AU4-nV
Total Concatenation Level=3. It is the no. of desired trails.
Configuration Rate=Manual
User label
Path type=broadcast
Protection=NONE i.e. NO PROTECTION
Number of Sink End points. It is the no. of desired sinks.
SNCP Type=SNCP/N preferred
c) In the sink selection box select the first sink. Click on Next to select the second sink.
e) After selecting the programmed number of sinks, according to the previously selected parameter
Number of Sink End points, click on Finish button.
f) The path is created and the routing display, as defined, is presented. See below figure.
SEQUENCE
a) Launch the path creation. In the create step 1 dialog box enter:
Service Type=Ethernet
Service Rate=1 Gb Rate Adaptive
Transport rate=AU4-nV
Total Concatenation Level=3. It is the no. of desired sinks.
Configuration Rate=Manual
User label
Path type=broadcast
Protection=SNCP
Number of Sink End points. It is the no. of desired sinks.
SNCP Type=SNCP/N preferred
c) Click on page button Backup and select the 2nd source. Click on Next button.
e) After selecting the programmed number of sinks, according to the previously selected parameter
Number of Sink End points, clicking on Next button, enter the path detailed parameters and click on
Finish. The path is created and the routing display, as defined, is presented. See below figure.
SEQUENCE
a) Launch the path creation. In the create step 1 dialog box enter:
Service Type=PDH
Service Rate=2 MB-LO
Total Concatenation Level=3. It is the no. of desired sinks.
User label
Path type=broadcast
Protection=SNCP
Number of Sink End points. It is the no. of desired sinks.
SNCP Type=SNCP/N preferred
f) Enter the detailed path parameters and launch the creation, and subsequently the allocation. Figure
which follows shows the routing view of the 2 mb broadcast allocated path.
SCOPE
SEQUENCE
a) Launch the path creation. In the create step 1 dialog box enter:
Service Type=PDH
Service Rate=AU3
User label
Path type=bidirectional
Protection=None or SNCP
SNCP Type=SNCP/N preferred
To do this, open the pop-up menu on the parameters written in italic:: the options Save and Revert to Sys-
tem defaults are available.
SEQUENCE
h) You can navigate to the Physical Connection. Select the trail and issue Search: All related Items:
Server Physical Connection
i) From browser select the physical connection and issue Search: All related Items: Physical Connec-
tion Structure
This feature allows to transport a television broadcast signal. Before entering into the transport network,
the television broadcast signal is compressed by a MPEG-2 encoder. At the receiving ends a network
adapter extracts the required data stream from the network.
RM provides the feature by means of a broadcast path using a new rate (digital video broadcasting).
The television broadcast signal is carried by LO resources (VC12 or VC3), virtually concatenated, with
an STM-1 equivalent throughoutput (i.e 63 VC12 or 3VC3).
SCOPE
Given the network shown in the following figure, where nodes 1660 SM-1, 1660 SM-2, 1660 SM-C are
equipped with DVB boards, create a digital video broadcasting path (not protected).
Port list (including DVB ports) of node 1660 SM-C and the related NAP list are shown in figures which
follow.
SEQUENCE
a) To create the path, point the source node and issue the pop-up Create:Path. See the following figure.
c) In the Source End Point selection box, click on NAP selection list. The list is displayed on the right
hand side. Select the source NAP (attribute direction=source) and click on Next. See figure which
follows
d) In the sink point selection box click on NAP selection list and select the sink NAP (attribute direc-
tion=sink) from the list. Click on Next. See figure below.
f) After entering all suitable selections, click on Finish to complete the creation.
g) The routing display of the defined path is shown. See following figure.
SEQUENCE
a) To create the path, point the source node and issue the pop-up Create:Path. See the following figure.
b) In the path create box select: Service type = DATA, Service rate = Digital Video Broadcasting, Trans-
port rate = TU12-nV, Protection = SNCP, no. of sinks. Enter userlabel and path type = broadcast.
Click on Next. See figure which follows
SCOPE
SEQUENCE
a) To create the path, point the source node and issue the pop-up Create:Path. In the path create box
select: Service type = DATA, Service rate = Digital Video Broadcasting, Transport rate = TU12-nV,
Protection = SNCP, no. of sinks. Enter userlabel and path type = broadcast. Click on Next. See Fig-
ure 262. on page 268.
b) In the Source End Point selection box, click on Add Backup button (left-hand bottom). The Primary
Source selection is enabled. Click on NAP list selection, select the source NAP from the list and click
on Next. See figure which follows
j) From the routing display, allocate and implement the path. Roting display and highlight are shown
in below figures.
This feature allows to create a 10 Gb Ethernet path in the SDH network, by means of AU4 and AU3
resources. The two end points of the path support the 10Gb rate.
N.B. 10GbE EPL Ethernet paths can be ended to the ASON NPA
SCOPE
SEQUENCE
– Service Type=Ethernet
– userlabel
k) The EPL path: trail activation log is shown in figure which follows
n) The Server trail list is shown below: the operational state of each trail is Disabled
The feature allows supporting of the point-to-multipoint EVPL services (G.8011.2 type 1). This type of ser-
vice provisioning is made available by the 10GBE board of the 1678MCC 4.1 through the Q3 management
interface.
N.B. No LCAS and no ASON management (EVPL services cannot terminate on ASON boundary)
are available in this release
SCOPE
SEQUENCE
c) Select the ports, if not yet selected, click on button EVPL, VLAN ID=2, vcnv=3, Priority
d) Complete the path creation with the Additional Information. Click on Finish.
h) Select the ports. The source port is the same of the previous path, called evpl ; the sink port is dif-
ferent. Click on button EVPL, enter VLAN ID=102, vcnv=14, Priority. Notice that username, sink port,
VLAN ID and vcnv are different from the ones relevant to the first path.
i) Complete the path creation as for path evpl. Figure which follows shows the Path list including evpl
and evpl_1
k) For each path you can display the relevant trail list.
l) For each trail you can issue the Trail routing display
The scope of this procedure is to enable/disable the EVPL mixed 10GbE-1GbE path flow control.
e) From the path list, point to the path and issue Ethernet: LCAS Hold Off Time
The auto-negotiation is an Ethernet mechanism that allows the connected Ethernet ports to configure
themselves in an optimal way (in terms of transmission parameters).
It applies to each type of ethernet path: uni-directional, bi-directional and broadcast.
The involved ports in the auto-negotiation mechanism are the Ethernet port of the NE and the port of the
connected router. For this reason, the auto-negotiation parameter can be set in a different way on the NE
ports ending an Ethernet path.
SCOPE
The feature allow to set in an independent way the auto-negotiation parameter on the Ethernet ports end-
ing an Ethernet path.
SEQUENCE
The auto-negotiation on the Ethernet ports is applicable to all the Ethernet paths, that is uni-directional,
bi-directional and broadcast.
Description
The feature allows to shutdown the laser not only in case of client failures detected at the GbE interface,
but also in case of SDH failures, in order to perform the protection switch in the client device.
The functionality is performed by means of the insertion of the CSF not only in case of client failures
detected at the GbE interface, but also for failures of the opposite direction, where the SDH is terminated.
To obtain this behaviour, RM has to automatically enable the bidirectional CSF insertion and the laser
shutdown capabilities.
Ì The functionality is supported by both 1GbE and 10GbE (no EVPL) of the 1678MCC, starting
from the R4.3.
SCENARIOS
According to the above scenarios, the following has to be taken into account:
bidirectional path
RM enables both the bidirectional CSF insertion and the laser shutdown consequent actions on the NAP.
In particular, for NAPs belonging to an ES64 board:
bidirectional CSF insertion consequent action is enabled by default; anyway the NE accept the request.
unidirectional path
on the sender side (NAP), RM disables both the bidirectional CSF insertion and the laser shutdown con-
sequent actions
on the receiver side (NAP), RM disables the bidirectional CSF insertion consequent action and enables
laser shutdown consequent action
The bidirectional CSF insertion consequent action is enabled by means of the Q3 consequentActionSup-
pression attribute of the genericDataTransportCTP object.
The lasershutdown consequent action is enabled by means of the Q3 lasetShutdown attribute of the
gMAUTTP object.
The ISA ES64 board belongs to the ISA-ES family of boards mapping Ethernet flow onto the SDH network.
It supports 10GbE interfaces and only HO virtual concatenation and it is only available in 1678MCC.
The ES64 board allows to create the following kinds of 10Gb rate adaptive path:
path1Eth
ES-64 ES-64
STM-64
physcon
1678-A 1678-C
STM-64
physcon
Ext
Netw-1
ES-64 53
10Gb-NAP path3Eth
56
1678-A
path2Eth
10Gb-NAP
1678-C
Figure 327. Path between a ES64 and a 10Gb port on the same node
Upon uploading of the ES64 board, 128 termination points (NAP) are uploaded. For each NAP a fictitious
port is created. In the example shown in below figure, via RM the user can create and implement paths
1, 2 and 3, i.e. RM only controls the SDH matrices (not drawn in this figure), which perform the SDH con-
nections. See para 10Gb Ethernet EPL for details.
path1Eth
Ext STM-64
physcon ES-64
Netw-1 53 ES-64
path3Eth
56
10Gb-NAP
STM-64 path2Eth
physcon
10Gb-NAP
1678-A 1678-C
The connections within the ES64 board are managed by the BM, which controls the entire Ethernet ser-
vice.
The user may access the ES64 board to check the connections, and, when requested, to create the con-
nections.
TASK
2) In our example we want to connect port 53 to port 56. Select port 53. Set Admin state=up. The
Operational state is Down, due to signal absence. The Rate Limited speed is the maximum
value admitted in Kb. (E.g. 10000=10Mb, 10000000=10Gb). The default value is 0 (no limita-
tion). Click on Save.
3) Select Inflow. Select Create. Enter userlabel and select the desired Traffic Descriptor, among
the available ones, previously created. Click on Save + Exit. At this point, according to the fol-
lowing scheme, Inflow 53 has been created
IN 53 XCON1 OUT 56
OUT 53 XCON2 IN 56
Select Data: Crossconnection. Click on Create. A dialog box allows to specify From and To.
a) Create path between two different ES64 boards (on 1678A and 1678C in this example). See fol-
lowing figures
b) Create path between a ES64 and a 10Gb port on the same node 1678C
Figure 333. Create path ES64 to 10Gb port same node step2
This paragraph describes the commands used to modify path configuration state and to display the path.
The Path state is "defined" after having been created. In this state only path terminations (NAP=Network
access point) are reserved.
For a defined path the user can make a reservation of the network resources required for the route. This
operation is called allocation.
a) Open the Path list: from the Browser point to the Network icon and issue the Search: Related items
pop up command. From the list of the available items select Paths and click on OK button.
b) From the list select the path to allocate and select the Actions: Configuration: Configuration State
Modification: Allocate pull-down menu. This command is also available as a pop-up menu item.
The Path working state changes from allocating to normal at the end of the allocation.
The Path configuration state changes from defined to allocated at the end of the allocation.
N.B. The Path Allocation can be executed only if the network is properly configured.
N.B. The allocation of a certain path can be prioritized with respect to the allocation already
requested for other paths if you enter Configuration: Configuration State Modification: Allocate
with Priority
– MinimumRequired Concatenation Level. It is specifies the minimum band required by the external
manager and that the RM operator should not modify. It corresponds to BM parameter CIR (see BM
Traffic Descriptor). E.g., for CIR=3000 (3Mb), if RM will carry this traffic on TU12-nV channels, at
least n=2 channels are required.
– Check Required Concatenation Level.(False/True). It specifies the lock. For active lock (True
value), RM operator cannot de-implement, remove or reduce band. Default value is False, then to
lock the path, RM operator must set the Check Required Concatenation Level to True.
Notice that RM administrator can change the default in the RM configuration files. See Administration
Guide for details.
If the lock is disabled the RM operator can do operation affecting traffic. In this case the system provides
a warning:
Show/Set attribute manages these attributes. The attributes are meaningful only for Ethernet paths and
are visible/settable in folder Ethernet. See following figure.
SCOPE
The allocation of a path is done with automatic payload configuration. The real payload change in the NE
occurs at path implementation time.
CONDITIONS
SEQUENCE
c) You can select the NAPs, in case of real node or enter the NAP name for Virtual node.
f) Issue path:configuration: Modify: Allocate. Path allocation in progress (see below figure)
i) The AU4-4C allocated path routing display shows the route: in the Link conn show you can check
that the path rate is =AU4-4C
j) But the physical connection structure view is not yet updated. See below figure.
The profile type of the profiles created by the operator is marked as USER.
The user profiles (USER) are managed by the operator and associated to the resources.
In this release the profiles can be associated only to the physical connections
SEQUENCE
N.B. For detailed information about the meaning and operation of the parameters, please refer to
chapter Technical Annexes, paragraph Allocation
With reference to the below figure, the following fields can be changed:
• user label
• medium threshold
• high threshold
The Saturation Profile List can be obtained from menu item Saturation Profile List.
• medium threshold
The creation of the fragmentation profile can be launched by means of the command Fragmentation Pro-
file Create.
The allocation algorithm includes the defragmentation feature. The defragmentation allows to rationally
organize the time slot occupation and optimize the allocation of higher order paths.
The detailed description of the algorithm can be found in Chapter TECHNICAL ANNEXES, paragraph
ALLOCATION and Defragmentation
CONDITIONS
SCOPE
A 2 Mbit path, from NODE A to NODE D, called 'civetta', will be allocated, with constraints, to TRAIL 2.
A subsequent 2 Mbit path, from NODE A to NODE D, due to the defragmentation algorithm, should
be allocated (without constraints) to TRAIL 2, thus optimizing the allocation of higher order paths.
SEQUENCE
a) Create path 'civetta' from NODE A to NODE D, setting the constraints of TRAIL 2 (see figure here-
below).
b) Allocate path 'civetta'. Issuing the detail of trail 2 it is possible to verify that path 'civetta' has been
correctly allocated. See figure below.
The Path Implement activity consists in sending commands to the NEs in order to set up the NE internal
connections.
The Path working state changes from implementing to normal at the end of the implementation.
The Path configuration state changes from allocated to implemented at the end of the implementation.
a) From the Path List select the path and the Actions: Configuration: Configuration State Modifica-
tion:Commission pull-down menu item.
When the path is in this state no other operations are possible except for path de-commissioning and per-
formance monitoring and TCAs enabling/disabling. (Threshold crossing).
It is possible to display the path route for allocated, implemented and commissioned paths from browser
or path inventory applications and from SDH netview.
From the Routing Display window you can display the Route Report by selecting View : Report: Route
full....
This view displays the complete path route including the main resources dedicated to the selected path.
From the Path Routing view you can display the route report of the path by entering the command View:
Report: Route full. An example of report is shown in Figure 358.
The Path Routing view wholly represents the connectivity objects belonging to a defined path.
The view is subdivided into vertical columns (named Main, Spare, Service), each of which represents a
whole route.
Some cases can be distinguished:
• Main
• Spare (more than one spare route can be present)
• different service routes
The number of service and spare connections depends on how the path has been constructed.
Moreover if the path is broadcast, the different legs are separately represented.
The main and spare routes are represented for each leg if the path is of the broadcast and protected type.
The Main route graphical representation comprises (in the area relevant to the first column):
– on the upper left-hand side the connection in topology icon at network level
From the first row on are listed the connections in topology at subnetwork level and eventually the
first connection in topology at level of Elementary Topology (ET).
Note that for each connection in topology, a continuous vertical line permits to identify the end points.
If one connection in topology is inside one route only, the vertical line directly connects the TPs (TTPs
or CTPs) involved.
On the right-hand side of the different connections in topology the first end point (NAP) is depicted, hence
in the column are displayed the CTPs and the link connections connecting the CTPs belonging to different
nodes.
The link connection icon contains the label describing the relevant payload position.
The representation of the "Switch" connections in topology (either Switch or Bridge & Switch) contains an
icon (Resource Type) indicating the actual switch status. It can be:
The connection in topology of the Switch, B&S, or Service type may also contain the Operation Mode infor-
mation (bidirectional arrow) which can be Revertive or not Revertive.
N.B. The Path Routing View permits to display the actual route of the path. For this purpose the
switch Resource Type indications should be analyzed. In the following Figure 359.are given two
examples:
M M M M
M M
MAIN
SPARE
SPARE
Clicking on the group icon 'Routing display' located on the view next to the link connection, it is possible
to display the objects relevant to the Link Connection at higher order.
Clicking on 'Nap view' button inside the icon bar it is possible to open the view to display all path's ter-
minations.
For a path crossing a NPE Ring, the user can verify the connections on the traffic map.
The scope of this procedure is to display the path/trail route in the Netview maps. The Highlite/Locate but-
ton is present in the Path list/ Trail list and in other drawing windows containing the object to show(Naps
view, Routing view, Paths in Trail, Physical connection...etc). The sequence listed herebelow refers to the
locate of a path from the path list.
Notice that the view is not automatically refreshed after a modification of the protection (Add/Remove pro-
tection); in this case the sequence of operations must be executed again.
SEQUENCE
a) From the path list select the path to display and click on Highlight/Locate button.
1) If the transport is not protected the following are displayed: (see icons in the figure below)
N.B. Sometimes happens that asking for Path Status in Physical Connection the status of the path
is 'indeterminate' even if the traffic is stable in the physical connection.
A path is "indeterminated" when it is not possible to synchronize switches on the NEs. The reason of the
failure of the synchronization could be:
• an operation is already in progress on the PATH/TRAIL. TRS agent inhibited the operation
• NE_G/NE is unreachable
• NE fault
The first case is a typical situation when different users execute at the same time the same operation. The
same situation is also reached if the same user asks many times the same operation.
This feature allows to declare the Service State (IN-SERVICE or NOT_IN_SERVICE) for a transport entity.
– client/path
SEQUENCE
b) Point to the physical connection to modify and issue the pop-up menu item Configuration: Service
State Modification
c) A dictionary is displayed, allowing to select between IN-SERVICE and NOT-IN-SERVICE. Select the
desired service state and click on OK button.
d) It is possible to supervise the successful Service State Modification on the AS Counter Summary.
The parameter section allows to assign a constraint directly to a specific branch (main, spare, service)
of the path/trail
The old constrainType parameter was an enumerated composed by many values (about 20). This con-
dition is not suitable for the operator that is obliged to choice a value among 20 different options. The idea
is to split this long list into two short lists
The backward compatibility is kept allowing the old constraint batch command batch utility and the exter-
nal managers to use the old constrainType (see Basic routing constraint management with dynamic pay-
load (Backward compatibility) feature) by the old action -definePathConstr.
Using as constraint also the potential resources LCs and CTPs (and, of course, the real ones)
The new path/trail constraint management allows to use as constraint the potential resources; i.e. poten-
tial LCs and CTPs (and, of course, the real ones).
The old action definePathConstr is still working and allows the backward compatibility.
In order to make easier the choice that the user has to do, the old constrainType field is split in two fields:
constraintType (the new one) & section. In details:
• main
• spare
• service
• service A-Z
• service Z-A
• common
The mapping between the old constrainType and the new parameters (Section, New constraintType) is:
main use
useMainSpare
spare use
main useAsSink
useMainSpare
spare useAsSink
main useAsSource
useMainSpareZ
xpare useAsSource
N.B. Each one of the last three old constrainType values is mapped by two values of the couple (sec-
tion, new constraintType)
The old useMainA is mapped with the new useAsSink. This mapping is due to the fact that the old con-
straintType is referred to the cross connection within network element, while the new constraint type is
referred externally to the network element.
The following figures clarifies the mentioned mapping.
The introduction of the new feature implicit payload configuration (the dynamic payload) allows the user
to allocate a path (at a specified rate) without configuring the needed link connections (then also the CTPs)
at the same rate of the path transport rate.
The new path/trail constraints management allows to use as constraint also the potential LCs and CTPs
(and, of course, the real ones).
LC = Trail + PayloadPosition;
– Path
– PhysConn
– Node
– NPA
Use as constraint function; this new function is available over the list of class tag that can be used as con-
straint. The object is automatically added to the constraints list on the wizard already open. Also in this
case the previous restrictions are valid.
The RM browser allows to keep open only one instance of constraints wizard; i.e. it is not possible to define
in parallel way the constraints of two different paths/trails.
CONDITIONS
– fully manual allocation. The path route can be fully specified, including the payload position. Namely
the user can specify the lower order link connection as constraint.
– partially automatic allocation. The user specifies only a part of the route. The allocation algorithm
completes the research of the route resources.
WARNING
The constraint is accepted as mandatory condition by the allocation algorithm, so the path/trail allocation
will fail if a constraint cannot be satisfied. If a path/trail allocation fails, the user is fully informed by the Path
Fail to Allocate tool. See Section Maintenance of this Handbook.
OPERATION
The Path Constraints can be always issued but they will be taken into account during the path allocation
phase: so if the path is implemented, the operator must deimplement and deallocate it and subsequently
issue a new allocation.
Trail Constraints can be always issued but they will be taken into account during the trail setup phase: so
if the trail is set, the operator must deimplement and deallocate it and subsequently issue a new allocation.
Previous Parameters
– Use Main
– Use Spare
– Not use Main
– Not use Spare
– Use Main and Spare
– Not use
– Use Service (for a D&C protected path)
– Not use Service (for a D&C protected path)
– Overlapped if the object utilized as a constraint is a path
– Disjointed if the object utilized as a constraint is a path
– Use Main as A. This constraint can be applied only to a CTP, used as constraint to a unidirectional
or broadcast path. See Figure 369.
– Use Main as Z. This constraint can be applied only to a CTP, used as constraint to a unidirectional
or broadcast path. See Figure 369.
– Use Main and Spare as A, if the main and spare route are using the same CTP as A termination.
The values Use Service Forwards and Use Service Backwards are significant for paths crossing a
Dual Node SNCP network.
The user drops as constraint one of the Physical connections between the two D& C nodes, or a link
connection, or a CTP, then must select between Use Service Forwards and Use Service Backwards.
If the user selects Use Service Forwards, the object dropped as constraint will be used as service
route/termination to protect the forward transmission direction (from A to Z or from the left to the right
or the TX). See Figure 370.herebelow.
If the user selects Use Service Backwards, the object dropped as constraint will be used as service
route/termination to protect the backward transmission direction (from Z to A or from the right to the
left or the RX). See Figure 370.herebelow.
BACKWARD
Figure 370. Use Service Forward/Backward for Dual Node SNCP network
a) From Routing display click on button Add Constraints. See following figure
c) The Select Path/Trail box allows to drag and drop the object to constrain, if not yet selected. This
box allows to manage many sets of constraints, each of them can be active at a time. In absence
of previously entered constraints, the active set is said initial. The routing constraints selection
table is shown in the lower part of the window.
• main
• spare
• service
• service A-Z
• service Z-A
• common
• use
• don't use
• overlap
• .......
N.B. The meaning of the above parameters, with reference to the previous parameters classification,
is detailed at previous paragraph .
d) Drag and drop (i.g. from the map) the object to be used as constraint and select type and section
g) Clicking twice on the cell relevant to position, a entry box opens, allowing to specify time slot position
h) Click on Finish. The action to create and to render active the constraint set is executed.
j) Select the position, choosing a 2 Mb time slot, which is contained is a link connection structured at
TU3.
l) Implement the 2 Mb path. Only after the implementation, the structure of the involved LC appears
complete.
The Path: Constraints menu contains the submenu: Show/Set, Copy Constraints and Paste Constraints.
b) Enter the command Add: Leg either by selecting the relevant tool button or by using the menu
Modification: Add Leg. See Figure 389.The Add Leg dialog box opens. The path icon is contained
in the path drop area. See Figure 390.
c) Select the node from the browser/node list or the NAP from the nap list and enter the command Add:
Leg either by selecting the relevant tool button or by using the menu Modification: Add Leg. The
selected node now appears in the Leg drop area of the Add Leg dialog box. Alternatively you can
drag the node from browser to the Add Leg window, as per Figure 391.
d) Click on button Add Leg. See Figure 392.The leg is allocated and implemented.
Removing a leg
Select the sink NAP to remove and issue the action Broadcast Path Modify: Remove Leg. It is possible
to release the NAP or to keep it associated to the path.
– Server MS protection usage profile: it represents the profile of the MS resources to be used in allo-
cating the path.
The possible values are:
• Normal (default)
– For 1664SM rings, the RIP mechanism is used, i.e. when crossing 4 Fibers MS-Spring,
the path uses only working (high priority) resources, except for primary and secondary
nodes of the double interconnection with another ring, because these nodes are charac-
terized by the Drop & Continue protection (RIP)
as a result, in the segment between service nodes:
• if the path is bidirectional, the used resource (nodes E, D, H, I) can be only the pro-
tection one: a bidirectional D&C IC on protection is performed in the primary nodes
(D, H);
• if a path is unidirectional point-to-point, the used resource is:
• protection if the signal flows into the service nodes (B, C): a unidirectional D&C IC
on protection is performed in the primary node (B);
• working if the signal flows out of the service nodes (E, D): a multipoint connection
is performed in the primary node (E); this allows the user to perform subsequent add
leg operation;
– For 1670SM rings the path uses only working resources (RIW)
• Protection preferred
When crossing a 4 Fibre MS-Spring, the path uses protecting (low priority) resources.
If the routing algorithm must use the working resource in one span of the 4F MS-spring (e.g.
no free resources in the protection, or a constraint is applied), all working resources are used
in the ring, in order to avoid jumps between working and protection resources (jumps not fore-
seen for the management of ring traffic map).
If the path is protected and main and spare routes are crossing the same MS-Spring, each route
crosses separately the ring itself since D&C connection are not available for protecting
resources.
As a consequence of this behavior and of the fact that the SNCP connection is not available
on a 4f MS-Spring, if the protected HO path is completely inside a 4f MS-Spring, the allocation
will always fail.
• Protection only
the path uses only protecting (low priority) resources.
N.B. The procedure used to create a path crossing a NPE Ring is the same as described in the pre-
vious paragraphs.
SNCP
A B C R
NPE
F E D
SNCP
SNCP
A B C
NPE
R F E D
Equipment=1664SM
SNCP
SNCP
A B C
NPE
F E D
R
SNCP SNCP
R
A B C
NPE
F E D
Equipment=1670SM
SNCP
(see Figure 396.on page 357, Figure 397.on page 358, Figure 398.on page 359, Figure 399.on page 359.)
Drop and Continue is a way of protecting a path crossing a number of sub-networks, e.g., rings.
The sub-networks should be connected through at least two nodes (so realizing two independent con-
nections).
The resulting architecture affords protection against multiple failures (evenly distributed one per subnet-
work) tolerated without traffic loss (node failure or single cable cut).
The traffic entities interconnected by the drop and continue feature can be TU12, TU3 and AU-4.
The Drop and Continue feature improves traffic availability as compared with the simple "end-to-end
SNCP/I". More subnetworks are connected the further is availability increased.
The Drop and Continue features simultaneously realizes the following on one node:
• unidirectional pass-through
• protected drop
• D/C-W INS-W
• D/C-E INS-W
• D/C-E INS-E
• D/C-W INS-E
D/C stands for "Drop and Continue", the letter after it (W=West, E=East) indicates the "drop protected"
side (e.g., W means West main side, and spare side is the EAST one).
The end letter (INS-E or INS-W) indicates the insert side.
The "Unidirectional pass-through" is always in the direction opposite to that of the "insert" side (e.g., when
"INS E" the pass-through is from East to West).
Tx Rx
TRIBUTARY
Tx Rx
The "Drop and Continue" featuring two connected rings (with dual connection) is indicated in Figure
397.on page 358.
SNCP/I protection is enabled throughout the equipment. When in normal condition, the unidirectional way
of traffic from 1 to 8 is supposed to be:1, 2, 3, 6, 7, 8.
After a failure on the 1st ring between nodes 2 and 3 (see Figure 398. on page359), the link direction is:
1 , 5 , 4 , 3 , 6 , 7, 8.
After a second failure on the 2nd ring between nodes 6 and 7 (see Figure 399. on page 359) the selected
direction on the link is : 1 , 5 , 4 , 10 , 9 , 8.
The operative switch is on node 8 and the previous pass through between nodes 4 and 3 is no more used.
2 5
3 4
D/CW INSW D/CE INSE
W E W E
INS
INS E
W
TRIB TRIB
W E W E
INS
W INS
E
7 9
2 5
3 4
6 10
7 9
2 5
3 4
6 10
7 9
a) With reference to a network like the one shown in Figure 397.select the end nodes and issue Actions:
Create Path.
b) In the path create wizard select protection = D & C SNCP. Execute the complete sequence of path
create, as required by the wizard. Finally click on Finish button.
e) Clicking on Routing view button it is possible to display main, spare and service routes.
Figure 400. Submaps of 2nd level subnetworks (ET-1 , ET-2, ET-3) for 2 ND&C
tpAZ tpZA
tpAZ tpZA
tp tp
The path create procedure described at para 2.3.36.4 herebelow refers to the example network of Figure
400.and Figure 401.
The Path Create procedure is the same as described in the previous paragraphs, with the following excep-
tions:
– Rate=140 Mb,
Upon path allocation, the system evaluates, as in case of basic D & C (see Figure 402.)
– main route
– spare route
– two service routes
The graphical appearance of this figure has been changed while contents maintain their validity
If you click on the icon of the Switch status, the system opens a subwindow which displays the switch sta-
tus. Figure 403.shows the subwindows relevant to the routing display view of Figure 402.
BOARD
CTP NAME DETAIL NODE NAME
SUBRACK PORT
RACK Channel (N.A.)
PAYLOAD POSITION
N.B. The CTP name (see above figure) contains the port name; then from the CTP issue Display:
Related items: Ports. From the Port issue Display: Related items: Physical Connection.
– tp A: comprises a switch for the connections coming from tp Z and tp ZA, one point to point from tp
A to tp Z, one point to point from tp A to tp AZ
– tp Z: comprises a switch for the connections coming from tp A and tp AZ, one point to point from tp
Z to tp A, one point to point from tp Z to tp ZA
– tp ZA: comprises one point to point from tp ZA to tp A, one point to point from tp Z to tp ZA
– tp AZ: comprises one point to point from tp AZ to tp Z, one point to point from tp A to tp AZ
The default switch type is NOT revertive.
N.B. As in the case of the normal D&C, it is not possible from the User Interface to select the TPs
involved in the D&C but they are automatically selected by the algorithm. The TPs can be
selected from the command mode because this is needed to support the “redo-log" function-
ality.
It is also possible to add or to remove the D&C protection to path without or with D&C protection. Relevant
commands are under menus:
The values Use Service Forwards and Use Service Backwards are significant for paths crossing a
SNCP network.
The user drops as constraint one of the Physical connections between the two D& C nodes, or a link
connection, or a CTP, then must select between Use Service Forwards and Use Service Backwards.
If the user selects Use Service Forwards, the object dropped as constraint will be used as service
route/termination to protect the forward transmission direction (from A to Z or from the left to the right
or the TX). See Figure 406.
If the user selects Use Service Backwards, the object dropped as constraint will be used as service
route/termination to protect the backward transmission direction (from Z to A or from the right to the
left or the RX). See Figure 406.
FORWARD
BACKWARD
Figure 406. Use Service Forward/Backward for Dual Node SNCP network
This connection is useful to increase the protection level when a single NE is interconnecting multiple
rings.
In fact, a path supported by a single virtual ring between the end points A and Z, is not able to survive to
a double failure. See Figure 407.herebelow.
A Z
A A Z Z
The Path Create procedure is the same as described in the previous paragraphs, with the following excep-
tions:
– Rate=140 Mb,
If you click on the icon of the Switch status, the system opens a subwindow which displays the switch sta-
tus. shows the subwindows relevant to the routing display view of Figure 402.
N.B. Figure 409.shows the involved connections. The default switch type is NOT revertive
N.B. The drawing of the switch shows the main switch position (line) and spare switch position
(dashed line). The actual switch position is marked by a M (switch turned on main) or S (switch
turned on spare). See above Figure 409.
– tp A: comprises a switch for the connections coming from tp Z and tp ZA, one point to point from tp
A to tp Z, one point to point from tp A to tp AZ
– tp Z: comprises a switch for the connections coming from tp A and tp AZ, one point to point from tp
Z to tp A, one point to point from tp Z to tp ZA
– tp ZA: comprises one point to point from tp ZA to tp A, one point to point from tp Z to tp ZA
– tp AZ: comprises one point to point from tp AZ to tp Z, one point to point from tp A to tp AZ
N.B. As in the case of the normal D&C, it is not possible from the User Interface to select the tp's
involved in the D&C but they are automatically selected by the routing algorithm. The tp's can
be selected from the command mode because this is needed to support the “redo-log" func-
tionality.
It is also possible to add or to remove the D&C protection to path without or with D&C protection by either
pointing to the topology where the interconnection NE's are included (e.g. the ET which contains the Cross
connect equipment) or to the whole path.
– the enhanced SNCP is automatically inserted at path/trail allocation time for protected paths/trails
when the main and the spare are crossing the same NE and the equipment supports this type of pro-
tection.
– The user can add / remove the enhanced SNCP protection in two different ways:
• applying the add/remove service to the whole path/trail: the enhanced SNCP protection is also
removed
• applying the add/remove service to the connection in topology at NE level: the enhanced SNCP
protection is modified only at NE level.
• No limitation should be present on the NE support of the connection since the result in this case
is the failure in implementing the protected path
a) The path highlighted in figure below is SNCP protected. Only one physical connection is present from
node 1650SMC_C to node 1650SMC_A.
b) Point to the path to which the service protection has to be added and issue Path: Modify: Path Mod-
ification Tool
d) Select first and second destination, according to the standard selection mechanism. Figure which
follows shows the Selection of the second termination
The feature allows the management of the D&C 4 nodes interconnection also for the NEs that do not sup-
port, at Q3 interface, the Drop&Continue connection object (representing the three atomic connections
that compose a drop and continue connection schema). For these NEs, the three atomic connections are
provided by RM.
OPERATION
• OMSN
• 1850TSS
• 1678MCC
– for the NEs supporting the Drop&Continue connection object, the Drop&Continue connection object
is still provided to the NE
– the add/remove service, when the three atomic connections are provided to the NE, has no traffic
impact only if it is possible to join two unidirectional connection into one bidirectional (remove ser-
vice) and to split a bidirectional connection into two unidirectional (add service)
• 1641SX
• 1664SX
• 1674LG
2.3.38 D&C for dual node interconnection on single physical connection (only add
service)
DESCRIPTION
The feature allows the use of a single physical connection for the two route services in a D&C dual node
interconnection, when no resources are available to use two physical connections. The functionality is
allowed only by means of the add service operation specifying the target connections/end points.
OPERATION
– a single physical connection is used for the two route services, when no resources are available to
use two physical connections
– a single physical connection is used for the two route services, even if resources are available to use
two physical connections, when a constraint to use the same physical connection is specified
– *the add service can be performed only by means of the wizard, providing the two target connections
Figure 415. D&C for dual node interconnection on single physical connection
A new attribute (timeslot interchange) has been added for the NPA. This attribute allows to inhibit or not
the timeslot interchange. The NPA can be marked as:
– timeslot interchange not meaningful (allowed), that is paths/trails will be allocated following the usual
rules, i.e.:
• for paths and HO trails of virtual concatenation: the rules are based on fragmentation and first
free time slot
• for other HO trails: the rules are the same described in next bullet (preferable avoided)
– time slot interchange still allowed (preferably avoided), but paths/trails will be allocated keeping the
same time slot in the NPA, if possible
– timeslot interchange not allowed (forbidden), that is paths/trails will be allocated keeping the same
time slot in the NPA, if possible; if not possible, the allocation fails
– the value of the attribute is meaningful only for new path/trail to be allocated; no modifications are
foreseen for paths/trails already allocated
– setting to preferable avoided or forbidden value on a NPA already crossed by paths/trails with
timeslot interchange is allowed
– in the trail setup between two CTPs, the trail definition is rejected if these CTPs are in the same NPA,
their payload position is different and the time slot interchange is forbidden in the NPA
– the attribute timeslot interchange is meaningful and modifiable only for SNCP and 2f MS-Spring at
Lower Order
– in all the MS-Springs (both 2F and 4F) at HO the time slot interchange is always forbidden, even if
timeslot interchange is allowed
– in case of add protection/add service, the spare/service to be added will be allocated keeping the
same payload position, that can be different from the payload positions of the link connections
already used in the path/trail in this ring
N.B. This add protection, followed by a remove protection keeping spare, provides a way for the user to
reroute a path/trail, removing the time slot interchange in the ring, without traffic hits
– in case of LO paths, the checks on payload position are performed at path layer only (cross-con-
nection at path layer without timeslot interchange). So, it may occur that a HO trail, completely inside
the ring, with at least 2 hops of length with timeslot interchange (e.g. 01 - 02), can be used by the
path even if timeslot interchange is forbidden
– In case of HO trail partially contained in the ring and partially out, the LO CTP in the aggregate port
inside the ring is to be considered as part of the ring. So, in case of LO path, the timeslot of CTP A
and CTP B has to be the same; the timeslot of CTP C can be different because the long HO trail per-
form timeslot interchange (see figure below)
– if the CTP C (see figure below) belongs to an aggregate port of a node in another ring, in case of
LO path, the timeslot of CTP A and CTP B has to be the same; the timeslot of CTP C and CTP D
has to be the same but can be different from CTP A/B because the long HO trail perform timeslot
interchange
– the paths/trails crossing the NPA with timeslot interchange can be retrieved from the NPA itself (new
inventory)
Figure which follows shows the selection of the time slot interchange mode during NPA creation and later
via NPA Show/Set Attributes.
The same name is shown in the relevant NAP list (NAPs (with Path information). See following figures
The resources needed for a successful command completion could be used by other paths; it
is advisable to create protected paths instead of adding subsequently the protection; namely in
this case the allocation algorithm makes the reservation of non-overlapped routes.
In case of overlapping of an existing route with the new protection route required by the Add Protection
command, it is possible to find the existing route by using the Paths in trail view invoked on the trails ter-
minated to the nodes where terminates the path to be protected.
The Path/Trail Modification Tool (see below icon), provides the following options:
2.3.41.1 Add allocated/implemented protection route between two NE's from routing
display
Starting from the routing display, the user can add a protection route for an allocated/implemented path/
trail.
Selecting the two connections belonging to different nodes, the portion of path/trail to be protected is
identified.
• “A" connection
• “Z" connection
After the selection of the first connection, the choice of the second one is restricted to a subset, with the
following rules:
– if the first connection was chosen starting from the “A connection" wizard area, the second one:
• must be in the same branch (i.e. main or spare or, for a broadcast path, same leg)
• must be located above the first bridge/switch connection below the selected connection
– if the first connection was chosen starting from the “Z connection" wizard area, the second one:
• must be located below the first bridge/switch connection above the selected connection
SEQUENCE
b) The user selects a connection in the routing display window; this connection is dropped in the wizard
window. When both connections have been selected, the user can control if they are the desired
ones and confirm the operation.
N.B. The user is allowed to choose the same connection both at “A" and “Z" side. This allows a par-
ticular addition of protection that can be useful, for example, in the collapsed dual node between
two MS-Springs.
SCOPE
Starting from the routing display, the user can remove a protection route (keeping main/spare) from apath/
trail. Selecting a connection/link connection of one branch (main/spare), the protection route to be
removed is identified.
SEQUENCE
The routing display helps the user enabling for selection, only connections in node/link connections
between a pair of bridge&switch. The user has to select only one element: the corresponding branch will
be removed.
When the element is selected, the bounding bridge&switch connections are retrieved and displayed on
the wizard and the information related to the selected branch (main/spare) is provided. At this point the
user can control if they are the desired ones and confirm the operation.
The result of the operation, if successful, is the removal, from the path/trail, of the protection route (keeping
N.B. The user is allowed to remove a branch of path/trail that starts and ends in the same connection
in topology, e.g. the one used in the collapsed dual node between two MS-Springs (see above
add spare).
The following types of add service can be selected: (see following figure)
– generic service
SCOPE
• two services between four nodes, resulting in four “classic" drop & continue in all the nodes (it
is allowed only for bi-directional paths/trails)
• only one service between two nodes, resulting in two “classic" drop & continue in all the nodes
(it is allowed for both bi-directional paths/trails and unidirectional paths)
• a particular mixed case among three nodes, i.e. two nodes with “classic" drop & continue in one
branch, only one node with "Dual node" drop & continue in the other branch (it is allowed only
for bi-directional paths/trails)
The wizard has to be used with the advanced profile that allows the addition of services among two or
four generic nodes.
SEQUENCE
• “A" main
• “A" spare
• “Z" main
• “Z" spare
Clicking on one of these areas, the routing display allows the user to select connections. The set of select-
able connections is restricted by the following rules:
• the first connection is selectable among the connections belonging to the path/trail portions
between bridge & switch connections
• if a connection main (spare) was selected the spare (main) connections can be selected from
the corresponding path/trail spare portion
• if the A connection (main or spare) was already selected the Z connection is selectable among
the connections below the selected one and above the bridge & switch
• if the Z connection (main or spare) was already selected the A connection is selectable among
the connections above the selected one and below the bridge & switch
- Each time a connection is selected in the routing display window, it is dropped in the wizard window in
the proper area.
In general, the user can specify two or four connections, activating the request to add one or two services
to the path/trail.
SEQUENCE
b) The user selects a connection in the routing display window; this connection is dropped in the wizard
window. When both connections have been selected, the user can control if they are the desired
ones and confirm the operation.
SEQUENCE
• “A" main
• “A" spare
• “Z" main
• “Z" spare
Only SNCP NPAs crossed by both main and spare branches of the path can be selectable. When the NPA
is selected, the four areas in the wizard window are automatically filled with the bound connections.
In general, the user can use two or four connections, activating the request to add one or two services
to the path/trail respectively.
SCOPE
The routing display let the user select only two connections inside two nodes.
The routing display restricts the selection of these two connections that must be:
• in different branches (i.e. one in the main and one in the spare branch)
• in different nodes
SEQUENCE
b) Select option Dual node drop & continue and click on Next button. the wizard is presented
c) Select the connection in topology and click on Select button. The selected connection in topology
is now present in the wizard
d) After the selection of the second connections in topology, click on Finish button to confirm
SCOPE
SEQUENCE
b) Select option Single node drop & continue and click on Next button.
d) Select the switch (connection in topology). The second switch is automatically selected. See Figure
431.on page 390
The result of this operation, if successful, will be the addition to the path/trail of one single node drop &
continue connection, contained in the same node as the two selected connections.
To remove protection service, the user has to select one connection. Depending on the type of service
to remove the routing display retrieves other connections in topology. In particular:
• to remove a collapsed single node drop & continue, the user has to select the single node D&C:
no other connection is retrieved
• to remove a collapsed dual node drop & continue, the user has to select one of the two con-
nections that are ends of the two service: the other one is retrieved automatically
• to remove one or two services between two or four “classic" drop & continue, the user has to
select one of the involved connections: the other drop & continue in the same service is
retrieved; the user can also select another drop & continue related to a second service to be
removed
The user has also to specify whether the system has to check if the services to be removed are supporting
traffic. The selected and retrieved connections are dropped in the wizard window. At this point the user
can control if they are the desired ones and confirm the operation. The result of this operation, if suc-
cessful, will be the removal from the path/trail of the service between the connections dropped in the wiz-
ard window.
SCOPE
This command allows to reroute a transport object. The transport object can be allocated, partially imple-
mented or implemented.
SEQUENCE
– normal mode: the operation is allowed only when it is possible to avoid traffic hits, i.e. when the
transport object is allocated or in the following cases:
• inside an ASON NPA; in this case 1354RM uses the service offered by GMRE to move the nom-
inal route of a SNC, without affecting traffic
• inside a fast restoration NPA; in this case, the operation only changes the routing in the
1354RMMIB, without performing any operation to the NEs
• on not active trails of a virtual concatenated path, because they are not carrying traffic
– forced mode: the operation is allowed even if it can create traffic hits.For protected transports, the
segment that can be rerouted must contain only point-to-point connections intopology.For broadcast
paths, rerouting is not supported.
Figure which follows shows an example of Transport reroute step 2 dialog box.
This command applies only to allocated transports and allows to revert to the previous route.
Create a restoration rule means enable the restoration function for the selected transport (path or trail)
according to the rule being created.
a) From the path list or trail list select an HO path or an HO trail and select button Create Restoration
Rule. See Figure 433.The Create Restoration Rule is displayed. See Figure 434.on page 394
– optimized add protection (for point to point transports only).This strategy does not cause
a complete path rerouting but only finds a spare route inside the lowest level topology (e.g.
a ring) affected by the fault.
– end to end add protection. (for point to point and broadcast transports) This strategy
causes a complete path rerouting by allocating the path spare route.
– remove protection + end to end add protection (for point to point transports only). It
removes the protections and adds one end to end spare route. For paths protected by the
D&C mechanism both spare and spare+service connections are removed; only one end
to end spare route is allocated.
2) Hold Off Time (sec). This time is the waiting time before starting the restoration subprocess.
– all objects. This option will successfully restore the transport upon repair of the related
resources.
– use default constraints. This option sets the usage of the "spare" constraints for the trans-
port restoration. The "spare" constraints are added by means of the Path Constraints
application.
c) Click on the functional button Create. The restoration rule is created. Its name coincides with the
transport name.
a) From the browser point to the network domain and issue the command Display: Related Items.
Select Restoration Rules. The icon of the restoration domain is displayed in the browser window (see
Figure 435.) and the restoration rule list opens. See Figure 436.
b) You can display other attributes by selecting the transport and issuing the command
Actions:Details:Show/Set Attributes. The dialog box of Figure 437.is presented.
For trail or path the attribute Restoration state can assume one of the following values:
– none. No restoration rule is associated to the transport.
– supervised. A restoration rule is associated to the transport.
– restored. The transport has been restored. A subsequent restore cannot visualized. In
order to return to the supervised status, the operator must select the transport (from the
list) and issue the command Actions:Restoration:Set to Supervised.
SCOPE The scope of this procedure is to merge a pair of paths into one single path.
CONDITIONS
a) In the example which follows a path crossing SUBN1 must be merged to a path crossing SUBN2.
b) By clicking twice on the icons of SUBN1 and SUBN2 it is possible to display the two subnetwork sub-
maps. See Figure 438.
c) Both SUBN1 and SUBN2 are crossed respectively by path P1 and path P2 which physically are the
same path. Namely both P1 and P2 are terminated to virtual nodes NE_V1 and NE_V2. The Path
List containing P1 and P2 is shown in Figure 439.To display the Path List, from the browser, point
to the Network icon and issue Actions: Display: Related items: Paths in Topology + No Filter.
SEQUENCE
a) Create a physical connection between nodes NE-V1 and NE-V2. Select nodes NE-V1 and NE-V2
and issue Create: Physical Connection
b) In the Create Connection wizard step 1, select connection type SDH, enter connection name, select
STM type and click on Next button, thus passing to step 2.
c) Node NE-V1 is already present in the drop area. Enter the port name. This causes the creation of
the virtual port. Node NE-V2 is already present in the drop area. Enter the port name. This causes
the creation of the virtual port. Click on Next button.
The Previous button allows to revert to the previous screen, in order to modify port selection, con-
nection name...
N.B. If the paths to merge are protected, two virtual Physical connections must be created at above
steps a) to d). The redundant SDH virtual ports must be created accordingly.
e) Execute the implementation of the virtual physical connection. Select the virtual physical connection
Actions: Modifications: Implement
f) Execute the payload configuration of the virtual physical connection: select the object from the map
and issue Tools: Modify Payload. The payload structure must be congruent with the configuration
of SUBN1 and SUBN2.
h) Allocate and implement path PV (e.g. selecting the path from the path list and issuing Actions: Con-
figuration: Config. State modification: Allocate and then Actions: Configuration:Config. State mod-
ification: Implement.
i) From the path list (see Figure 445.herebelow) join first paths P1+PV. Select the paths and issue
Actions: Modification: Join.
l) In the Join path dialog box enter the name of the joined path, e.g. P and click on the functional button
Join path. After a few seconds paths P2 and P3 are deleted and the new path P is created and imple-
mented. See Figure 449.
SCOPE
SEQUENCE
a) Select the path P to split from the path list and issue Actions: Manage path: Split path
b) In the Split path dialog box enter the names of the two paths which are replacing the path to split and
click on Split path button. The system presents to the user the list of the nodes along the path route.
c) Select the node where the path must be split and confirm. Path P is deleted and the new paths are
created and implemented.
A given HO-Trail crossing at HO a Node can be split in order to perform crossing at LO. This enables the
usage of LO resources in the splitting Node.
The operation reproduces in the splitting node the same payload structure of the starting trail.
SEQUENCE
c) The system presents the list of the possible splitting nodes. Select the node and click on OK.
The payload structure and the LO connections of the 2 nodes at the end of the involved HO trails are not
modified during the operations: modifications to connections and payload structure are applied only to the
splitting node.
The operation reduces the impacts on the existing traffic: the LO-Paths client of the involved HO trails are
disconnected only for the time necessary to perform the operation: only the segment of network between
the end nodes of the involved HO trails is affected.
Two HO-Trails entering in a given NE can be joined in order to reduce the LO usage of resources.
SEQUENCE
a) From the trail list select the HO-Trails to join. See Figure 458.
b) Select the command Actions:Modification: Join. The Join trail dialog box is presented, containing the
two selected trails, as per Figure 459.Enter the name of the new joined trail.
The payload structure and the LO connections of the 2 nodes at the end of the involved HO trails are not
modified during the operations: modifications to connections and payload structure are applied only to the
intermediate node.
The operation reduces the impacts on the existing traffic: LO-Paths client of the involved HO trails are dis-
connected only for the time necessary to perform the operation and only in the segment of network
between the end nodes of the involved HO trails.
SCOPE
The Split Physical Connection is used to insert a new Node into a pre-existent topology.
STATUS CONDITIONS
Allowed Physical Connection working states are: Normal, Failed to Split, Failed to undo Split, Failed to
disconnect.
TOPOLOGY CONDITIONS
If the PhysCon is included in a ring the node to insert is not connected and placed in the ring map. See
example herebelow.
SEQUENCE
a) From browser interface point to the icon of the Physical Connection to split and issue the command
Topology Modification: Split.
The central part of the window allows to select the node to insert. Click on the selection button (three
points). The node list is presented. See Figure 462.
c) Select the node to insert and click on Apply button. The icon of the selected node appears in the wiz-
ard. See Figure 463.herebelow. You can also display the node in the map by clicking on the Highlight
button.
g) Select the port to connect and click on Apply button. The icon of the selected port is presented in
the wizard.
h) Enter the new connection name and click on Next button to continue.The wizard now presents the
summary view of the operations executed by the user. See Figure 467.herebelow.
3) Insert node in ET
4) MS-TP structure
N.B. This command is not possible if the two physical connections are connected to the same nodes.
See following figure
A B
Join A+B allowed
SCOPE
CONDITIONS
The topology implementation state is Implemented and the working state is Normal.
SEQUENCE
a) From browser interface point to the icon of the Physical Connection to slit and issue the command
Topology Modification: Join. The Join Physical Connections dialog box is displayed. See Figure
469.on page 425
If following a join physical connection procedure, the physical connection enters the Fail to join state, the
operator can select the Undo Join physical connection.
If following a slit physical connection procedure, the physical connection enters the Fail to split state, the
operator can select the Undo Split physical connection.
If following a join/slit physical connection procedure, the physical connection enters the Fail to disconnect
state, the operator can select the Connect path action or repeate the failed action.
If following a join/slit physical connection procedure, the physical connection enters the Fail to connect
state, the operator can select the Connect/Disconnect Path/Trail
2.3.46.1 Introduction
This feature activates the adaptation function of the incoming 2 MB/s ISDN-PRA signal to process a
framed or not framed signal.
a) From the path pop-up menu select item Client Alarms: PDH alarm monitoring. The ISDN-PRA dialog
box is presented. See Figure 472.on page 428. The dialog box is structured in two sequential views.
The first window allows to select the PDH alarm monitoring type. See Figure 472.on page 428.
– framed. The pdh signal frame is monitored and consequent alarms are generated. The monitoring
direction (ingressing / egressing, both or none)
– ISDN-PRA (Integrated Service Data Network-Primary Access=2 Mb/s). This option is allowed for
bidirectional paths only. Only one of the two ports must be marked as NT (Network Termination). PDH
monitoring (frame monitoring) will be activated only on the port marked as NT, which is the one con-
nected to the TE (Terminal Equipment = User's premises
– leased line PRA. This option is allowed for bidiectional paths only. One or both of the two ports can
be marked as NT (Network Termination). PDH alarm monitoring will be applied only on NT ports.
2.3.47 4 x ANY
2.3.47.1 Introduction
The 4XANY TDM card is a TDM concentrator board, based on the following concepts:
The board accepts at most 4 signals and mapping is performed into a STM-16 (2.5 Gbit/s) port
– The architecture of TDM concentrator board is based on the concept of virtual concatenation, and
on the mapping of SDH on OTN:
The following table resumes the traffic that can be transported and the number of VC-4 required:
N.B. Applicable for STM-1 and STM-4 terminations. Only the SDH physical connection
between the 2 SDH NE is described in RM and the manual correlation function can per-
mit to associate the underlying DATA PATH to it. Fiber cut on the fiber connecting the
SDH NE adjacent to the SDH port of the 4xany card will be detected on SDH NE side and
will impact the mentioned above SDH physical connection.
– Connected inside the 1696MetroSpan to the Transponder card to transport Data traffic on the RS
signal (STM-16) on the OTH network.
– Connected inside the 1696MetroSpan to the OPC card to perform the SNCP protection of the RS
client path in the OTH network (Optical protection).
– Alone inside the 1696MetroSpan (CPE configuration case). In this case, 1696MetroSpan, configured
as CPE, could be connected to either another 1696MetroSpan (not configured as CPE), a 1686WM
or a 1640WM (either through B&W or colored interface), an SDH NE (through B&W interface).
Due to the fact that the RS signal is terminated on the 4XANY, the 1696MS hosting this board has to be
visible both in SDH and OTH domain, i.e. the STM-16 port of the 4XANY board has to be managed as:
– UNI B&W or colored port of an SDH NE. In particular in the first and second above listed cases, the
STM-16 port will be connected by the user, through an internal physical connection, to the OPS port
of respectively the transponder or the OPC card.
In the third case, the user will create a physical connection connecting the STM-16 port of the 1696WM
(CPE) and the OPS port of either a 1686WM or a 1640WM.
On the client side (data port) the 4XANY can be physically connected to an OMSN NE to transport an
STM-1/STM-4/GigabitEthernet traffic, coming from the SDH network, into the OTH network. It is not pos-
sible to describe in the RM this physical connectivity (between an STM-1/STM-4/GigabitEthernet port of
the 4xANY and an OMSN NE port at the same rate); the user has to correlate through the "correlation func-
tion" the SDH physical connection between the two external OMSN NE's to the Data path terminated on
the two 1696MS NE's.
When uploading a gMAUTTP port of the 1696MS, the system automatically creates the following objects:
– Technology: "Data"
– Physical Port Type: is set according to the value of the "dataClientType" attribute of the
Eth/100Mb-transp 1 notModifiable
Eth/1Gb-transp 8 notModifiable
Fddi 1 notModifiable
Escon 2 notModifiable
DigitalVideo 2 notModifiable
FiberChannel 8 notModifiable
Stm1 2 notModifiable
Stm4 5 notModifiable
To create a path involving a 4XANY board, the user, during the path creation activity, has to select:
According to the selected Service Type all consistent values of Service Rate attribute are presented to
the user.
In case of Service Type ="Ethernet" and Service Rate ="1Gbit/s Ethernet Transparent", the list of NAP'
s available on either 1670SM or 1696MS(4XANY) is provided. For all the other cases, only NAP' s on
1696MS will be listed. The path is created with Transport Rate attribute equal AU4-nV, concLevel attribute
equal to the concLevel attribute of NAP' s and concLevelMode equal notModifiable.
2.3.47.4 Example
a) From the browser node list select the node which houses the 4XANY board and issue Search: Main
Related items: Ports in Node
– STM-16 board
– DATA boards, according to the table explained above at para 2.3.47.1 on page 430
c) The path using these ports is Ethernet with Service rate=AU4-nV (concatenated).
OPERATION
The feature allows the automatic creation (and eventually the allocation, implementation and commis-
sioning) of paths/trails starting from the information present in the NE.
SEQUENCE
Figure which follows shows the path list after the path upload.
a) To start the procedure, point to the involved physical connection and issue Maintenance:Generic.
The upper row contains the physical connection being set to maintenance, whose paths are to be moved.
– set in maintenance with check. The check is run on the not active route (at that time)
– remove from maintenance. The force command is released. The reversion will be active, if already
stored.
– Avoid traffic impact the reroute is not performed if there is a traffic impact
– Avoid traffic impact s (only allocation) the reroute is not performed if there is a traffic impact
– Allow traffic impacts the reroute is performed even if there is a traffic impact
– Allow traffic impacts (only allocation) the reroute is performed even if there is a traffic impact
SCOPE
Given the broadcast path shown in figure below, perform the reroute
SEQUENCE
a) From the path list, point to the path broadcast to reroute and issue Modification: Reroute:Allow traffic
impacts
b) The broadcast path is rerouted. All legs have been rerouted. See following figure
The highlight of the broadcast path shows also the list of the used physcons (first level)
a) E.g., select the 3rd leg and click on highlight button. The relevant physcon structure is displayed.
Point to the physcon and issue Reroute paths
b) The Reroute Physcon wizard opens. Click on specify destination physical connection
d) Click on destination physcon selection button. From the list, select the suitable physcon and click
on Apply
f) The path highlight shows also the list of used physcons (first level). The physcon specified as des-
tination is marked by M. From the physcon structure you can see that the involved path has been
correctly rerouted.
Figure 495. List of used physcons (first level) after physcon reroute
a) Point to the path and issue Other: Save and Recall:Save route as constraint set. The set of con-
straints is saved.
c) You can modify the constraints set, e.g. as per figure below. Click on Finish to save the constraints
set
d) Allocate the path and implement the path. You can verify on the path highlight the successfull appli-
cation of the constraints. So the path has now new routes. This could be happen, also because of
a reroute operation caused by a fault occurrence.
e) If you want to revert to the initial situation when you saved as last saved route, you can issue
Other:Save and Recall: Recall last saved route
f) A warning message alerts that this could cause traffic hits. Click on YES. Figure which follows shows
the Highlight of the recalled route
This functionality, invoked via menu Other: Save and Recall: Save/Recall, allows to store the actual path
route by storing a complete set of constraints, that can be later retrieved and applied on.
SEQUENCE
a) Point to the path and issue Other: Save and Recall: Save Route as Constraint set
Figure 501. Other: Save and Recall: Save Route as Constraint set
b) A dialog box alerts that the new saved route will overwrite the old one, if any. Click on Yes to continue.
c) You can check on the command log that the command has been successfully executed (green flag).
e) The Constraint wizard step 2 opens. Select the new Constraint set Last saved
SEQUENCE
a) Point to the path and issue Other: Save and Recall: Recall last saved route
Figure 507. Path: Other: Save and Recall: Recall last saved route
b) A warning box alerts that a traffic hit could arise, if the path is not protected.
c) Figure which follows shows the example of unsuccessful reroute on the last save route
This feature allows to schedule a set of actions over the following entities:
Path
Trail
Node
-One shot: the action is started in a specific instant (start time) fixed by the operator;
-Cyclic way: the action is performed in a specific instant (start time) and will be repeated periodically.
With reference to above figure, Tstart = Start date and time instant; T* = Schedule interval; Tend = End
date and time instant.
In this case the scheduled action is executed 3 times at the instants:
Tstart+k(T*), with k = 0, 1, 2
If at start time (Tstart) the Agent of the scheduled action is not running, the scheduled action is not exe-
cuted. The operator can define a guard time called max execution delay. This parameter represents the
maximum waiting time (in seconds), respect to the start time, that the system is waiting for Agent restart.
Trun = instant when the Agent from not running goes to running
If MaxExecutionDelay>(Trun-Tstart) (e.g. MED) the scheduled action is started at the Trun instant.
The object called scheduler represents a scheduled job on a specified object (path, trail, node). The
attribute scheduleState informs the operator about the progress of the scheduled action. The scheduler
state may assume the following values:
idle: the scheduled action has been defined. This is a transient state, i.e. automatically the scheduler state
switches to the standby value;
active: the job defined in the scheduler entity is running. In case of periodic task (or cyclic way running)
this state is assumed at every job starting and running.
terminated : the job defined in the scheduler has run. In case of periodic task it means that the whole peri-
odic task has run.
suspended: the scheduler has been locked (before start time elapsing). This state is useful when the
operator has to perform an action having any impact on the scheduler. The state may be carried back to
the standBy state unlocking the scheduler.
The scheduler object is not automatically deleted; it can be deleted only by the operator.
In case of removing of the object (path, trail or node) on which a planned activity has been defined, the
state of the scheduler is set to terminated independently from the state (running or not) of the planned
activity.
The operator, reading the log file, can understand if the planned activity has run or not.
The inventory retrieves all the schedulers belonging to the selected network domain. See below figure
The inventory retrieves all the schedulers defined over the selected path.
The inventory retrieves all the schedulers defined over the selected trail.
Behavior: the inventory retrieves all the schedulers defined over the selected node.
Behavior: the inventory retrieves the selected scheduler associated with the remote attribute syncSched-
uleName. This remote attribute represents the name of the file log associated with the selected scheduler.
Case of a scheduler task defined one shot the output will be a single instance of the input scheduler asso-
ciated with the single log file. Case of a scheduler task defined periodic task the input object is reported
as output N-times according to the N reports name retrieved in the action.
SCOPE
SEQUENCE
a) The tool may be started from the browser. As an example, from Path list, select the path and click
on button Planned Activities wizard. See following figure.
b) The Planned Activities wizard: Start dialog box is displayed. Click on Next button.
c) Select the action. Click on the expand button in correspondence to the desired commands. The com-
plete list of available commands is shown. See following figure.
e) Click on Next.
f) After the selection of an operation to be scheduled (e.g. configuration download enabling) and after
clicking on the Next button the wizard asks for:
Start date and time: is a STRING (having the format: YYYY/MM/DD-HH:MM:SS) representing date and
time when the scheduled action will start
Result location: This parameter is automatically loaded by the system with the following rule: http://mas-
ter/1354RM/log/scheduler/?userLabel?.txt.
Also for this reason the User Label parameter must be univocal. In case of Periodic Task the log files are
as many as the running time of the scheduled action in cyclic way, in this case the rule is:
http://master/1354RM/log/scheduler/?userLabel?/?userLabel?#.txt.
Max execution delay: INTEGER representing (in seconds) the maximum execution delay, respect to the
scheduleStartTime, of the scheduled operation. This optional attribute is useful to try to avoid that the
scheduled action is not performed because at the Start date and time instant the Agent is not running. The
same behavior is adopted in case of scheduler suspended and subsequently resumed, i.e. this param-
eter represents the maximum waiting time (in seconds), respect to the scheduleStartTime, that the system
is waiting to accept for Agent restarting or for scheduler unlocking. Default value is 0.
Periodic task: it is a flag allowing to choice the execution of the scheduled action in one of the following
ways: one shot (default value); cyclic way.
Schedule Interval: it coincides with the scheduleInterval attribute defined on the SNML-IM; this param-
eter is modifiable only if the operator selected the execution in cyclic way.
End date and time: it coincides with the scheduleEndTime attribute defined on the SNML-IM; this param-
eter is modifiable only if the operator selects the execution in cyclic way.
g) After clicking on Finish button, the scheduler object is created with scheduleState=idle (transient
state) that immediately becomes standBy.
Using Next and Back buttons of the wizard the operator can create more schedulers over the same object
or also over others objects. The operator can also read the log file related to the scheduler creation. Click-
ing on Action Log button a new window appears showing the log file related the creation session (see
next figure).
The operations that can be scheduled depend on the selected entity: path, trail or node.
Only the operations that do not need any additional parameter can be scheduled. Example: an add pro-
tection action on a path is schedulable if can be performed without adding any parameter; i.e. the pro-
tection is established between the two end points and not between an end point and an intermediate point
or between two intermediate points.
Lock
Unlock
The modification is admitted only if the job is not started; i.e. if the scheduler state is suspended or in
standBy state.
The mentioned condition is valid also for a periodic task, but with a further restriction: no single job already
executed; i.e. it never crossed the active state.
Moreover the user can change the execution modality: from one shot to cyclic way and viceversa.
The operator can delete a scheduler objects. The object deletion implies also its log file removing.
The operator can suspend a scheduler in standBy state. The suspension is done setting the adminState
to locked value the schedState becomes suspended. The suspending action is useful for example when
the operator has to perform an action having any impact on the scheduler.
The operator can resume a scheduler in suspended state, i.e. a locked scheduler. The suspension is done
setting the adminState to unlocked value the schedState becomes standBy.
Following figure shows the role of the max execution delay parameter in case of a locked/unlocked/locked
scheduler.
If MaxExecutionDelay<(Tres-Tstart) (e.g. MED) AND (Tstart > Tsusp) the scheduled action is not per-
formed;
Log showing
The operator can read the log files. This functionality is active only if the job is already started. In case
of periodic task the condition is: it exists at least a job already started.
The operator calling the SchedulerReportList inventory gets the file name(s) of the associated log file(s).
Clicking on a file name (i.e. syncScheduleName remote attribute), available on the output of the men-
tioned inventory, a new Java window appears and it contains the log file text.
2.4.1 Introduction
The main procedures described in this Chapter are:
N.B. The execution of the Redo-Log file does not cause the allocation of the path/trail; however some
checks take into account the topological modifications:
– in case of node insertion the passthrough connection is added in the new node.
– in case of node remove the passthrough connection thorough the removed node is ignored.
SCOPE
CONDITIONS
The new Network Element must be inserted in the network as shown in Figure 524.
NE-2
NE-3
NE-1
SEQUENCE
a) The user can protect paths using the physical connection to be interrupted (NE-1 Thorough NE-3).
The user can verify by means of the command Physical Connection: (display) Paths active in
physical connection which is the path actual route.
If traffic survivability is required, from the path list select all paths and protect them by means of Add
Protection: Spare. Verify, with reference to Figure 524.,that the upper route is working for all paths.
Execute the force operation to the upper route for all involved paths and verify that all paths have
been successfully forced and are operational.
b) Move all paths from the physical connection to be interrupted (NE-1 thorough NE-3)
1) For paths protected at above point a), select them and use option Remove Protection: Keeping
Spare.
2) For paths previously protected, reroute manually on the main or spare route according to the
route type crossing the physical connection.
c) If the node to be inserted is a QB3* node, put the node in download disable condition.
d) Execute the split physical connection procedure. See paragraph 2.3.45 on page 416.
e) If the node to be inserted is a QB3* node, put the node in download enable condition and execute
Global Download on QB3* NE.
SCOPE
The scope of this procedure is to remove a Network Element from a SNCP ring.
CONDITIONS
The SNCP reference ring is shown in Figure 524.on page 469. Some paths are crossing the NE being
removed.
SEQUENCE
a) On the node issue the command Display: Paths active starting/ending from a node
b) The user can protect paths using the physical connection to be interrupted (NE-1 Through NE-3).
The user can verify by means of the command Physical Connection: (display) Paths active in
physical connection which is the path actual route.
If traffic survivability is required, from the path list select all paths and protect them by means of Add
Protection: Spare. Verify, with reference to Figure 524.,that the upper route is working for all paths.
Execute the force operation to the upper route for all involved paths and verify that all paths have
been successfully forced and are operational.
c) Move all paths from the physical connection to be interrupted (NE-1 thorough NE-3)
1) For paths protected at above point a), select them and use option Remove Protection: Keeping
Spare.
2) For paths previously protected, reroute manually on the main or spare route according to the
route type crossing the physical connection.
d) 1354RM
Execute the Join Physical Connection Procedure
SCOPE
CONDITIONS
The ring is mixed, i.e. it contains Q3 NEs and QB3 STAR NEs.
SEQUENCE
a) Execute the Force Switch operation on adjacent protection blocks, where the new NE must be
inserted: Force West on one side and Force East on the other side.
The information of Node Position in ET and Node Id in ET can be displayed by issuing the Show/
Set Attributes command on the Protection Block.
1) Execute the command Configure Download: Disable on QB3 STAR Network Elements.
Select the Physical Connection and issue Topology Modifications: Split Physical Connection.
Execute the split connection procedure.
c) Change the Run Level to Network Consistency. From the Process Monitor select Actions: Set Run
Level: 3 Ntw Consistency
d) Select all QB3 STAR NEs and execute Consistency Download: Global.
DO NOT ENABLE THE DOWNLOAD ON THE INSERTED NE; THIS IS TO BE DONE LATER
h) Execute all cable unplug and plug operations NOW, before activating the MS Spring on the inserted
NE.
SCOPE
CONDITIONS
The ring is mixed, i.e. it contains Q3 NEs and QB3 STAR NEs.
SEQUENCE
a) Execute the Force Switch operation on adjacent protection blocks, where the new NE must be
inserted: Force West on one side and Force East on the other side.
The information of Node Position in ET and Node Id in ET can be displayed by issuing the Show/
Set Attributes command on the Protection Block.
1) Execute the command Configure Download: Disable on QB3 STAR Network Elements.
2) Execute the command Configure Download: Disable on QB3 STAR Network Elements and on
Q3 Network Elements
3) Click twice on the physical connection group (line between the two nodes involved. The phys-
ical connection submap opens. Select the physical connection and browse it by means of
Supervision: Browse: Object.
From the browser select the Physical Connection and issue Topology Modifications: Split Phys-
ical Connection.
c) Change the Run Level to Network Consistency. From the Process Monitor select Actions: Set Run
Level: 3 Ntw Consistency
DO NOT ENABLE THE DOWNLOAD ON THE INSERTED NE; THIS IS TO BE DONE LATER
h) Execute all cable unplug and plug operations NOW, before activating the MS Spring on the inserted
NE.
j) Release switches
SCOPE
CONDITIONS
The ring is mixed, i.e. it contains Q3 NEs and QB3 STAR NEs.
SEQUENCE
a) Execute the Force Switch operation on adjacent protection blocks, where the NE must be removed
Force West on one side and Force East on the other side.
The information of Node Position in ET and Node Id in ET can be displayed by issuing the Show/
Set Attributes command on the Protection Block.
1) Execute the command Configure Download: Disable on QB3 STAR Network Elements.
1) From the map click twice on the first physical connection group. The physical connection list
opens. Select the physical connection.
2) From the map click twice on the second physical connection group. The physical connection
list opens. Select the physical connection.
Select the two Physical Connections to join and issue Topology Modifications: Join Physical
Connection. Execute the join physical connection procedure.
e) Change the Run Level to Network Consistency. From the Process Monitor select Actions: Set Run
Level: 3 Ntw Consistency
f) Select all QB3 STAR NEs and execute Consistency Download: Global.
SCOPE
CONDITIONS
SEQUENCE
f) Set Download Enable mode on the node, which has just been inserted
i) Remove the Forced Ring Switch on the nodes adjacent to the inserted node
SCOPE
CONDITIONS
SEQUENCE
c) Set Forced Ring Switch on the nodes adjacent to the node being removed
d) Remove the physical fibers from the node being removed, by respecting the following order:
1) remove RX spare
3) remove RX main
4) remove TX main
g) Remove the Forced Ring Switch on the nodes which were adjacent to the removed node
h) Set Download Enable mode on the node, which has just been inserted
SCOPE
SEQUENCE
a) On the relevant NAP List verify that no path is using any trib. port of the board being removed i.e.
the nap idle indicator should be "Idle".
b) On the relevant NAP List select the NAP related to the trib. ports to be removed and issue the com-
mand Actions:Remove:Remove NAP. The relevant ports pass from Assigned to Observed.
c) On the 1353NM station delete the relevant board. The board is no longer present in the views.
d) In the NE port list the ports deleted are no longer present.
SEQUENCE
Should a path been using the involved physical connection, the path should be deimplemented/deal-
located or rerouted, if possible.
c) On the map delete the connection:
d) On the 1353NM station delete the relevant board. The board is no longer present in the views.
a) On 1354RM: Remove the VC-4 NAP associated to the 140 Mb port. The detailed sequence is:
1) From browser point to the involved node and issue Actions: Display: Main related Items: NAPs.
2) The NAP list is displayed. Select the VC-4 NAP and issue Actions: Remove NAP.
4) Point to the Node and issue Actions: Display: Main Related Items: Ports. The Port List is dis-
played. The 140Mb port assignment status is OBSERVED.
b) On 1353SH: Execute the payload structure configuration to VC-12.
c) On 1354RM: Execute the EML: Synchronize command. The 140 Mb Port (OBSERVED) is replaced
by the 2 Mb ports (OBSERVED).
d) On 1354RM: Execute the Upload NAPs command. The detailed sequence is:
1) From browser point to the involved node and issue Actions: Configuration: Upload NAPs.
2) The user can display the uploaded NAPs, e.g. from browser, pointing to the node and issuing
the command Actions: Display: Main Related Items: NAPs. The NAP List now contains the VC-
12 TTPs (NAPs).
N.B. Configuring a TMUX board from one 34Mb port to 16 2Mb ports: The 'configure port' is done
on NM, then on RM a 'synch eml' and a 'upload NAPs' is performed.
Some problems occur if 'Upload NAPs' from RM is done immediately after getting all MUX
boards (synch eml).
On NM VC12 objects exist before all VC12 TPs have been configured on DXC. The result is
'misaligned ports' for all missing NAPs. A second 'Upload NAPs' which is performed some min-
utes later solves this misalignment.
Example which follows covers the configuration of a 140 Mb Port from the 2Mb NAPs to one VC-4 TTP-
NAP.
a) On 1354RM: Remove the VC-12 NAPs associated to the 140 Mb port. The detailed sequence is:
1) From browser point to the involved node and issue Actions: Display: Main related Items: NAPs.
2) The NAP list is displayed. Select the VC-12 NAPs and issue Actions: Remove NAP.
3) Point to the Node and issue Actions: Display: Main Related Items: Ports. The Port List is dis-
played. The assignment status of the 64 2Mb ports is OBSERVED.
c) On 1354RM: Execute the EML: Synchronize command. The 2Mb Ports (OBSERVED) are replaced
by one 140 Mb port (OBSERVED)
2.5.1 Introduction
The procedures which follow describe the export of resources to Virtual Private Network Management
system.
• Add operator
SEQUENCE
• two textlines: RM Initiator and Initiator Name where the "Administrator" operator can digit the
RM Initiator (integer) and the Initiator Name (it must be unique in the file).
The Initiator Name is added to the possible values of the NAD attribute. The NAD attribute
is used to “mark” Network Resources (using the change NAD command) and to evaluate
Access Rules.
d) Enter the suitable RM Initiator and Initiator Name and select the rules to be associated. Click on
the Rule button. The list of the available rules opens. Each item of the list has a toggle button, i.e.
you can select many rules per each Initiator. The following rules can be selected:
SCOPE
This function allows the Administrator to create a new operator at a time on WSs belonging to the network
configuration.
SEQUENCE
– VPN Operator name. It is the same name which will be inserted by the VPN Administrator while
executing the VPN Handling procedure.
– Initiator: the Initiator Name previously specified at paragraph 2.5.1.1 on page 476.
e) A subsequent confirmation box containing all data relevant to the New Operator being created is pre-
sented. If you press OK the Operator is created. This dialog box also contains the button Abort to
abort the procedure.
f) you can confirm the Operator creation by pressing button Add.
SCOPE
The scope of this procedure is to assign the desired NAP to a certain NAD (Initiator Name), which cor-
responds to a certain RM Operator, which in turn will correspond to a certain VPN.
CONDITIONSThis assignment is required for all VPN types (Standard / Enhanced / Restricted)
SEQUENCE
1) Select the NAP(s) from the Nap list and issue the command NAD (Network Assignment
Domain): Change.
2) In the Change NAD dialog box select the icon dictionary. The NAD selection box opens. Select
the domain corresponding to the previously specified NAD (the Initiator Name mentioned at
paragraph2.5.1.1 and confirm by clicking on OK. Click again on OK of the dialog box.
SCOPE
The scope of this procedure is to assign the desired CTP to a certain NAD (Initiator Name), which cor-
responds to a certain RM Operator, which in turn will correspond to a certain VPN. To do so, it is required
to change the NAD of the link connection toward the virtual node.
CONDITIONSThis assignment can be executed for VPN types Standard and Enhanced
SEQUENCE
1) Select the link connection from the lc list and issue the command NAD (Network Assignment
Domain): Change.
2) In the Change NAD dialog box select the icon dictionary. The NAD selection box opens. Select
the domain corresponding to the previously specified NAD (the Initiator Name mentioned at
paragraph 2.5.1.1 and confirm by clicking on OK. Click again on OK of the dialog box.
As a result of this operation, the boundary CTP is assigned to the above NAD.
SCOPE
The scope of this procedure is to assign the desired link connection to a certain NAD (Initiator Name),
which corresponds to a certain RM Operator, which in turn will correspond to a certain VPN.
CONDITIONSThis assignment can be executed for all VPN types (Standard / Enhanced / Restricted)
SEQUENCE
1) Select the NAP(s) from the Nap list and issue the command NAD (Network Assignment
Domain): Change.
2) In the Change NAD dialog box select the icon dictionary. The NAD selection box opens. Select
the domain corresponding to the previously specified NAD (the Initiator Name mentioned at
paragraph 11.2 and confirm by clicking on OK. Click again on OK of the dialog box.
SEQUENCE
1) Select the path(s) from the Path list and issue the command Actions: NAD (Network Assign-
ment Domain): Change.
2) In the Change NAD dialog box select the icon dictionary. The NAD selection box opens. Select
the domain corresponding to the previously specified NAD (the Initiator Name mentioned at
paragraph 2.5.1.1 on page 476 and confirm by clicking on OK. Click again on OK of the dialog
box.
SEQUENCE
1) Select the path(s) from the Path list and issue the command Actions: NAD (Network Assign-
ment Domain): Change.
2) In the Change NAD dialog box select the icon dictionary. The NAD selection box opens. Select
the domain corresponding to the previously specified NAD (the Initiator Name mentioned at
paragraph 11.2 and confirm by clicking on OK. Click again on OK of the dialog box.
The NAP and the boundary CTP are not assigned automatically: the operator must execute the
procedures described at paragraphs 2.5.1.3.1 and 2.5.1.3.2 on page 478.
The scope of this procedure is to generate statistics tables to be used in network planning activities.
SEQUENCE
a) From browser point to the network and issue Network: Display Related Items. The selection box is
presented. See below figure.
– NAPs statistics
– NODEs statistics
– NAPs statistics
– NODEs statistics
d) If you start the search from the Node, the available options are:
– NAPs statistics
path/trail indicator
rate
port name
node label
network name
total number
service rate
configuration state
total number
idle indicator
NAP rate
network name
total number
type
site name
CONDITIONS
N.B. Alternatively, the user can move nodes using dedicated scripts and an off-line tool, without inter-
action with the User Interface. See details in the 1354RM Administrator's Guide.
SEQUENCE
a) From the source map point to the node to move and issue Node: Modification: Move Node. The Move
node dialog box opens. See Figure 533.on page 487.
b) From the Move dialog box click on button Selection of the Destination topology. The map opens in
selection modality.
d) Click twice on the target subnetwork. The 2nd level subnetwork map opens.
f) Issue the Move command by clicking on Finish button. The moved node is present in the destination
submap in the New Object holding area.
g) Drag the moved node from the New Object holding area to the center of the window. The connections
are drawn automatically.
The scope of this procedure is to split a virtual NE into more virtual NEs, in order to have a better display
of the paths and more clear representation of the network.
DESCRIPTION
To realize the split virtual NE into more virtual NEs, the concept of routing domain has been introduced.
The routing domain is a set of ports whose TP can be inter-connected. TPs inherit the routing domain of
the port they belong to.
With reference to below Figure 542., the path joining NAP A to NAP B makes use of two cross-connections
on the virtual node VIRTUAL. Our goal is to represent CROSS CONN 1 as belonging to virtual node VIR-
TUAL 1 and to represent CROSS CONN 2 as belonging to virtual node VIRTUAL NODE 2, as depicted
in Figure 543.
The means used to assign CROSS CONN 1 to virtual node VIRTUAL 1 and CROSS CONN 2 to VIRTUAL
NODE 2 is the new attribute ROUTING DOMAIN.
Then, a different routing domain will be assigned to the ports housing the TPs involved respectively in
CROSS CONN 1 and CROSS CONN 2. In the example shown in Figure 542., ports housing TP 1 + TP
2 will be assigned routing domain 1 and ports housing TP 3 + TP 4 will be assigned routing domain 2.
At this point ports housing TP 1 + TP 2 can be assigned to virtual node VIRTUAL NODE 1 and ports hous-
ing TP 3 + TP 4 can be moved to virtual node VIRTUAL NODE 2, thus obtaining the representation of Fig-
ure 543.
Obviously, virtual node VIRTUAL 1 and virtual node VIRTUAL NODE 2 represent real external equipment.
This subdivision must be done for ease of clarity.
The procedure is constituted by steps to be executed in sequence, some of them making use of the RM
graphical interface and others to be run off-line.
in particular, the assignment of the domains can be helped by launching an automatic algorithm, even if
the user's intervention is mostly required.
On the other hand, it is recommended to run the off-line tools FIND WRONG PATHS and FIX WRONG
PATHS, as they give a useful indication about the ports to move.
It is assumed that no connection exist between real external nodes, as all paths have been created with
a suitable set of constraints. In other words the external (virtual) network acts mainly as interconnection
between adjacent rings.
NAP A
TP1
CROSS
CONN
1
TP2
TP3 CROSS
CONN
2
TP4
NAP B
TP1
CROSS
CON
1
TP2
TP3 CROSS
CON
2
TP4
VIRTUAL2
NAP B
SEQUENCE
a) Launch the Automatic calculation of the domains from the node. This step is optional but it is
suggested.
The procedure of automatic calculation of the domains causes the reset of the actual
domains, then can be executed only as the first step.
As a result of this step, each set of ports interconnected among them, or in the same NPA will be
marked by a distinct value of the attribute routing domain (numeric)
This important step should be executed by the Customer, who knows the exact relationship
between the ports of the virtual NE and the real equipment (NEs) they belong to.
From this point on the new paths will be allocated correctly because the allocation algorithm takes
into account the routing domains. Cross-connections will be allocated only between ports
belonging to the same domain and /or with client ports (client=PDH, GMAU,...) of the domain 'free
pool' (NULL). The 'freePool' port will inherit the domain of the cross-connected port.
The objective of this off-line tool is to find paths wrongly represented. An example of wrongly
represented path is given in the following figure.
VIRTUAL
NAP A DOMAIN 1
TP
CROSS
CONN
1
TP
DOMAIN 2
CROSS
TP
CONN
2
TP
VIRTUAL2
NAP B
where <wrong paths file> is the output file containing the list of wrong paths/trails.
An example of list generated by the FIND WRONG PATHS procedure is show below
a) In case the Find wrong paths procedure does not list any path, go to step e) on page
499.
b) In case the Find wrong paths procedure contains continue with following step 2)
N.B. Optionally, the user may edit the list of wrongly represented paths (only in particular cases)
The scope of this procedure is to correct wrong paths or trails. Wrong cross connections within the
virtual node are removed and replaced by the correct ones. The initial situation is shown in Figure
544.
where <wrong paths file> is the input file produced by find wrong path procedure.
An example of the report generated by the FIX WRONG PATHS procedure is show below
NAP A DOMAIN 1
TP
CROSS
CONN
1
TP
DOMAIN 2
TP CROSS
CONN
2
TP
VIRTUAL2
NAP B
a) In case the Fix wrong paths procedure does not suggest any corrective action, go to
Find wrong paths, step 1) on page 495
b) In case the Fix wrong paths procedure suggest any corrective action, some actions on
the path should be executed, such as Remove Spare, followed by Add Spare.
Anyway, in particular cases, as an example for drop&cont paths, it is recommended to agree with Alcatel
Technical Assistance Center the best strategy, in order to avoid a degrade of service. Eventually set the
node to download disable, then enable the download after all changes have been entered.
f) It is suggested to run again, for checking purposes, the Find wrong paths, step 1) on page 495
2.7.2.1 Example
Figure 546.shows the actual network view taken as example, while Figure 547.the path list.
Path highlight and Path routing display are shown respectively in Figure 548.and Figure 549.
B
C
ACTUAL
ROUTE
1
A
B
C
CORRECT
ROUTE
1
A
a) Launch the Automatic calculation of the domains from the node. This step is optional but it is
suggested. From the Virtual node issue: Modification: Routing domain: Assign
b) Select AUTOMATIC and click on Apply. The report alerts that the operation is successfully termi-
nated.
c) Display the port list with the Routing Domains assigned automatically. From the virtual node issue
Search: All Related Items: Ports
The assignment is wrong because port names (userlabel) having the same prefix should have same
domain. They don't. It is required a Manual assignment of the domains from the node
e) Select the ports you want to change/assign the domain and click on Apply button.
1) Select the ports you want to change/assign the domain and click on Apply button.
2) The selected ports are now present in the wizard window. Insert the Routing Domain string and
click on Apply.
NODE ID FILENAME
The target node must be reachable, equipped and the NAPs must be in the OBSERVED state,
i.e. the NAPs have not to be uploaded.
e) Drag and drop from the map or from browser the destination node, where to move the ports.
g) Ports are grouped into domains.Select the domain to move and click on the right arrow. Ports to
move will maintain their name. It is also possible to modify the name by entering the desired name
in the suitable textline.
h) Click on Next
i) Confirm the move operation by clicking on OK button. The action report is displayed.
k) You may also locate the path and verify that has been correctly rerouted.
Ì Only SDH and PDH ports can be moved. N.A. for Ethernet ports.
SCOPE
The scope of this procedure is to move ports from one node to another node. Physical connections and
relevant traffic are moved too. The final goal is to replace one or more existing NE/s with another one.
With reference to above figure, ports of nodes C and B must move to node A.
a) Select from the map the involved nodes and issue Actions: Configure Download: Disable
c) In the Routing domain mng wizard enter the new domain and click on Apply
d) For node B do the same Routing domain: Assignment as already done for node C in steps b) and
c) above.
f) The same operations specified at above point e) for Node C must be executed for Node B.
Figure 592. NE migration wizard step2 (drag &drop the destination node)
i) The list of the selectable ports on the destination NE can be displayed by opening the pop-up menu
per each port. See below figure.
j) Select the destination port where to move the source port. See Figure 593.and Figure 594.
m) Point from the map to node B and issue Modification: Move: Ports. The NE migration wizard step1
is displayed. See Figure 599.
Figure 599. NE migration wizard step2 (drag &drop the destination node)
o) Select the destination port where to move the source port. Click on Next button and subsequently
do the confirmation.
Figure 602. Actions: Configure Download: Enable (for the involved nodes)
On a given real node, the scope is to convert a planned port into a real port or a real port into an other
real port. This is useful e.g. in case the user moved a port (via NE port moving) from a node to an other
node with real port not yet installed.
In this case the port should be moved to a planned port. Then, after real port installation, the planned port
can be converted to real. The feature is traffic impacting.
CONDITIONS
The procedure can be applied with the node either in download enable mode or in download disable mode.
In both cases, it is traffic impacting, but, operating in download disabled mode, the user can prepare the
RM MIB and modify the cables only before passing to download enabled mode
SEQUENCE
a) Select the real node and starts the convert planned/real port command.
b) The wizard starts, presenting in the source port column, the list of ports available in the node
PLANNED
BUTTON
1) If the selected port is a planned one, the real ports available in the node are listed in the des-
tination port column. Select the destination port.
2) If the selected source port is a real port, select the type of target port, i.e. planned or real
in case of real port type, the list of the other real ports available in the node in the destination
port column is provided. The user can then select the destination port.
OPERATION
Changes done vs the previous iteration can be highlighted enabling trace changes Word tool.
For any comment/remark on this document, please contact Stefano.Molaschi@alcatel.it
2.8.1.1 Introduction
1354RM Network upload is a capability designed in order to cut human effort in populating the 1354RM
database in case of already deployed/operational network, managed at1353NM level only.
Network upload is also targeted to support operators to fully realign the 1354RM database against the
actual network configuration as soon as the 1354RM has recovered the supervision of the network after
a period of supervision-down. In this case a global resynchronization procedure helps operators in achiev-
ing again the full alignment.
For both of the previous applications, Network upload feature allows to shorten and ease human oper-
ations, implementing a set of capabilities, which reduce time-consuming and error-prone manual activi-
ties. Nevertheless to achieve full manageability of uploaded information, some manual intervention is
needed, (e.g. setting trail/path user labels, etc.).
Network upload capability is composed by a set of features (as described in the following), covering the
discovery of the following resources:
SDH physical connections
MS Protections
HO trails and paths
LO paths
The Network upload activities have to be applied in a correct sequence; Alcatel Operation Support Doc-
umentation shall be followed by the operator in order to assure that no traffic impacts are caused by the
use of such functions. Direct Alcatel support is advisable in this step. At each step a proper follow-up and
double check is to be performed.
More in details, user defined info (as user labels) has to be set. Performing double checks on 1354RM
DB consistency against network configuration is also advisable; 1354RM offers Mark Audit feature to do
this.
Mark Audit capability can be applied on a-per-NE-basis (download disabled mode); the Audit report con-
tains the list of NE misaligned resources.
1354RM Users are also able to identify which of the misaligned resources can cause traffic impact in case
1354RM downloads its own configuration (i.e. cross connection, paths trace). So the operator can man-
ually apply the proper actions at 1354RM level before performing a forced download onto the NE.
For the non-traffic-impacting misaligned items, 1354RM Users can either choose to align 1354RM DB or
force 1354RM values into the involved NEs.
2.8.1.4 Description
This feature allows to automatically discover the physical connectivity of the network, relying on the Trace
Identifier (J0).
fully automatic: 1354RM generates unique sent J0 and builds the physical connections based on
the received values.
partially automatic: the sent/expected J0 values are set by the CT/1353NM operator when a fiber
is put in service and 1354RM simply re-uses this information to upload the connectivity
Automatic generation of J0. The automatic generation of J0 has to be foreseen for a set of ports
or for all the port belonging to a NE. The User has to select the 1354RM entity (single port, node,
network, 1st level sub-network or 2nd level sub-network) and to choose the Automatic generation
of Trace Identifier command. As a result of the command, the sent value of J0 is generated for the
selected port or for all the ports belong to the selected topology, only if no value has not already be
set (the 1354RM is only overwriting the default value).
Upload connectivity. The upload of the connectivity is foreseen to discover, basing on J0 values,
the physical connection between two ports. The User has to select the 1354RM entity (single port,
node, network, 1st level sub-network or 2nd level sub-network) and to choose the Configuration/
Upload Physical Connectivity command. As a result of the command, the physical connections are
automatically created for the selected port or for all the ports belong to the selected topology.
When a physical connection is created, if the sentTraceId / expectedTraceId values are set, the values
are kept
• if the sentTraceId value has been automatically generated by 1354RM, the sentTraceId, the
expectedTraceId and the enabledTraceId info are reset
• if the sentTraceId value has been set by the User, the sentTraceId, the expectedTraceId and
the enabledTraceId info are preserved
2.8.1.5 Restrictions
This feature can be applied only to physical connections delimited on both side by SDH Q3 NEs supporting
the Section Trace Identifier management (J0), which are (not exhaustive list):
2.8.2.1 Description
This feature allows uploading of different kind of Linear Multiplex Section Protection scheme, as e.g. (1+1)
and (m:n).
The MSP schemes are used to provide a protection for working channels set up between two NEs. The
physical connections, which implement such scheme, should be already present in 1354RM database;
if not, it is possible to upload them in a previous step, selecting the involved NEs and using the Upload
Physical Connectivity command.
When a consistent MSP scheme is found, a new NPA (including the involved NEs and the related physical
connections) is created in 1354RM database. This NPA can also be automatically implemented if the User
has chosen this option.
The User has to select a topology (node, sub-network or network) and to choose the Configuration/Upload
Tools, Upload of Protection Schema/Liner MSP command. Then he has to provide the list of topologies
(node, sub-network and network) that has to be taken into account by the command.
Only MSP schemes between NEs contained in this list are examined.
The User can also set the implement option: if this is done, the discovered NPA, after the creation in
1354RM database, is implemented too.
For all the NEs contained in the provided topologies, a take over request is sent in order to discover the
presence of one or more MSP protection blocks. The returned response includes information about the
protection block characteristics and the list of protection units associated to it.
Starting from the ports contained in this list, a check is performed to verify the existence in 1354RM data-
base of the protecting and working physical connections defined between two NEs which implement a
MSP scheme. If one or more of these connections are not found, a message is sent to the User to suggest
the calling of the Upload Physical Connectivity command before to re-start the upload NPA command.
Also the protection blocks characteristics should be consistent. If not, an error message is sent to the User.
After these checks, for every discovered linear MSP scheme a configure NPA action is automatically sent
to create the related NPA in the 1354RM database. The action responses are directly displayed in the
upload NPA box at the User Interface. If the action ends correctly and the auto implement option is set,
the created NPA is implemented. If this option has not been chosen, the NPA can be manually imple-
mented by the User later on.
2.8.2.2 Restrictions
The feature can be applied only to couples of SDH Q3 NEs supporting the Linear MSP (i.e. it is not sup-
ported if at least one NE of couple is QB3*).
2.8.3.1 Description
The User can point to a topology and ask for the upload of 2f MS-SRings as it is done for linear MSP.
The physical connections, which implement such scheme, should be already present and implemented
in 1354RM database; if not, it is possible to upload them in a previous step, selecting the involved NEs
(they can be either Q3 or QB3*) and using the Upload Physical Connectivity command.
Warning: The network construction operations performed in download enabled mode could remove the
protection schemes from the NE.
The take-over starts taking the 2f MS-SPRing protection blocks uploaded in the topologies provided by
the User. When a consistent 2f MS-SPRing scheme is found, a new NPA (including the involved NEs and
the related physical connections) is created in 1354RM database.
The User has to select a topology (node, sub-network or network) and to choose the Configuration/Upload
Tools command. Then he has to provide the type of the take-over he wants to perform (Upload of Pro-
tection Schema/2f MS Spring) and the list of topologies (node, sub-network and network) that has to be
taken into account by the command.
Only 2f MS-SPRing schemes involving NEs contained in this list are examined.
The User can also set the auto implement option: if this is done, the uploaded NPA, after the creation in
1354RM database, is implemented too.
Warning: The cross-connections belong to paths crossing the 2f ring are not removed on the NE, but the
paths themselves are removed from the Squelching Table of the 2f ring. These paths are so no longer pro-
tected in the 2f ring. If the User wants to correct this situation, he should set the nodes in download disable
mode then execute the take-over of the 2f ring then also the take-over of the paths; only afterwards the
nodes can be set in download enable mode: during the download, because the paths are existing at
1354RM level, the squelch tables are not going to be modified.
Note: the states of the protection blocks are reported only when the 2F MS-SPRing NPA is implemented
AND the nodes are in download enable mode
2.8.3.2 Restrictions
None.
2.8.4.1 Description
The feature includes the possibility to point to a NAP, to a CTP or to a trail (physical, MS, HO) and to upload
the network connectivity if not defined in 1354RM. This includes also the take-over of the LO payload of
HO trails.
The feature allows the automatic creation (and the allocation, implementation and commissioning as well)
of paths/trails starting from the actual configuration of the NEs.
Warning: The network construction operations performed in download enabled mode could remove the
protection schemes from the NE.
The User has to choose the proper command and to provide one of the following information:
NAP
CTP
port
physical connection
link connection
topology (node, 1st and 2nd level sub-network, network)
– the path/trail involving the provided information is created (allocated, implemented and commis-
sioned) inside the 1354RM DB
– If the take-over of one or more than one path/trail fails, the information is provided to the User in the
report message area of the command.
The Userhas to select the Path/trail take-over command (Tools item on the static tool bar) and to provide
one or more than one of the following entities that have to be taken into account by the command:
NAP
boundary/intermediate CTP
PDH/SDH port
physical connection
link connection
topology (node, 1st and 2nd level sub-network, network)
The User has also to provide the target Configuration State for the uploaded path/trail (allocated, imple-
mented and commissioned) can also start the Path/trail take-over command from one or more NAPs or
CTPs.
2.8.4.2 Restrictions
The feature is applicable only to point-to-point unprotected or SNCP paths/trails. It is not possible to obtain
a SNCP Drop&Continue paths. For QB3* NEs only bidirectional paths are supported. The take-over of
ethernet path (virtually concatenated or not) is not available. It is not possible to obtain an X path if the
main and the spare route are completely disjointed; in this case, two paths will be created.
There are particular configurations that the take-over process is not able to manage or it should be chosen
how to manage them (e.g. because there are different possible choices). In particular:
– 140Mb transport not-terminated on both sides are handled as paths (and not as trails)
– unidirectional paths with only two legs ending on two different nodes (or on a single virtual node) are
treated as broadcast (and not as Y paths)
– SNCP paths/trails that have two branches ending on the same External-Network are automatically
closed by the system on a single NAP (i.e. they are not treated as an Y path or trail)
– SNCP paths/trails not-terminated on both sides (even if terminated with bridge&switch connections
on the real NEs), cannot be recognized as they are (i.e. as an X paths) and are thus uploaded as
two separate paths
– paths terminated by two PDH ports are treated as PDH paths, even if they can also be of ATM type
(ATM paths can have two, one or no ATM ports)
– concatenated path are created only if all physical connections the path is using have the correct con-
catenation configuration
In the following envisaged procedure describes how to take over the complete network splitting this activ-
ity per layers; as soon as the previous step is successfully completed the next one can take place (the
complete network take over split per network partitioning is not considered reliable and effective, because
trail/path take over cannot succeed if all the relevant supporting MS and physical resources have been
properly discovered).
it is important to minimize as much as possible the intervention on the real network and for all the duration
of the complete network take over activity no provisioning on both 1353NM /CT is to be performed. For
most of the duration of the complete network take over the 1354RM is to be in download disable on all
the nodes
At this stage no configuration activities can be foreseen on a 1354RM off-line replica system (but possibly
the network structure partitioning).
Before starting the implementation of the complete Network take over, it is recommended to plan and
check accurately all the activities, which are to be performed in the proper sequence
Moreover:
• In case of network with NEs which do not support J0 Management, all the exiting SDH physical
connections are to be identified (by telecom Planning Department) with the relevant information
(e.g. user label, A-end and Z-end port/node)
• All the exiting Linear MSP delimited by at least a QB3* NE are to be identified (by telecom Plan-
ning Department) with the relevant information (e.g. user label, A-end and Z-end port/node)
• To plan (together with the telecom Planning Department) the definitions in 1354RM of the Net-
work(s), 1st level sub-network, 1st level sub-networks, external networks,
• In case Linear MSP are foreseen between a Q3 NE and a QB3* one an External Network is
to be foreseen, in order to terminate 2 SDH Physical connections (Linear MS Protected)
towards the Q3 NE and to terminate on 1 (protected) SDH Physical Connection towards the
QB3* NE.
• To check that NE Group User labels and NE ones are unique in the overall network.
• To get from the telecom Planning Department the user labels (if any) of the Multiplex sections
HO trails and Paths.
• Configure in the1354RM off-line replica system the structure of the Network(s), 1st level sub-
network, 1st level sub-networks, external networks.
• Perform the data back-up of such 1354RM DB and restore it in the system in field.
All the NEs are to be reachable via DCN.
• Each step can be executed only if the previous one is completely successful (i.e. checking the
results of the operation and taking the proper actions to recover possible errors).
– Stop and restart each EMLIM QB3* (in order to allow to 1354RM to upload of QB3* NEs with the
related SDH and PDH ports)
– Synchronize EML Domain (in order to allow to 1354RM to upload the Q3 NEs with the related SDH
and PDH ports)
– For each partitioning level identify the QB3*/Q3 NEs to be contained and create the corresponding
nodes, WITHOUT automatic upload option enabled for avoiding the NE DB scratch; it is worth to
remind that 1354RM 7.4 can allow default setting change (this 1354RM capability can be used for
such purpose in order to make more reliable this operation)
– Create/check all the needed External Networks; create and implement with the option Preserve con-
catenation set to True (when relevant) the physical connections with the external networks
– Set J0 sent (by means of Automatic generation of Trace Identifier command) on all the SDH ports,
which belong to NEs supporting such feature and do not have yet configured such info (scope to be
provided by the User is Network Level)
– Put all EML Domain QB3* in download disabled mode, i.e. 1354RM is not allowed to set/change any
QB3* NE configuration
– Perform the Upload Physical Connectivity command in an ordered way for each network topology
(scope to be provided by the User is Network Level)
– List for each node the observed SDH ports (i.e. not yet involved in a physical connection; for each
of this create the real physical connection towards the corresponding NE or the relevant external Net-
works (creating it if not existing) create and implement with the option Preserve concatenation set
to True (when relevant) the physical connections with the external networks
– Create the physical connections terminated by QB3* NE (this operation scratch the NE configuration
in 1353NM)
– Repeat this operation till all the SDH ports are involved in a Physical connection
– For each QB3* NE perform align up on 1353NM (to align the 1353NM DB to the QB3* configuration)
– Perform the Upload of Protection Schema/Liner MSP command (with Implement option) in an
ordered way for each network topology (scope to be provided by the User is Network Level)
– Create in 1354RM the remaining not uploaded Linear MSP schemes (e. g. the ones terminated by
at least one QB3*)
– Perform the Upload of Protection Schema/2f MS Spring command (with Implement option) in an
ordered way for each network topology (scope to be provided by the User is Network Level)
From the Network Level: Path take over for each NAP and each border CTP not yet involved in a con-
nectivity
N.B. in this way the HO Trails, which do not yet support LO Paths, are not discovered (it is worth to
notice that this case should be not so frequent. TBC how to solve this problem (it is possible
anyway to detect such problem in mark audit phase.
Consistency audit on all the NEs of the managed network on at least traffic affecting info (this is a very
time consuming activity, is there any mean to reduce in reliable way the execution time)
For each QB3* NE perform the MIB compare between 1353NM DB and the NE one
It is worth to notice that such way of working is not recommended; in fact as soon as 1354RM is deployed
and it is fully operational, all the network operations are to be done by 1354RM User (and not by the
1353NM one). In fact when a NE is take in charge by 1354RM the regular 1353NM User cannot perform
provisioning activities on most of the transmission resources)
This procedure can be performed in download enabled mode for all the nodes.
The ending NAPs/border CTPs (HO-CAPs) of the newly created paths (HO Trails) should be known by
1354RM User
Each step can be executed only if the previous one is completely successful (i.e. checking the results of
the operation and taking the proper actions to recover possible errors).
Path take over starting from for the relevant NAPs (CAP) and border LO CTPs connectivity check via Path
Trace for each new path
SDH Networks:
• Physical and Regeneration Section (RS)
• Multiplex Section (MS)
• Higher Order Path (HOPL)
• Lower Order Path (LOPL)
In the following some simplified definitions of the resources managed by 1354RM (formal descriptions of
a lot them are available in G.803, G.805)
Network: It represents the highest level of partitioning managed by 1354RM. A path that crosses two Net-
works cannot be managed by 1354RM as a single transport entity (i.e. it will be represented with two
paths)
1st level Subnetwork: It represents the second level of partitioning (i.e. a Network can be composed by
more than one sub-networks)
Physical Connection: It is the logical representation of fibers and coaxial cables, between network ports
Example: The physical connection delimited by to SDH ports.
Physical Resources
Network port: It represents the physical port where e.g. the fiber is connected. Example: A STM-16 port
of a SDH NE.
Access port: It represents the physical port where the client signal is added/dropped. Example: A PDH
port (e.g 140 Mbit/s Port) present in a SDH NE.
Transport Entities
MS Trail: It is a trail at Optical Multiplex Section Layer. Example: MS-Trail is between two SDH ports of
two adjacent SDH NEs.
HO Trail: An HO Trail is an infrastructure pipe between two (either adjacent or not) SDH NEs. It is delimited
by two CAPs (Client Access Points) and it can support optical client paths.
Path: A path (can be at either HO or LO path layer) is a route established in the SDH/SONET network.
It is delimited by NAPs (Network Access Points). Example: A VC-12 path delimited by two VC-12 NAPs
Link Connection: It is an arc delimited by the two CTPs with the same timeslot and it is supported by the
same server Trail. Example: An Au-4 Link Connection is delimited by two corresponding AU-4 CTPs and
it supported by a MS-Trail.
Reference Points
NAP (Network Access Point): It terminates a path; one Network Access Point is associated to one
access port. Example: A VC-3 NAP (can be called also VC-3 TTP) is associated to a 34 Mbit/s port (or
a 45 Mbit/s port) and it terminates VC-3 path).
CAP (Client Access Point): It terminates a HO-Trail; one CAP can support Lower Order CTPs.
Example: A VC-4 CAP can support TU-12 and/or TU-3 CTPs (depending how the payload has been con-
figured); it terminates a VC-4 HO-Trail.
The tool can be applied either to a single path or to a set of paths or to the entire network
The paths with the following service types are analyzed (the transport network is only SDH):
· PDH
· Ethernet
· DATA
· SDH
> runProtectionAnalyzer.sh
1. "Check one path/trail" option: filed Input file name is grayed and not editable.
4. Specify the output file (complete path) name where the results have to be put. Not that this name
will be completed by the string "_<number>.csv".
For example if the user wants to analyze path with identifier 33117:
After performing the analysis the tool produces the following outputs:
1. a csv file named <output file>_1.csv. Looking at the previous example the output file is /tmp/
path33117Analysis_1.csv
2. a new window that shows the analysis results for the specified object is shown
1. "Check whole network" option: fields Object, Identifier, Input file name, Output file name are grayed
and not editable.
Note that output file name is forced to SingleFailureAnalysisResult and cannot be changed: one or more
files SingleFailureAnalysisResult_xxx.csv will be saved in the current directory.
Note that the complete database analysis should take a long time depending on the amount of paths/trails
contained.
At the end of the analysis, no window will be opened because of the large amount of data that can be
retrieved. In this case, in order to analyze the results the user can click on "Filter results" button (see Fil-
tering results section).
1. "Check paths/trails from file list" option: fields Object and Identifier are grayed and not editable.
2. Specify the input file name (complete path) containing the paths/trails labels in the following format:
Note that this operation should take a long time depending on the amount of paths/trails requested inside
the input file and output file name is cannot be changed.
At the end of the analysis, no window will be opened because of the large amount of data that can be
retrieved. In this case, in order to analyze the results the user can click on "Filter results" button (see Fil-
tering results section).
The user is allowed to specify the filtering criteria among the following:
If Object selected is path then the path with the given identifier is searched.
If Object selected is trail then the trail with the given identifier is searched.
If no Object is specified the tool looks for both path and trail with the given identifier.
- Path/trail label.
If Object selected is path then the path with the given userlabel is searched.
If Object selected is trail then the trail with the given userlabel is searched.
If no Object is specified the tool looks for both path and trail with the given userlabel.
- Physical connection id. The tool looks for paths/trails impacted by the given physical connection
identifier.
- Physical connection label. The tool looks for paths/trails impacted by the given physical connection
userlabel.
- HO trail id. The tool looks for paths/trails impacted by the given server trail identifier.
- HO link connection id. The tool looks for paths/trails impacted by the given HO link connection iden-
tifier.
Then he must specify the filtering value and click on action button "Apply filter"
Each row of the previous table represents a single point of failure for a given path/trail.
Column TYPE describes the type of the object impacted (path or trail), and column id and userlabel its
identifier and label.
Column RATE is meaningful only for paths and represents the path rate.
Column RISK describes the type of problem that can occur to the impacted object. It may ranges among
the following values:
Ø None (fully protected): this means that the path/trail is fully protected, then no single point of failure
is present. In this case the following columns are empty.
Ø Bandwidth reduced: it is possible only for virtual concatenated paths and this means that a failure
on the specified physical connection may lead the path to work with only a subset of server trails carrying
traffic. In this case column VCG will report the identifier of the server trail impacted by the problem and
CHNUM contains the channel number of this server trail.
Under PHYSICAL CONNECTION group column ID and USERLABEL columns describe the physical con-
nection identifier and label that may generate the failure when damaged.
Column virt conc group id and channel number are meaningful only for virtual concatenated paths and
represent the identifier of the supporting trail and its channel number.
Column leg number is meaningful for broadcast paths only and reports the leg number impacted by the
failure.
Column LO link connection is meaningful only for LO paths or server trails and reports the impacted LO
link connection identifier impacted by the failure.
Column HO trail is meaningful only for LO paths or server trails and reports the impacted HO server trail
identifier impacted by the failure.
Column HO link connection reports the impacted HO link connection identifier impacted by the failure
On Windows machine:
3.1 Introduction
This chapter covers the following topics:
• Fault Management
• Diagnostic
• Consistency
• Maintenance Tracing
• Protection Management
• Performance Monitoring
• Test Ports
• Logger
Alarms are generated on paths, Physical Connections, Trails (both HO and MS).
Elementary Alarms are received from EML layer and processed by RM in order to determine the RM object
to be marked as faulty (RM Object Impacted). RM provides for the impacted object the Alarm Severity,
the Operational State and the Probable Cause.
SEN-IM and TSD-IM are the protocols, respectively used for QB3* and QB3 equipments, which describe
the EML to NML communication.
N.B. Transport Incoming Failure means that a failure is entering the managed domain. This alarm
alone does not tell if the end-to-end path works or not, it just tells that a wrong signal is entering.
The managed domain could be able to recover to the failure if the path is protected.
N.B. Transport Outgoing Failure means that the managed domain is providing to the outside at
least one flow that is in error. This alarm does not tell if the end-to-end path works or not. The
end-to-end path could be protected outside the managed domain in such a way that the failure
can be recovered.
N.B. Only when the path is not working end-to-end, the operational state of the path itself is set to
disable.
Ì To render effective this functionality, the relevant FEP agent must be restarted.
Q3 alarms can be enabled/disabled on the involved Network Element for a certain path.
SEQUENCE
a) On path creation
2) If the user, when creating the path, selects Alarm Enabling Rule: Manual, for this Path it will be
possible to enable / disable the involved alarms (from the Path List: menu Actions: Alarms: Con-
figuration: enable/disable for Client or Transport.
b) After path creation, from the Path List the user can modify the Client/Transport alarm enabling rule
by selecting the menu Actions: Alarms: Configuration: Client/Transport Enable/Disable rule, as in the
case of path creation.
c) A dialog box is presented, which allows the enabling rule selection by means of a dictionary.
Alarms on PDH ports, NAPs, boundary CTPs are enabled if the Client/Transport (Q3 only) Alarm
Enabling rule= on Implementation.
d) To verify the successful change of this values the user can issue a Show/Set Attributes on the
selected path. See Figure 618.
from the HO Trail List the user can modify the Transport alarm enabling rule by selecting the
menu Actions: Alarms: Configuration: Transport Enable/Disable.
This includes the ability of RM to setup alarm propagation rules other than the default ones defined for
physical connections related to virtual elements or based on Line Systems / Radio Links. By default AIS
and UPA on CTPs are never received by RM and this prevents a correct alarm from being propagated
on not terminated paths.
To enable the UPA alarm you can enter the "Alarm enabling: LOP,EXBER,UPA command on the selected
CAP. See Figure 619.
This feature allows enabling and disabling frame supervision on bulk or structured PDH flows.
The operator can select a PDH port and execute the command to enable or disable the frame supervision.
The command is available on 1641SX (managed by WX 1.7.1) on configurable 140, 34, 2 Mbit/s PDH
ports.
By default the frame supervision alarm and the consequent action (AIS) are disabled.
Refer to Section Operation. In particular see paragraph ISDN primary access management.
The main operations relevant to ASAP are LIST, CREATE, CORRELATE and MODIFY.
The ASAP class is inserted under the Network Domain. From the browser the operator points with the
mouse to the Network Domain, issuing Search: Related Items: Alarm Profiles. The list of the current pro-
files is displayed. See Figure 622.as an example.
The severity can be "no alarm" if the alarm must not be emitted.
N.B. A default ASAP is available; when a path, a trail or a physical connection is created, the default
ASAP is assigned.
The user can create new ASAP's. The command is also available at the user interface from the path,
trail or physical connection views. The sequence is as follows:
1) From the browser point with the mouse to the Network Domain and issue the command Alarm:
Create Alarm Profile. The ASAP Creation dialog box is displayed. See Figure 623.
2) Enter via keyboard the ASAP userlabel and assign the suitable severity to the relevant probable
cause/s. Click on button Create to confirm the creation.
A "correlation" action is available in order to assign a new ASAP to relevant objects. The command
is also available at the user interface from the path, trail or physical connection views. One of the
possible sequences is as follows:
1) Select the path/paths from path list and select Actions: Alarm: Management... as indicated in
the window shown in Figure 624.Figure 625.shows an other example. The object correlation
to an alarm profile dialog box is displayed (See Figure 626.on page 563). This dialog
box contains also the ASAP create button. See above paragraph 3.2.4.2 on page 561.
2) Select the ASAP list button as can be seen from Figure 626.
The Alarm profile list window is presented (see Figure 627.on page 564).
3) Select the involved profile and click on button Apply. The selected ASAP icon is displayed in
the Correlate ASAP dialog box, as per Figure 628. Click on Next button to continue.
The auto mode button can be set to enable or disable. This feature allows managing the auto mode
defined, according to ITU-T G.806, in the alarm port mode. This mode is supported by OMSN (Low Capac-
ity starting from release 4.3B and 1670SM starting from release 4.3) on SDH ports, PDH ports and on Eth-
ernet Gigabit ports.
• Not monitored (i.e. the detected defects are never reported). In the current NE implementa-
tion, this is achieved by setting an appropriate ASAP able to disable the reporting
• Monitored (the detected defects are reported. This is achieved using an ASAP enabling the
reporting).
• Auto: the port is not monitored but waiting to go to the monitored state (provided the ASAP is
different than "no alarm"). The trigger to go from auto to monitored state is the first detection
of the signal (i.e. the clearing of the LOS defect) or a command from the NMS (e.g. RM).
The user can modify a profile simply issuing a Show/Set Attributes of the profile. See Figure 630.
When a new ASAP is assigned to an object or the associated one is modified, the severity of alarms
present on the object is re-evaluated clearing the alarm and then generating the alarm with the new sever-
ity if different from “no alarm"
By default this alarm is deactivated since the default ASAP sets it to notAlarmed. To activate it, a new
ASAP has to be created and correlated to the involved path.
The involved NE attribute is called autoAlarmSynchro, default value is Enabled. After a flooding alarm
period for Q3 NE, an automatic alarm synchronization is executed.
3.3.1 Introduction
This Chapter deals about the following subjects:
– SEC Administration
– secim process, which is the agent of the Security Subsystem and keep all the informations related
to the users and the system. Secim process is running only on 1354RM-IM.
– lss process, which is a kind of gate for applications related to user Security profile. One lss process
is instantiated for each workstation/server belonging to the 1354RM system (1 for each presentation
and each IM).
These permanent processes are configured to automatically run after the installation.
The SEC integration on 1354RM, as a first step, is intended only for the integration of Security Manage-
ment within AS (Alarm Surveillance). This means that each 1354RM operator using AS is able to view/
manage only alarms coming from Network resources that it can manage.
In order to have inside SEC Subsystem all the informations concerning Security, SEC is also integrated
in SMF, in order to get informations related to new users, user removal, and initiator management. More-
over the integration of SEC in SMF is also related to the Backup operation. Each time a new Operator
backup is performed also SEC database is saved.
SEC Subsystem is provided with a default customization for which on an RM is automatically configured
to run secim process if RM-IM and lss process for each kind of RM (IM|US.
In order to distinguish 1354RM SEC processes from the 1353SH ones the RM processes are called
<process_name>_1354RM_<NTWDOMAIN>.
The SEC configuration is also related to the automatic start of SEC process: in the /etc/inittab file is
inserted 1 line for each permanent SEC process. This line invokes the script
run_SECIM|LSS_1354RM_<NTWDOMAIN> that checks for SEC habilitation to run and launch the
secim|lss_1354RM_<NTWDOMAIN> process. The automatic start of SEC processes is set on run-level
4 that is the 1354RM run-level default. No checks are performed on the 1354RM effective run-level (it is
supposed to be 4).
During Operator Backup and Restore the SEC subsystem is stopped in order to add to the Operator Infor-
mations also Informations related to SEC. The actions related to SEC start and stop are automatically
launched by SMF.
/usr/sec/integration/script/alignsecdb
This procedure starts from the last successful SEC command and aligns the SEC DB to the actual RM
Security definitions.
Security for 1354RM_<NTWDOMAIN> is not activated. Please contact your System Administra-
tor, the problem is that the user is not defined in the SEC DB, or the SEC Subsystem has been stopped
(Restore proc.) or internal error.
N.B. If the Message doesn't say 1354RM it is belonging to the SEC installed for SH
RESTRICTIONS
SEC 5.0 doesn't manage the scheduling time. This means that if an user has a scheduled rule this rule
is applied everytime. This limitation is not due to the integration level but to the fact that SEC 5.0 doesn't
support it.
Depending on 1354RM user definitions the following AS Access Rights are granted:
Where:
VIEW: Users can invoke AS Synchronization but cannot interact with AS Administration functionalities
Alarm Access Rights shows the Alarm accessibility rules that are allowed to user:
MGT: Users that have this capability, if allowed by the NAD Rule (see below), can manage accessible
alarms (acknowledgement)
MGT means that user have the possibility to Acknowledge alarms (ManaGemenT)
RO means that user can only access alarms in a view mode (Read-Only)
The MGT Alarm Accessability is granted if allowed by the System Profile (previous table) otherwise (for
Look-Only users) is set to RO.
"X" show which alarm types that can be accessed by user with the corresponding NAD Rule associated
"X*" show alarm types (only marked with user NAD) that can be accessed by user with the corresponding
NAD Rule associated
In order to provide a flexible way to configure AS Access on Alarm the configuration file /usr/snml/conf/
sec/1354RM_Ruler is provided.
This file drives the user Access Rights definition in the SEC-DB and have to be changed before the SEC
installation in order to keep coherent user creations.
In particular in order to give to Look-Only users the possibility to manage all the Alarms without keeping
into account the RM Rule change the line:
as follows:
as follows:
Define a new ASAP setting the severity of all probable causes to Indeterminate. To do this perform the
following steps:
c) Point with the mouse at the Network Domain and issue the command Alarm: Create Alarm Profile.
e) Change to Indeterminate the severity associated to all the proposed probable causes.
The following procedures describe how to manage paths in order to avoid that alarms on them are
reported to 1330AS while they are under test.
a) The path has been created with Implementation Rule = User (default) and Propagation Rule = When
Implemented (default).
b) As soon as the path is created a new window is opened reporting the path icon with its Naps (Naps
View). Click on Alarm icon making available all the icons relevant for alarm management.
e) If in the ASAP space the Indet_Alarm_Profile is already present go to step h). (N.B. the ASAP pos-
sibly provided is not the ASAP currently associated to the path, but it is the last referred ASAP).
f) Click on “Alarm Profile list" button; the list of the available ASAP is provided.
h) Click on Next button, then on Finish button. At this point the path is correlated to the relevant ASAP.
From this point in time on alarms are reported to the path and visible by means of 1354RM USM, but no
alarm on this path is reported to 1330AS. Tests can be performed on the path without affecting mainte-
nance people.
d) Click on “Alarm Profile list" button; the list of the available ASAP is provided.
f) Click on Next button, then on Finish button. At this point the path is correlated to the relevant ASAP.
g) At this point the path is correlated to the default ASAP. Since this point in time alarm on the path(s)
are reported also to 1330AS.
a) Set-up the trail setting Setup Rule = User (N.B. Default value is Automatic).
b) As soon as the trail is defined a new window is open (Paths in Trail View).
d) If the Indet_Alarm_Profile is already present within the correlation window go to step g).
e) Click on “Alarm Profile list button"; the list of the available ASAP is provided.
g) Click on Finish button. At this point the trail is correlated to the relevant ASAP.
a) There is no explicit commissioning on HO-Trail. The scope of this phase is to cause the trail to report
alarms to 1330AS.
b) On the Trail list window (possibly filtered on HO-Trail) select the relevant trail(s).
e) If in the ASAP space the “default ASAP" is already present click on Next button and go to h).
f) Click on “Alarm Profile list" icon; the list of the available ASAP is provided.
g) Select the “default ASAP" and click on Next button. The ASAP icon is inserted into the correlation
window.
h) On the correlation window click on the icon “Finish" (the same as before). At this point the trail(s)
is(are) correlated to the default ASAP. From this point in time on alarms on trail(s) are reported also
to 1330AS.
a) Activate the Physical Connection; this action causes that alarms possibly present on it are imme-
diately reported to 1330AS too.
c) From the pop-up menu associated to the Physical Connection (on browser) select the command
Configuration: Implement to create the associated MS-Trail; this action causes that alarms possibly
present on the MS-Trail are immediately reported to 1330AS too.
The Physical connection implementation creates the MS-Trail(s)
d) From the pop-up menu associated to the Physical Connection select the command Display: All
Related Item.
f) Press No filter button; the associated MS-Trail is provided below the Physical connection.
g) From the pop-up menu associated to the Physical connection select the command Alarm: Manage-
ment; a new window is open (correlation window).
i) Click on “Alarm Profile list" button; the list of the available ASAP is provided)
j) Select the Indet_Alarm_Profile ASAP and click on the icon Next. The ASAP icon is inserted into the
correlation window
k) On the correlation window click on Finish button. At this point both the Physical Connection and the
MS-Trail are correlated to the relevant ASAP. Alarm possibly sent to 1330AS are automatically
cleared (but must be acknowledged by operator to make them disappear).
l) From the pop-up menu associated to the MS-Trail select the command Alarm->CorrelateAlarmPro-
file; the MS-Trail is added to the correlation window.
m) On the correlation window click on the icon “Start correlating all the specified objects". At this point
both the Physical Connection and the MS-Trail are correlated to the relevant ASAP. Alarm possibly
sent to 1330AS are automatically cleared (but must be acknowledged by operator to make them dis-
appear).
There is no explicit commissioning of these entities. The mean of this phase is to cause both Physical Link
and MS-Trail to report alarms to 1330AS.
The maintenance operations inherent to the Routers and Bridges are described in the documentation of
the Routers and Bridges.
The paths affected by a failure are automatically re-routed on the available route (spare or main).
Should a Network Element fully break-down, the system will attempt to reroute all paths crossing it.
Therefore, should one NE break-down, only local drop traffic would be lost.
The RM Operators control the network on the Workstation through the graphical interface.
– A1330AS application.
Notice that from 1354RM Rel.5.2.B on, alarms reported at 1330AS application are ONLY those
affecting the resources managed by the actually logged operator. This mainly applies to VPN
operators.
– the browser
The navigation from the Counter summary window is the first level maintenance procedure.
This procedure which is described in the following, applies to each row of the Counter summary window.
a) From the Counter summary window open the Alarm sublist clicking twice on the relevant row of the
Counter summary window. As an alternative select the row and issue the Sublist: Open pull-down
menu item. See Figure 632.
The relevant Alarm sublist is presented. Figure 633.shows an example of Physical Connection Alarm
sublist.
b) Select the alarm from the sublist and navigate it by selecting the Navigation: External Application:
1354RM pull-down menu item.(See Figure 634.). A confirmation dialog box appears. Click on OK
to confirm.
For the Path object the Nap view window and relative navigation window is presented:
The severity can be "no alarm" if the alarm must not be emitted.
For the Physical connection object the physical connection structure window is presented:
Alarmed objects are marked by an alarm icon. By clicking on this icon a window is presented, which
gives details on the selected alarm. See Figure 639.
For the MS-trail object the physical connection structure and relative navigation window is presented:
Fro the OMS trail alarm sublist select the alarm and issue the navigation command. The OMS trail struc-
ture window is presented.
From OCH trail alarm sublist select the alarm and perform the navigation.
Alarmed objects are marked by an alarm icon. By clicking on this icon, the Alarms details window is dis-
played.
3.4.1.7 EML
For Alarm processing (EML object), only the navigated object is presented in the browser window.
From the Client path alarm sublist select the alarm and open the navigation. The relevant client path rout-
ing view is displayed. See below figure.
Alarmed objects are marked by an alarm icon. By clicking on this icon, the Alarms details window is dis-
played.
3.4.1.9 NE
For Alarm processing (NE object), only the navigated object is presented in the browser window.
c) Analogously you can get the list of Alarmed Transport Objects from trail
N.B. Alternatively, to get the list of Alarmed Transport Objects, you can click on the relevant
icon. See below figure
In this example the navigation from an Alarmed Transport Object for WDM network is described. Fig-
ure which follows shows a WDM map
N.B. Notice that the SDH (fictitious) physical connection is automatically created (to adhere to the
info model), upon implementation of all WDM physical connections.
a) In this example, a SDH path from node T1 to node T2, is crossing the WDM server (said client path),
highlighted in the figure which follows
b) The list of Alarmed Transport Objects for the SDH path is given below
Figure 662. List of Alarmed Transport Objects from path in WDM network
N.B. For Ethernet path the List of Alarmed Transport Objects contains also the affected LO trails
– path
– trail
– EML Domain
– NE
– Physical Connection
– SDH Port
– Subnetwork
– Node
– Payload
Regardless the path alarm status, navigate the path from the Alarm Counter Summary
N.B. The Path Alarm Status is Cleared if the path operational status is Enabled (In-Service), this
implies that a path using its spare route is not alarmed.
– failed to Allocate
– failed to Implement
– failed to Deimplement
– failed to connect
– failed to disconnect
CONDITIONS The path involved is of the "broadcast" type. The Operator entered an Add Leg
command on the Path involved.
ACTIONS Verify the resources (physical connections and payload structure).Should the
path be protected, the protection can be removed and command Add Leg can
be entered again.
CONDITIONS The path involved is of the "unprotected" type. The Operator entered command
Add Protection.
CAUSES Lack of resources, i.e. the "spare" resource corresponding to the "main" one is
not available.
CONDITIONS The Operator has entered an Add Protection or Remove Protection command
on the path.
CONDITIONS The Operator has entered a Remove Leg command on a broadcast path.
CAUSES The cause may be due to the fact that the path section deimplementation has failed
(leg to be removed).
ACTIONS After having entered the command, perform an inspection at EML and NE layer level.
CONDITIONS The Operator has entered a Remove Protection command on the path.
2) if the command has been entered through the "No check" option, the failed
attempt to remove the protection is due to the unsuccessful spare route
deimplementation.
ACTIONS In the second case above described, inspect the EML and NE layers.
NOTE For more detailed information refer to Chapter 3.5 PATH/TRAIL ALLO-
CATION FAILURES
ACTIONS After having entered the command, inspect at EML and NE layer level.
ACTIONS After having entered the command, perform an inspection at EML and NE layer
level.
CONDITIONS The Operator has previously entered a Set revertive/Set not revertive com-
mand on the SNCP Operation mode attribute.
ACTIONS After having entered the command, perform an inspection at EML and NE layer
level.
CONDITIONS The operation has been automatically launched by the system which aligns the
paths and trails whose attribute is SNCP status=unknown. It can be launched
in a manual mode by the Operator via command Synchronize Switch on logi-
cally protected Path/trail/connInTopol.
ACTIONS
CONDITIONS The Operator has requested an SNCP management (Forced Switch Main/
Spare/Lockout.
ACTIONS After having entered the command, perform an inspection at EML and NE layer
level.
– HO trail join
– HO trail split
– HO trail connect/disconnect
– path connect/disconnect
– Alarm status
– Working status
Regardless the trail alarm status, navigate the trail from the Alarm Counter Summary. See Paragr. 3.4.1
– failed to Allocate
– failed to Deallocate
– failed to Implement
– failed to Deimplement
– failed to Remove
– failed to connect
– failed to disconnect
– failed to split
– failed to join
CONDITIONS The trail involved is of the "unprotected" type. The Operator entered command
Add Protection.
CAUSES Lack of resources, i.e. the "spare" resource corresponding to the "main" one is
not available.
CONDITIONS The Operator has entered an Add Protection or Remove Protection command
on the trail.
CONDITIONS The Operator has entered a Remove Protection command on the path.
1) if the command has been entered through the "With check" option, the
failed attempt to remove the protection may be due to the fact that the trail
is utilizing the "spare" route.
2) if the command has been entered through the "No check" option, the failed
attempt to remove the protection is due to the unsuccessful spare route
deimplementation.
ACTIONS In the second case above described, inspect the EML and NE layers.
NOTE For more detailed information refer to Chapter 3.5 PATH/TRAIL ALLO-
CATION FAILURES
ACTIONS After having entered the command, inspect at EML and NE layer level.
ACTIONS After having entered the command, perform an inspection at EML and NE layer
level.
CONDITIONS The Operator has previously entered a Set revertive/Set not revertive com-
mand on the SNCP Operation mode attribute.
ACTIONS After having entered the command, perform an inspection at EML and NE layer
level.
CONDITIONS The operation has been automatically launched by the system which aligns the
paths and trails whose attribute is SNCP status=unknown. It can be launched
in a manual mode by the Operator via command Synchronize Switch on logi-
cally protected Path/trail/connInTopol.
CONDITIONS The Operator has requested an SNCP management (Forced Switch Main/
Spare/Lockout.
ACTIONS After having entered the command, perform an inspection at EML and NE layer
level.
CAUSES
ACTIONS
CAUSES One or more of the paths belonging to this trail is in the Fail to connect/discon-
nect status. This is due to data base misalignment.
CAUSES From the multiple reply of the Event Logger it is possible to determine:
ACTIONS After having entered the command, perform an inspection at EML and NE layer
level.
Regardless the EML alarm status, navigate EML from the Alarm Counter Summary as described at para-
graph 3.4.1 .
As an alternative, from the Browser you can select the 1354RM icon and issue the command Actions: Dis-
play Main Related items: EML Domain.
– Alarms Aligned
– Alarms alignment. It can be: Normal, Failed, In progress. This attribute reflects the consequences
of the Synchronize command launched by the Operator.
CAUSES
3) TCP-IP problems
ACTIONS
2) Restart EML
CONDITIONS From Browser the attribute EML Alarms Aligned is false / the attribute EML
Alarms Alignment is Failed / the attribute EML Domain Alignment is Failed.
ACTIONS
3.4.3.13 NE Diagnostic
– Alarm status
• Not aligned.
• Failed to align
• Consistency Mismatch
• NE unreachable.
• Fail to Disable
• Fail to Enable
– NE DB modified by CT. (for TSD-IM ONLY). The CT has been automatically enabled because of
isolation problem and some modifications have been made by the CT operator.
• neNotEmlAligned_auditfailed
• neNotEmlAligned_misaligned
ACTIONS Verify that the Consistency download is enabled. Then execute a consistency
download: (i.e. global) toward the NE.
NOTICE THAT FOR TSD_IM NE THE RUN LEVEL CHANGE TO EXECUTE THE CONSIS-
TENCY DOWNLOAD IS NOT REQUIRED.
ACTIONS Inspect the browser Error Log and eventually execute a consistency download:
(i.e. global) toward the NE
NOTICE THAT FOR TSD_IM NE THE RUN LEVEL CHANGE TO EXECUTE THE CONSIS-
TENCY DOWNLOAD IS NOT REQUIRED.
CAUSES The NE did not answer following a certain operation executed by RM. (E.g. an
operation on a path, trail,...). The polling toward the NE is automatically started
and an automatic download is then executed.
ACTIONS Verify, by means of the Error Log the last operation executed on the involved
connectivity object of the NE.
CAUSES
3) TCP-IP problems
ACTIONS
2) Restart EML
Regardless the physical connection alarm status, navigate the path from the Alarm Counter Summary as
described at paragraph 3.4.1.
From Brower the diagnostic relevant attribute is Working State if it assumes the following values:
– Failed to Configure
– Failed to Implement
– Failed to Remove
CONDITIONS The working state is Fail to Configure. The user has previously started to modify
the payload.
CAUSES
ACTIONS
CONDITIONS The user has previously launched the Physical Connection Implementation
operation.
CAUSES
2) Communication error
ACTIONS
2) Verify that EML is running and launch again the Physical Connection
Implementation operation.
CAUSES
2) Communication error
ACTIONS
2) Verify that EML is running and launch again the Remove operation.
The SDH ports are displayed from Browser by utilizing command NE: Display Related Items: SDH Ports.
The attribute involved are
– Consistency status (for SEN-IM ONLY). The values relevant to diagnostic are:
• Not found. The board has been extracted. Objects assigned to RM belong to this board. Verify
alarms on related objects at RM and NM level.
– Upload status (for TSD-IM ONLY). The values relevant to diagnostic are:
• Not found. The board has been extracted. Objects assigned to RM belong to this board. Verify
alarms on related objects at RM and NM level.
CONDITIONS The icon displayed from the browser is distinguished by a bar and there is an
alarm icon near it.
CAUSES The board has been extracted. Objects assigned to RM belong to this board.
CAUSES The board has been extracted. Objects assigned to RM belong to this board.
The routing link diagnostic is intended as a verification of the values of counters displayed from Browser
and listed herebelow:
The Subnetwork diagnostic concerns the Working status attribute when assumes the following values:
– failed to Implement
– failed to Remove
ACTIONS After having entered the command perform an inspection at EML and NE layer
level.
ACTIONS After having entered the command perform an inspection at EML and NE layer
level.
A failure along the ring is denoted by a color variation in the map. In the Browser the attribute taken into
consideration for diagnostic is "Working State" if it assumes the following values:
– Failed to Configure
– Failed to Implement
– Failed to Remove
All the statuses whose description contains the "ing" suffix are of the "work-in-progress" type. Hence the
object is in this status only for a certain period of time.
CONDITIONS The Working state is "Failed to configure". The user has previously launched
the Payload Modify operation.
CAUSES
ACTIONS
CONDITIONS The user has previously launched the "Ring Implementation" operation.
CAUSES
2) Communication error.
ACTIONS
2) Verify that EML is running and launch again the Implementation operation.
CONDITIONS The user has previously launched a Delete command from MIB.
CAUSES
2) Communication error.
ACTIONS
2) Verify that EML is running and launch again the Remove operation.
A node failure is denoted by a color variation in the map. In the Browser the attributes considered for diag-
nostic are:
– CT access status:
– Working status:
• Failed to Remove
• Failed to Reset
– Reachable/Not reachable
CONDITIONS The user has previously launched a Delete Command from MIB.
CAUSES
2) Communication error.
ACTIONS
2) Verify that EML is running and launch again the Remove operation.
CAUSES
2) Communication error.
ACTIONS
2) Verify that EML is running and launch again the Implementation operation.
CAUSES
2) Communication error.
ACTIONS
2) Verify that EML is running and launch again the Implementation operation.
CAUSES
3) TCP-IP problems
ACTIONS
2) Restart EML
The user issued a payload modify command. The payload modify command can be executed on:
• PhysConn
• HOlc
• HOtrail
The working state of the above listed objects is "Normal" after the successful completion of the config-
uration. The working state can be Fail to Configure for unsuccessful completion.
CONDITIONS One of the objects is Fail to Configure; this condition is propagated to its super-
ordinate object (e.g. the ET is the superordinate and the PhysConn is the sub-
ordinate).
ACTIONS Inspect the browser Show additional information to display the cause of the
problem and execute one of the following actions:
3.5.1 Introduction
Path/Trail allocation failures are localized in the browser Path/Trail list. Selecting the involved path/trail
and clicking on the Show Failure Information Tool button, the Netscape browser application starts and
displays all information relevant to the failure.
The failure identification tool is based on Internet technologies, such as HTML, Java programming lan-
guage and HTTP protocol.
The allocation failure of a path or trail is detected by the user by looking at the transport to allocate, whose
configuration state goes to Failed to allocate. This state is displayed in the path or trail list.
The information provided in case of allocation failure are summarized in Figure 663.on page 624, namely:
– OBSTACLES AND UNSATISFIED CONSTRAINTS are managed with the following structure:
• OBSTACLES. This problem type is described by a problem description which helps in solving
the problem.
• UNSATISFIED CONSTRAINTS. A Constraint List is provided, indicating the failed constraint(s)
• OBSTACLES AND UNSATISFIED CONSTRAINTS. Both Problem description and Constraint
List are provided.
– OTHER ERRORS are not described in detail. They indicate errors for which no further information
is provided.
For OBSTACLES AND UNSATISFIED CONSTRAINTS Problem description and Constraint List are pre-
sented with the support of a simple graphical representation of the path/trail routing.
The tool usage is described in the following paragraphs.
ALLOCATION FAILURE
OTHER
OBSTACLES AND
ERRORS
UNSATISFIED CONSTRAINTS
OBSTACLES
UNSATISFIED &
OBSTACLES UNSATISFIED
CONSTRAINTS
CONSTRAINTS
SEQUENCE
a) Select the involved path/trail and click on the Show Failure Information Tool button. This button
is also present in the path/trail routing view. The Netscape browser application starts and displays
the Netscape Path/Trail allocation failure window. See paragraph 3.5.2.3
In case of Obstacles and Unsatisfied Constraints, the complete netscape view is provided.
SEQUENCE
a) Select the involved path/trail and click on the Show Failure Information Tool button. This button is
also present in the path/trail routing view. The Netscape browser application starts and displays the
Netscape Path/Trail allocation failure window. See Figure 665.herebelow.
failure date
– failure time
– no. of failed legs (for broadcast paths only)
one row per each failed leg. The relevant leg number is shown in the left-hand column.
PROBLEM TYPE, reference to the html Problem Detail frame. The following cases
are possible:
Two columns are displayable: MAIN (problems on the main route) and SPARE (problems
on the spare route, only for protected paths/trail)
b) At this point you can select the problem type, or in case of unsatisfied constraints you can select the
constraint list. See Figure 668.herebelow.
1) If you click on the Problem Type, reference to the html Problem Detail frame (named OBSTA-
CLES and CONSTRAINTS PROBLEMS), the Problem Detail frame view will display the
selected leg. See Figure 671.on page 630.
Leg no.,i.e. the selected leg number. This field is not present for point to point paths
node icon (green triangle) with node name or link connection icon (yellow icon)
with link connection name: node A name - node B name - AU/TU pointer No.
END 1 name and END 2 name. See Figure 670.on page 629.
Problem Type (yellow string which is the html reference to the Path/Trail allocation
failure description window of Figure 672.on page 630.
– From the Problem Detail frame of Figure 671.select the problem type. The Path/Trail allocation fail-
ure description window is displayed. See Figure 672.on page 630.
Generic Help on Allocation Failure. See Figure 673.on page 631. It contains a generic
description of the allocation failure.
A Main window reload button is present in this frame, allowing the operator to display the main
window.
Problem description. See example in Figure 674.herebelow. It contains the detailed problem
description (Title and Explanation) of the problem and suggestions (Hints) how to solve the
problem.
Explanation: The path/trail could not use a NE because it could not support a connection as
the one required.
Hints: If a constraint to use that NE has been set, try to remove it.
Explanation: The path/trail could not use a NE because it does not allow the connection with
the current set of connections already engaged.
Hints: Try to remove some other connection for this NE.
Explanation: The routing algorithm has found a route which uses a routing link with infinite cost
Explanation: The system tried to use a routing link without free link connections
Hints: Deallocate some paths/trails which use the same routing link or change the payload con-
figuration in order to create new link connections at the proper rate.
Explanation: No one hop routing link exists related to a physical connection. This can be due
to an improper payload configuration or to the presence of a user defined HO trail
– Unsatisfied Constraints
Explanation: One or more of the constraints given to the path/trail cannot be satisfied
Hints: The only way to allocate the path/trail is to remove/modify some constraints
The left hand side frame contains the Problem menu list. Each menu item, if selected, will display its prob-
lem explanation and some hints to solve it.
PROBLEM MENU
Figure 676.and Figure 677.herebelow display an example of protected path allocation failure.
This graphical table contains one row per each constraint. The table is constituted by : (see Figure 679.)
– title: PROCESSED CONSTRAINTS LIST (route), where route is equal to Main or Spare
satisfied/unsatisfied constraint. The green semaphore icon means that the constraint is satis-
fied. The red semaphore icon means that the constraint is not satisfied. In the latter case the
deletion of this constraint will probably solve the allocation problem.
constraint usage in the main route. The one-way icon means USE while the no entry icon
means NOT USE.
constraint usage in the spare route. The one-way icon means USE while the no entry icon
means NOT USE.
topology used as constraint. It includes the icon and the userlabel of the topological object
OTHER ERRORS are not described in detail, no other information is provided for this kind of errors.
A given HO-Trail crossing at HO a Node can be split in order to perform crossing at LO. This enables the
usage of LO resources in the splitting Node.
The operation reproduces in the splitting node the same payload structure of the starting trail.
From the user point of view, the split trail operation consists of 2 phases:
a) the user specifies the trail to split: RM checks in which nodes of the trail the split can be performed
(i.e. nodes where LO capability is available, nodes not belonging to protected parts of the trail...) and
prompts to the user the list of these nodes; no other action is accomplished by RM neither in RM MIB
nor in the NEs;
b) the user selects the splitting node and the operation can be executed.
The payload structure and the LO connections of the 2 nodes at the end of the involved HO trails are not
modified during the operations: modifications to connections and payload structure are applied only to the
splitting node.
The operation reduces the impacts on the existing traffic: the LO-Paths client of the involved HO trails are
disconnected only for the time necessary to perform the operation: only the segment of network between
the end nodes of the involved HO trails is affected.
Two HO-Trails entering in a given NE can be joined in order to reduce the LO usage of resources.
The payload structure and the LO connections of the 2 nodes at the end of the involved HO trails are not
modified during the operations: modifications to connections and payload structure are applied only to the
intermediate node.
The operation reduces the impacts on the existing traffic: LO-Paths client of the involved HO trails are dis-
connected only for the time necessary to perform the operation and only in the segment of network
between the end nodes of the involved HO trails.
Both split and join HO Trails are complex operations: they are composed of elementary operations (pay-
load configuration, trail implementation,...), as described in the following state diagram.
A
disconnect client paths connect client paths
from 1W to 4 E from 1W to 4E
B
deconfigure trail A configure trail A
deconfigure trail B configure trail B
C
deimplement conn 2 of trail A implement trail A
deimplement conn 2 of trail B implement trail B
D
JOIN join trails A,B into C split trail C into A,B SPLIT
E
implement trail C deimplement conn 2 of trail A
F
configure trail C deconfigure trail C
G
connect client paths disconnect client paths
from 1W to 4 E from 1W to 4E
H
The join trails is an operation that changes the state from A to H, passing through intermediate states.
The split trails is an operation that changes the state from H to A, passing through intermediate states.
– state A (see below): HO trails A and B are implemented and LO configured; some LO LCs (e.g. LC
A and B) and their CTPs are busy because they belong to a path; LO CTPs in the transit node 2 are
connected with point-to-point connections in topology without time-slot interchange; these connec-
tions can be allocated or implemented;
HO trail A HO trail B
HO LC A HO LC B1 HO LC B2
1 2 3 4
W E W E W E
NAP NAP
LO CTP A1 LO LC C LO CTP B2
HO trail C
HO LC A HO LC B1 HO LC B2
1 2 3 4
W E W E W E
– in a single step: a new action is defined in order to perform automatically all the activities that join
or split trails (i.e. that move, if successful, from A to H or viceversa);
Join and split trails are completely reversible: if a "join trails" is interrupted after an action, e.g. in the state
B after the first action, it is possible to go back to previous state, applying the action "connect client paths
from 1W to 4E". It is also possible to continue the "join trails", applying the same action (i.e. join trails) or
the remaining actions (deconfigure trail A, B, deimplement connections ...).
1) implement trail B;
2) configure trail B;
3) connect client paths from 1W to 4E;
b) to go back, executing the join trails (A, B) or performing the following steps:
The state transitions C - D and E - F are not symmetrical: the deimplementation is applied to a single con-
nection in topology for each trail (the one in the common node), while the implementation is applied to the
whole trail: this is due to the fact that, in MSSPRING, the implementation could modify the squelching
tables in the connections in topology contained in the other nodes of the same MSSPRING, while the
deimplementation of a single connection leaves those squelching tables to the old values.
A report is presented to the user indicating in real time which phase of the operation is in progress and
its result when completed. All the LO-Paths impacted by the operation (supported by the involved HO-
Trails) are reported too.
With reference to Figure 682.on page 640, A to D statuses describe a condition which includes two trails
In case the Join operation is blocked in the B,C,D statuses, the possible user operations are:
or
– the user can try to re-launch the join operation, since the probable reason of the interruption is the
condition of EML/NE not reachable
In case the Join operation is blocked in the E,F,G statuses, the possible user operations are:
– the user wants to complete the join operation by manually proceeding (step by step) to H status
or
– the user wants to manually revert (step by step) to A status by re-issuing the split command
With reference to Figure 682.on page 640, A to D statuses describe a condition which includes two trails
In case the Split operation is blocked in the G,F,E statuses, the possible user operations are:
or
– the user can try to re-launch the split operation, since the probable reason of the interruption is the
condition of EML/NE not reachable
In case the Split operation is blocked in the D,C,B statuses, the possible user operations are:
– the user wants to complete the split operation by manually proceeding (step by step) to A status
or
– the user wants to manually revert (step by step) to H status by re-issuing the join command
– Serving nodes: the two nodes that talk to each other on the K1K2 channel, sending their protocol
messages in order to serve their requests. If more than one request is served on the ring, the serving
nodes may be more than two.
– Intermediate nodes: the nodes that are not directly interested by the fault.
– MS-SPRING request (trigger): any kind of valid input to the MS-SPRING machine: equipment/sig-
nal failure, signal degrade, external commands, and protocol requests/replies.
– protocol request: a protocol message issued by a Tail node toward its peer request node (that may
either be a Tail node or Head node, depending on the nature of the trigger).
– protocol reply: a protocol message issued by a Head node back to its peer Tail node to acknowl-
edge a Tail node's protocol request.
– protocol message: a K1K2 code sent on the K1K2 channel that may either be a protocol request
or protocol reply.
– Lockout of Working channels - ring (LW-R): command that disables the node capability to issue
a ring protocol request of any kind. The node is anyway allowed to issue ring protocol replies. The
command is local, i.e. it is not forwarded to the other nodes through K1K2 channels.
– Lockout of Working channels - span (LW-S): command that disables the node capability to issue
a span protocol request of any kind. The node is allowed to issue span protocol replies. The com-
mand is local, i.e. it is not forwarded to the other nodes through K1K2 channels.
– Lockout of Protection channels - span (LP-S): command that prevents the use of the protection
channels over the addressed span. The command is not local, i.e. it is forwarded through K1K2 chan-
nels also to the other nodes that, as a consequence, do not take any action involving the addressed
span.
– Routing in Working (RIW). For 1670SM equipment. The protection route is within the working
capacity
– Routing in Protection (RIP). For 1664SM equipment. The protection route is within the protection
capacity
3.7.1.2 4f MS-Spring
The ring can be made up of a maximum of 64 ADM's. 1664SM equipments can build 4-Fiber STM-16 rings
with Routing in Protection mechanism.
1670SM equipments can build 4-Fiber STM-64 rings with Routing in Working mechanism.
For Paths and Trails an attribute enables the usage of low priority resources. This attribute is taken into
account during path allocation.
The protection capabilities of the ring are based on the information stored in the Ring Traffic Map and eval-
uated by each NE in order to take the appropriate decisions in case of fault.
In order to avoid misconnections, RM, during implementation phase, sends the update of the ring traffic
maps before the creation of connections, and viceversa, during the de-implementation phase, updates
the maps only after the deletion of connections.
The ring traffic map is not shown to the RM operator, because the same information are provided by the
path/trail route display functionality.
The D&C is performed using protecting resource between Service Nodes while using 1664SM with RIP
mechanism and using working resource between Service Nodes while using 1670SM with RIW mecha-
nism.
– for 1664SM rings D&C on interconnected NPE rings is not always able to survive to double
failures, a failure per ring, (this happens when the primary node of one ring is connected to the sec-
ondary node of the other ring)
3.7.1.2.1 Path
– Server MS protection usage profile: it represents the profile of the MS resources to be used in allo-
cating the path.
The possible values are:
• Normal (default)
– For 1664SM rings, the RIP mechanism is used, i.e. when crossing 4 Fibers MS-Spring,
the path uses only working (high priority) resources, except for primary and secondary
nodes of the double interconnection with another ring, because these nodes are charac-
terized by the Drop & Continue protection (RIP)
as a result, in the segment between service nodes:
• if the path is bidirectional (Figure 685.), the used resource (nodes E, D, H, I) can be
only the protection one: a bidirectional D&C IC on protection is performed in the pri-
mary nodes (D, H);
• if a path is unidirectional point-to-point (Figure 686.), the used resource is:
• protection if the signal flows into the service nodes (B, C): a unidirectional D&C IC
on protection is performed in the primary node (B);
• working if the signal flows out of the service nodes (E, D): a multipoint connection
is performed in the primary node (E); this allows the user to perform subsequent add
leg operation;
it is possible to use the protection resource instead of the working (nodes E, D), e.g.
forced by a constraint (Figure 687.);
• if a path is broadcast (Figure 688.), the used resource is:
• protection if the signal flows into the service nodes (B, C) like in a unidirectional
point-to-point path: a unidirectional D&C IC on protection is performed in the primary
node;
• working if the signal flows out of the service nodes (E, D): a multipoint connection
is performed in the primary node);
it is not possible to use the protection resource instead of the working one.
– For 1670SM rings the path uses only working resources (RIW)
• Protection preferred
When crossing a 4 Fibre MS-Spring, the path uses protecting (low priority) resources.
If the routing algorithm must use the working resource in one span of the 4F MS-spring (e.g.
no free resources in the protection, or a constraint is applied), all working resources are used
in the ring, in order to avoid jumps between working and protection resources (jumps not fore-
seen for the management of ring traffic map).
If the path is protected and main and spare routes are crossing the same MS-Spring, each route
crosses separately the ring itself since D&C connection are not available for protecting
resources.
As a consequence of this behavior and of the fact that the SNCP connection is not available
on a 4f MS-Spring, if the protected HO path is completely inside a 4f MS-Spring, the allocation
will always fail.
• Protection only
the path uses only protecting (low priority) resources.
– Server Ms protection usage profile is added to HO trails (see the description given for paths).
working
protection
A B C
NPE
F E D
G H I
NPE
N M L
SNCP
A B C
NPE
F E D
SNCP
Figure 686. unidirectional protected path (using working resource between nodes E and D)
working
protection
SNCP
A B C
NPE
F E D
SNCP
Figure 687. unidirectional protected path (using protection resource between nodes E and D)
A B C
NPE
F E D
SNCP
An attribute specifies if the Physical Connection is Working (i.e. it connects main ports, involved in a MS
protection mechanism) or Protecting (i.e. it connects spare ports) or Normal (i.e. it connects ports not
involved in any MS protection mechanism.
– Configuration State. It is the state requested at the interface Functional Agent / TSD-IM Front End
Processor and can assume the following values:
• virtual.
The MS-SPRING et topology is only planned inside the RM (i.e. is in the state “defined") and
is not established inside the NE (the ring coordinator object is not present in the NE)
• active.
The MS-SPRING et topology is active in the NE, i.e. it is “implemented" in RM (see also Tran-
sition State)
– Transition State. It describes the transition state of the MS-SPRING in the NE during the configu-
ration phase. The following values are possible:
• idle. It is the value corresponding to the value “virtual" of the Configuration State
• defined. The ring has been defined by the action applied on the Protection Manager MOC in
NE: the information on working/protecting east/west msTTPs have been provided to the NEs.
As a result the Ring Coordinator object is created in the NE and all other objects (Ring Map,
Ring Traffic Map or Squelch Table, Ring Protection Group, Ring Protection Units ...) are created
and correlated to the Ring Coordinator. The Ring Coordinator has the status “enabled"
• populated map. The Ring Map has been populated according to the information contained in
the ring map info attribute through the populate action applied to the Ring Coordinator. As a
result, the information describing the map of the nodes inside the ring have been stored both
inside the Ring Map and in the Ring Traffic Map accordingly.
• activated. The Ring Coordinator has been activated (activate action). As a result, the pro-
tected msTTPs, unprotected CTPs, working/protecting east/west side have been put in relation
according to the ring type (2/4 fiber with/without extra-traffic) and the MS-Spring mechanism is
active
The Configuration State attribute “active" is consistent with the NE 'status' if the 4-F protection block
entered the sequence “defined", “populated map", “activated", i.e. if the Ring Coordinator is “acti-
vated". In this case the attribute value is “activated" and the Consistency Status is “normal" .
– node id: it refers to the node id attribute inside the node entity
– ring map info: it is a string representing the sequence of node identifiers following the direction east-
west in the ring. It is used to provide to the NE the information usefull when filling the Ring Map object
(e.g.: “x,y,z,w". Starting from the node x and moving to east the found nodes are in the sequence y,
z, w, where x,y,z,w are the identifiers of the nodes).
– West Reliable ( protected ) Resource: it is the id of the reliable msCtpCap on the west main port
– East Reliable Resource: it is the id of the reliable msCtpCap on the east main port
– West Working Unreliable Resource: it is the id of the unreliable msCtpCap on the west main port
– East Working Unreliable Resource: it is the id of the unreliable msCtpCap on the east main port
– West Protecting Unrealiable Resource: it is the id of the unreliable msCtpCap on the west spare
port
– East Protecting Unreliable Resource: it is the id of the unreliable msCtpCap on the east spare port
– Ring WTR (Wait To Restore time): it containes the value to provide to the NE during the MS-Spring
provisioning phase.
– West Span WTR (Wait To Restore time): it contains the value (west side) to provide to the NE during
the MS-Spring provisioning phase.
– East Span WTR (Wait To Restore time): it contains the value (east side) to provide to the NE during
the MS-Spring provisioning phase.
– Current User Command. The attribute indicates the command (none, lockout working west, lockout
working east, west ring force switch...) requested by the RM user.
• no command: null
N.B. the WTR has been put together with the possible active commands because, even
if it is not a user command, it can be cleared through a user command as well as the
others.
• exercise
• no command: null
• exercise
• no command: null
• exercise
• no command: null
• exercise
• inconsistent code
N.B. The protection status reporting screen is neither intended to display the status of the K1K2 sig-
naling, nor the status of the physical switches. With the 2F MS SP ring application, the
bridge&switch at multiplex section level always occurs at served nodes, whereas protection
channels pass-through is made by intermediate nodes. With the 4F MS SPring application,
bridge&switch at AU-4 level may take place at whatsoever node, depending on traffic distribu-
tion.
It should be noted that according to the MSSPring protocol rules any of the following scenarios may occur:
– no trigger is present, no protocol request (namely, K1K2 code other than noRequest) is signaled on
the ring;
– N (>1) triggers are present, N protocol requests are signaled, only 1 is served (higher priority);
– N triggers are present, N protocol requests are signaled and served (same priority);
– N triggers are present, N protocol requests are signaled, none is served (same priority, but not
allowed to co-exist).
– M (>1) triggers are present, N (<M) protocol requests are signaled, only 1 is served (higher priority);
– M triggers are present, N (<M) protocol requests are signaled and served (same priority);
– M triggers are present, N (<M) protocol requests are signaled, none is served (same priority, but not
allowed to co-exist).
(1) The Lockout of Working channels commands make the scenario even more complicated, as those
commands are not signaled but are actually served, in the sense that they influence the behavior
of the node to which they are addressed.
Two node icons are associated to the values of the ConfigurationState attribute of the MSSPRingProtec-
tionBlock:
– ConfigurationState = “virtual", icon
– ConfigurationState = “enabled", icon (not managed in this version release)
– ConfigurationState = “active", icon
When the ConfigurationState is “virtual" for a node (because the relevant T-FEP fails) an all-grey icon (the
virtual node icon) is displayed as a placeholder for that node, but no additional information can be dis-
played on top of that icon about that node (see Figure 690.).
The virtual node icon being displayed means that the MS-SPRING is not configured at the node.
When the ConfigurationState is either “enabled" or “active" for a node, the node icon shown in Figure
692.is displayed. Such an icon then acts as a background for all the icons associated to the attributes of
the MSSPRingProtectionBlock.
The node icon always reports the actual condition of the node in terms of the protocol role the
node is playing to react to the MS-SPRING triggers, and the external commands being stored to
the node. If the condition required by the RM and the actual node condition do not match, the “not
aligned" indication is displayed along with the node icon.
topology implementation
topology deimplementation
MS-SPRING activation
enabled active
MS-SPRING deactivation
The following table describes the rationale that drives the display of the various icons according to the
ConfigurationState state diagram (see Figure 691.).
The node icon is a rectangle plus arrows that represent the fiber optics to connect the nodes to each other.
Plus, the node icon features a number of rectangles (see Figure 692.) to hold icons associated to all the
attributes of the MSSPRingProtectionBlock MOC:
– the icon for the MidProtocolRole attribute;
– the icon for the WestProtocolRole attribute;
– the icon for the EastProtectionRole attribute;
– the set of six icons for the WestRingActiveCondition, WestSpanActiveCondition, WestRing-
PendingCommand, WestSpanPendingCommand, WestLockoutWorkingRing, and West-
LockoutWorkingSpan on the West side of the node icon;
– the set of six icons for the EastRingActiveCondition, EastSpanActiveCondition, EastRingPend-
ingCommand, EastSpanPendingCommand, EastLockoutWorkingRing, and EastLockout-
WorkingSpan on the East side of the node icon;
– the icon for the FailureOfProtocol to be placed outside the node icon next the bottom left and right-
hand corner;
The reason for providing each node icon with 6 icons for the local commands comes from the combina-
tions of active and pending commands that are allowed to coexist at each node.
The central rectangle with a black triangle in it - representing the NE - is the place where the values of
the MidProtocolRole are displayed (see Figure 693.).
When MidProtocolRole = “idle" and all other attributes are = “null", no additional icon is placed on top of
the node icon, so that all command-related rectangles still look gray - to show that no external command
is stored to the node, namely either active or pending - and the rectangles on the side of the central triangle
both looking green, to mean that both the East- and WestProtocolRole are in an idle condition, namely
the node is neither serving any trigger nor acknowledging a trigger to be served by some other node on
the ring.
Whenever the MidProtocolRole attribute changes from “idle" to another value, the icon associated to that
new value is displayed on top of the central rectangle with the black triangle in it.
Whenever either the East- and WestProtocolRole, or both, change to a value different from “null", the icon
associated to the new value (see Figure 694.and Figure 695.) are displayed on top of the designated
green rectangle.
Whenever any of the external commands is given to and stored by a node to go either active or pending,
the icon associated to the new value (see Figure 702.) are displayed on top of the designated gray rect-
angle
no icon
no icon
BLUE BLUE
no icon
tailHeadExrcRing thExRingProtUnav
BLUE BLUE
This attribute has icons (see Figure 696.) associated to each of its values to represent the various failure
conditions that may affect the K protocol. When a node detects a protocol failure in the incoming K bytes
on a given side, the relevant icon is displayed.
no icon
Each of these values is represented on the screen by an icon (see Figure 697.) located at the designated
position for this attribute, and pointing at the side of the node to which the command is addressed. Each
value other than null indicated either a command (forced, manual) given by the manager or a condition
(wtrRunning) automatically forced by the NE: each of those can be removed by the manager by the appro-
priate release command. Specifically, a release WTR command forces the WTR counter inside the NE
to immediate expiration.
Manual and Forced switch are represented by same symbol on different color, yellow and red respectively.
no icon
Each of these values is represented on the screen by an icon (see Figure 698.and Figure 699.) located
at the designated position for this attribute. Each value other than null indicated either a command (forced,
manual, lockoutProtection) given by the manager or a condition (wtrRunning) automatically forced by the
NE: each of those can be removed by the manager by the appropriate release command. Specifically,
a release WTR command forces the WTR counter inside the NE to immediate expiration.
Manual and Forced switch are represented by same symbol on different color, yellow and red respectively.
no icon
YELLOW RE CIAN
no icon
Each of these values is represented on the screen by an icon (see figure below) located at the designated
position for this attribute. Each value other than null indicates a command given by the manager and that
can be removed by the manager by the appropriate release command.
Manual and Forced switch are represented by same symbol on different color, yellow and red respectively.
no icon
Each of these values is represented on the screen by an icon (see figure below) located at the designated
position for this attribute, and pointing at the side of the node to which the command is addressed. Each
value other than null indicates a command given by the manager and that can be removed by the manager
by the appropriate release command.
no icon
no icon
no icon
no icon
– LP-S (Lockout Protection Span), SF-P (Signal Fail Protection), LOW-R (Lockout Working Ring),
LOW-S (Lockout Working Span); LOW-R, LOW-S LP-S
– EXER (Exercise)
EXCEPTIONS
3.7.2.10 Scenarios
This paragraph describes various ring scenarios , as shown in the graphical interface.
DESCRIPTION
A Bi-directional Signal Fail / Ring is present on A-B span. The relevant aggregate boards are affected by
LOS alarm.
Bi-directional Signal Fail / Ring on A-B span (indicated by RING INTERRUPTION (tailHeadRing) icons
on A-B span)
OPERATION
The traffic affected by the failure is recovered on protection channels away from the failure. All LP traffic
paths whose channels are needed to recover HP traffic are pre-empted.
HP traffic is maintained. LP traffic paths whose channels are needed to recover HP traffic is lost.
REPAIR ACTION
a) First execute the repair of the main span. HP traffic reverts to the main span while LP traffic still is lost.
1) Click on the alarm icon displayed on the main span. The alarm detail window is presented, giv-
ing the information needed to repair the span.
b) First execute the repair of the spare span, so moving to the Span switch scenario.The LP traffic not
overlapping HP traffic is restored.
1) Click on the alarm icon displayed on the spare span. The alarm detail window is presented, giv-
ing the information needed to repair the span.
The scenario after the repair of the affected spans is described at paragraph 3.7.2.12.
DESCRIPTION
The bi-directional Signal Fail / Ring on A-B span is cleared as a consequence of a repair action. The last
node detecting the signal failure clear starts the WTR ( wait to restore time )
Bi-directional Signal Fail / Ring on A-B span (indicated by RING INTERRUPTION (tailHeadRing) icons
on A-B span) is still displayed.
OPERATION
All nodes dropping/inserting HP traffic that was affected by the failure still recover it on protection channels
away from the failure.
All LP-traffic paths whose channels are needed to recover HP traffic are still pre-empted.
REPAIR ACTION
The WTR timer may be forced to expiration by RM via Clear WTR command. ( not implemented in this
version )
DESCRIPTION
Bi-directional Signal Fail / Ring on A-B span (indicated by RING INTERRUPTION (tailHeadRing) icons
Bi-directional Signal Fail / Ring on D-E span (indicated by RING INTERRUPTION (tailHeadRing) icons
All nodes dropping/inserting HP traffic that was affected by the failure still recover it on protection channels
away from the failure.
All LP-traffic paths whose channels are needed to recover HP traffic are pre-empted.
REPAIR ACTION
The scenario after the repair of one of the two faults is described at paragraph 3.7.2.11.
DESCRIPTION
Forced Switch / Ring command (indicated by tailHeadRing (RING INTERRUPTION) icons facing the A-
B span, and the FS/R icon pointing to the relevant node and side. This FS/R icon means that a command
is being served and may be removed).
OPERATION
All nodes dropping/inserting HP traffic that is traversing the addressed span is recovered on protection
channels away from that span (just like an SF/R affecting the same span).
All LP-traffic paths whose channels are needed to recover HP traffic are pre-empted.
REPAIR ACTION
DESCRIPTION
Forced Switch / Ring command given to A/East for A-B span and Forced Switch / Ring command given
to C/West for B-C span.
This scenario can be established to put node B in local maintenance condition.
Forced Switch / Ring command given to A/East (indicated by tailHeadRing icon facing the A-B span, and
the FS/R icon . FS/R icon means that a command is being served and may be removed).
Forced Switch / Ring command given to C/West (indicated by tailHeadRing icon facing the B-C span, and
the FS/R icon . FS/R icon means that a command is being served and may be removed).
OPERATION
Node B is isolated, as the two Force Ring commands partition the ring into two segment, [B] alone and
[C, D, A].
HP traffic that is traversing both the involved spans is recovered on protection channels away from those
spans.
All LP paths whose channels are needed to recover HP traffic are pre-empted.
REPAIR ACTION
After the completion of the local maintenance condition of node B, enter the Release Forced Switch / Ring
on nodes A and C.
Figure 709. Double Forced Switch / Ring to different nodes, node isolated
DESCRIPTION
Bi-directional Signal Fail / Ring on A-B span (indicated by tailHeadRing icons facing both the A-B span).
Bi-directional Signal Fail / Ring on B-C span (indicated by tailHeadRing icons facing both the B-C span).
OPERATION
Node B is isolated, as the two Force Ring commands partition the ring into two segment, [B] alone and
[C, D, A].
HP traffic that is traversing both the involved spans is recovered on protection channels away from those
spans.
All LP paths whose channels are needed to recover HP traffic are pre-empted.
REPAIR ACTION
a) Execute the repair of the main span. HP traffic reverts to the main span while LP traffic still is lost.
1) Click on the alarm icon displayed on the main span. The alarm detail window is presented, giv-
ing the information needed to repair the span.
DESCRIPTION
This command is used when the A-B main span requires a local maintenance.
Forced Switch / Span command (indicated by “tailHeadSpan" icons facing the A-B span, and the FS/S icon
pointing to the relevant node and side).
OPERATION
Nodes A and B recover on the protection channels the traffic traversing the involved span (just like an SF/
S affecting the same span). The only channels that are bridged and switched by A and B are those that
actually carry traffic over A-B.
All LP-traffic paths whose channels are needed to recover HP traffic are pre-empted.
REPAIR ACTION
After the completion of A-B main span local maintenance the Release Switch Span West can be entered.
DESCRIPTION
OPERATION
Forced Switch / Ring command is pending (actually it is higher priority than the SF/R, but it cannot be
served because the protocol fails to complete on the long path).
REPAIR ACTION
Figure 712. Signal Fail / Ring pending, Forced Switch / Ring pending
DESCRIPTION
It is a double fault service affecting. The fault between A and B nodes (SF-P) has priority greater than the
fault between C and D nodes (SF-R)
Bi-directional Signal Fail on Protection (indicated by “protection unavailable" icons facing the A-B span)
OPERATION
Bi-directional Signal Fail / Ring is pending (it is lower priority than the Signal Fail /Span), affected traffic
is not recovered, all LP-traffic remains.
DESCRIPTION
OPERATION
The Exercise command does not affect the traffic carried by the NPE ring
DESCRIPTION
OPERATION
The Exercise command does not affect the traffic carried by the NPE ring.
The Consistency Audit activity verifies the misalignments between the EML and the NML. This activ-
ity does not perform any corrective actions.
The Consistency Audit activity is required if the operation launched by 1354RM fails on EML.
a) Activate the Network Consistency Agent. (Set Run Level=3 from Monitor application)
1) Global
2) PDHPort NAP
3) SDHPort MStp
4) at HO/LO level
The option Global causes the execution of all the remaining checks from 2) thru 4).
The reporting of the operations is performed using multiple messages in order to display the current state
of the ongoing operations (number of not aligned objects, etc...) Otherwise from the Browser the mis-
aligned objects (tps) can be displayed by selecting the NE and issuing Display: Related items: All Mis-
aligned Objects.
The Consistency Download activity verifies the misalignments between EML and NML and aligns EML
data to RM data.
1) Global
2) PDHPort NAP
3) SDHPort MStp
4) at HO/LO level
5) Performance Monitoring (Only for Download)
The option Global causes the execution of all the remaining checks 2) thru 4).
e) Execute checks on an eventual EML-NE misalignment. From browser point to the Node icon and
issue Display: Related items: Alarmed Objects, to verify the presence of a Configuration Mismatch
alarm
MISALIGNMENT INDICATIONS
2) From the NE list select the misaligned NE and issue Consistency Audit: Global
In addition, the errors are located at NE level, because are traffic affecting.
Due to the fact that the wrong data are localized at NE level, it is necessary to execute a download
of the data from 1353NM to the involved NE.
1) From 1353NM map window select the NE and issue: Operations:Supervision: Stop....
2) At this point the NE is no longer supervised. Execute NE: Supervision: Align down
6) From the 1354RM map the user can verify that the disalignment ceased
a) From 1353NM select the involved NE and issue Supervision: MIB: Compare
c) From the Compare dialog box NE-1 is misaligned with respect to 1353NM.
8) From the NE list select the misaligned NE and issue Consistency Audit: Global. The example
which follows reports an example of audit report on connections (at Lo / Ho)
The 1353NM MIB is misaligned with respect to 1354RM MIB and 1353NM MIB is misaligned
with respect to the NE MIB, then the problem is located in 1353NM MIB.
Due to the fact that the wrong data are localized at NM level, it is necessary to execute a download
of the data from 1354RM to 1353NM
The operator is able to specify for TSD-IM NEs the download disabled / enabled mode (download enabled
mode is the default condition)
When a NE is in “download - disabled" mode, all changes are buffered in the RM MIB, being not sent to NE.
Objects in the RM MIB that, as a consequence of the download disable mode, are not aligned with the
NE, are “marked” with the value of the consistency status attribute (“not aligned").
When the download disabled mode is removed and the NE is reachable, RM data are downloaded to NEs.
If the download disabled mode is removed and the NE is not reachable, the operation is rejected.
If problems are detected during the download, the NE is put in “isolation” mode.
During the “downloading" activity on a given NE, all concurrent operations requested by RM operator and
involving the same NE are rejected.
RM is able to detect not reachable NEs as a consequence both of problems in the EML, in the DCN or
in the NE.
When a NE is in “download enabled" mode and is not reachable, RM behavior is similar to the one
described for the download disable mode.
Elementary alarms are correlated to the impacted transport entity allowing a better identification of the
transport entity impacted by the isolation problem.
The recovery from the isolation is detected by means of a slow polling performed by RM on the “isolated"
NE.
During downloading activity, the same considerations made for download disable to download enable
transition are applicable.
The OS isolation alarm received by NM and the NM isolation alarm detected by mean of a slow polling
performed by RM are reported as alarms at the RM user interface.
The operation is available when the NE is not isolated and in download enabled mode. If the communi-
cation is lost during the download, the operator is informed at user interface and the NE is left in the down-
load enabled mode; when the communication is resumed no automatic re-start of the consistency
download is performed.
The objective of this feature is to verify the alignment between NE and RM Mib.
The operation is available for TSD-IM NEs while the RM system is in normal online run-level.
– Mark :
differencies are “marked". These differencies will be taken into account and downloaded during the
operations of enabling the download and isolation recovery.
– Notify:
differences are “marked" and wil be not taken into account during the operations of enabling down-
load or isolation recovery.
The consistency audit is available on the NE, only if the NE is not isolated and the 1354RM is in Download
Disable mode.
Objects impacted by the consistency audit are RM elementary objects like ports, single TPs, subnetwork
connections, ...
All current operations on the NE must be completed before serving the transition.
RM elementary objects are taken into account by layers in a server to client order: physical ports, NAPs,
MS-TPs, HO-CTPs, HO connections, HO-TTPs, LO-CTPs, LO connections.
All the current operations on the NE must be completed considering the NE unreachable even if the state
changes again before the end of the current operations.
All the current operations on the NE must be completed before serving the transition. For these operations
the NE has to be considered as still in download enabled.
This feature allows to present the list of RM objects not consistent with the NE one's.
An object can be not consistent due to the misalignment of one or more attributes. For each attribute the
following information are presented :
– object class
– user label
– attribute: attribute of the object that causes the not consistency
– error type: reason of the in-consistency
– date
The user label field contains the user label of the object with the following exceptions:
The user can choose, using two different commands, to display a global or a restricted list of the objects.
– ne
– port (sdh)
– msCtpCap
– msProtBlock4f
– ctp-ho
– port (pdh)
– nap
– au4RTM
– cap
– ctp-lo
– connInTopol
– pmTp
The allAttributes value is used when it is not possible to determinate the attribute that caused the incon-
sistency.
– On the 1354RM a node is misaligned. ( From the map or from attibute NENOTEMLALIGNED on
the NE list)
SEQUENCE
c) Select NE: Search all related objects: (Not Aligned) Misaligned Objects.
The following table gives an overall mapping of the values of consistency status and consistency activity.
Consistency Semantic
Status
Failed to align The operator can click on the Consistency Status icon, thus displaying the
report identifying the RM failed operation, i.e. the not aligned attributes and the
causes of themisalignment
– Path Trace
– Tandem Connection
The mechanism of section trace identifier ( byte J0 of the RSOH-Regenerator Section OverHead ) is used
to control the continuity of the trail in the regenerator section.
Trace Identifier is supported by ADM and DXC NEs according the following rules:
The operation is not allowed if the port belongs to a virtual NE (external network reference), even if the
user can perform the operation on the other involved physical port.
CONDITIONS
SEQUENCE
a) To configure the Section Trace Identifier, the user has to point to the involved physical connection
and issue the menu Configuration: Trace Identifier: Set/Modify/Read. See Figure 727.
c) In this step the user can select either Set/Modify or Read the Section Trace Identifier. Select Set /
Modify. The Section Trace Identifier wizard: Step 2 is displayed. See Figure 729.herebelow.
– Enabling/disabling of the Trace Identifier mismatch detection. It specifies if the detection of the Trace
Identifier mismatch is enabled or disabled
N.B. Expected Trace Identifier value may be different from Sent Trace Identifier if regenerators are
present along the physical connection.
d) To prevent traffic loss the user has to perform the configuration operations in the following sequence:
1) Disable the Trace Identifier mismatch detection by setting to FALSE the Expected Trace Iden-
tifier Enabling
3) Configure the Sent value of the other port to the desired value
5) Open again the Section Trace Identifier wizard on the same physical connection and Enable
the Trace Identifier mismatch detection of the previously disabled port by setting to TRUE the
Expected Trace Identifier Enabling
SCOPE
The user can ask to read the values of the received Trace identifier on the physical connection if the trace
identifier handling has been enabled on the related port.
a) To read the Section Trace Identifier, the user has to point to the involved physical connection and
issue the menu Configuration: Trace Identifier: Set/Modify/Read. See Figure 727.
c) In this step the user can select either Set/Modify or Read the Section Trace Identifier. Select Read.
The Section Trace Identifier wizard: Step 2 is displayed.
The mechanism of trace identifier ( byte J1 of the VC-4 / VC-3 or byte J2 in the VC-12 ) is used to control
the continuity of the trail / path.
c) Enter the desired values for Sent Trace Identifier ( max 15 characters ) and click on Finish button
to confirm.
The end point of the transport (path/HO-trail) can be configured to send in the ongoing/egressing direction
a so-called trace identifier. The trace identifier is put into the byte J1 for 140Mb/ 34Mb or J2 for 2Mb.
OPERATION
The trace identifier sent at the end points in the two directions (one for unidirectional paths) can be com-
pared with the expected value programmed by the OS on end and intermediate points in the ingressing/
egressing direction. If a mismatch is found as a consequent action the client layer (e.g. PDH) , will receive
AIS.
The trace identifier can be monitored also in the intermediate points of the transport entity in the ingressing
and/or egressing direction. Also in this case the received Trace Identifier can be read. If the expected value
is programmed, an alarm can be generated.
CONDITIONS
SEQUENCE
The Send Trace Identifier can be defined/changed only for an already created path/HO-trail.
SEQUENCE
a) From the path list open the path pop-up menu and select Path: Configuration: Trace Identifier. See
below figure.
c) Click on Next button. The Trace Identifier wizard displays step 2 dialog box, ( see below figure ), ask-
ing the operator to enter the sent Trace Identifier for Source and sink TP
CONDITIONS
DEFINITION
The Path Trace functionality is supported at least by the "source" end point (if the value of the "support-
edPathTrace" attribute of the "source" end point is "unknown" the Path Trace Identifier definition is
refused). If the Path Trace functionally is not supported by the "sink" end point, the operation is accepted
to allow, eventually, the management of the functionality in the intermediate points (if supported)
SEQUENCE
The user, on the path/HO-trail routing display. selects a single CTP/NAP where the TIM ( Trace Identifier
Mismatch ) alarm is present. Choosing the "Read received Trace Identifier" , the user will see, after the
NE response, the Received and the Expected Trace Identifier.
The Tandem connection is a mechanism defined in SDH and OTN that makes use of:
Tandem Connection Monitoring points (TCM) on intermediate CTP's of the Tandem Connection
– The collection of performance data (15 minutes unidir. and 24 hours unidir. and bidir. ) on end points
(TCT) and on intermediate points (TCM) of the TC.
– The handling of protections inside the TC not affected from external faults (SNCP/S)
FUNCTIONAL DESCRIPTION
A tandem connection represents the part of a path/HO trail that requires monitoring independently from
the monitoring of the complete path/HO trail.
Tandem connections may be directly monitored at one end by writing and reading a portion of the original
trail's overhead.
Tandem connections cannot be overlapped in SDH while 6 levels of TCM are defined for the OTN in G.709.
PROCEDURES
SCOPE
The scope of this procedure is to define a Tandem Connection; starting from a path/trail, the user can
select a single TP (NAP/CAP or CTP) and specify:
– Including Matrix" or "Excluding Matrix" for TCT. In particular, NAP' s and CAP' s can only support
"Including Matrix" TCT
– The enabling or disabling of the consequent action (i.e. the enabling or not of AIS insertion in case
of TC problems).
CONDITION
The definition is possible only when the path/HO trail is at least allocated and it is lost when the path is
de-allocated.
OPERATION
The performed checks are related to unidirectional paths only and are the following:
• An "Ingressing" TCM cannot be instantiated below a CTP with "sink" role in the cross-connection
Following the definition of at least one TCT or TCM, on the using path/trail, an attribute specifies that a
manual TCM have been enabled.
Where possible, restrictions at NE level, should be taken into account during this definition phase.
– The support in the same TP, of TCT with more than one direction (e.g. it is not possible to have two
TCT's, before and after matrix on the same AU4 for starting and ending two different tandem con-
nections in the same TP).
– On SDH it is not possible to instantiate a TCM and a TCT on the same TP, on OTN it will be possible
at different levels
TCT and TCM are managed as new classes contained in NAP's, CAP's and CTP's.
Once created TCT and TCM have a configuration state set to defined.
The system automatically sets the ASAP OF TCT/TCM according to the following rules:
– For a unidirectional path, the ASAP of a created TCT is set depending on both the role of the related
CTP in the connection and the TCT direction ("Including Matrix", "Excluding Matrix"), i.e. is set
according to the following table
(*) "All disabled" in order to not detect the Unequipped alarm in the not used sink direction.
The user can ask for the automatic definition of TC for a path or a HO trail.
SEQUENCE
a) To open the pop-up menu, point to the path icon from the browser window or select the path from
the path list and press the right mouse button.
b) Select Configuration: Tandem Connection. The Tandem Connection Management wizard opens.
See Figure 738. herebelow.
The possible actions you can select from the radio buttons box are:
• Creation
• Implementation
• Deimplementation
• Removal
c) Select option Creation and Creation modality. You can select between AUTOMATIC and MANUAL.
If you select AUTOMATIC the system creates TCTs on NAP/s and boundary CTP/s. If
you select MANUAL, you will select the termination points
d) Tandem Connection create-step 2 allows to select manually the TPs. By clicking on the selection but-
ton, the selection list is presented, as per Figure 740.herebelow. The upper selection button allows
to select the point/s on which TCT /s is/are to be defined. The lower selection button allows to select
the point/s on which TCM/s is/are to be defined.
e) Select the termination point and click on Apply. The icon of the selected termination point is displayed
– Including Matrix" or "Excluding Matrix" for TCT. In particular, NAP' s and CAP' s can only support
"Including Matrix" TCT
– The enabling or disabling of the consequent action (i.e. the enabling or not of AIS insertion in case
of TC problems).
In case of TCT implemented, the operation (Enabling consequent action) may affect the traffic.
If the consequent action is not enabled, the far end counters are not managed both for TCM and TCT.
SEQUENCE
a) Point to the path icon and select path routing display. Notice that a graphical flag is drawn in corre-
spondence of the path icon. See below figure. In
addition, dedicated flags are shown for TCT and TCM .
Starting from a path, it is possible to visualize the list of TCM or TCT: select the path from the path list and
issue Search: Related Items: TCM/TCT list. see following figure.
In addition, in the NAPs view, a NAP involved in a Tandem Connection is marked by a dedicated icon.
See below figure.
The user can manually implement (i.e. create in the NE) TCT and TCM through a manual command to
be issued on single TCTs and TCMs. The single TCT/TCM must be defined; if not, the command is
refused.
Once created in the NE, the TCT or the TCM takes the configuration state equal to implemented.
If, at creation time, the NE provides a KO specifying that the TCT/TCM service is not supported, the TCT/
TCM consistency state is set "failed to align" with error type "feature not supported". The user will manually
de-implement and remove TCT/TCM .
The user can manually implement all the defined TCT's and TCM's through a manual command to be
issued at path/trail level. The Path/HO trail must be implemented; if not, the command is refused.
Please refer to the above Manual Implementation of TCT and TCM for each TCT/TCM implementation
activity inside the system.
The user can manually de-implement TCT and TCM through a manual command to be issued on single
TCTs and TCMs. The single TCT or TCM must be implemented: if not, the command is refused.
Once removed in the NE, the TCT and the TCM takes the configuration state equal to defined.
If the consistency state of the TCT/TCM was "feature not supported", no removal is performed towards
the NE.
This operation requires also an interaction at TCT/TCM level with the management of Performance Mon-
itoring (see SDH/PM section)
The user can manually de-implement all the TCTs and TCMs through a manual command issued at path/
trail level. Path/HO trail must be implemented: if not, the command is refused.
SEQUENCE
The TCT/TCM to be removed must be in the defined state. If the removal is performed in "download dis-
able" mode, the information of misalignment with respect to the NE will be reported on the related TP
All the flags on TP's and path/HO trail are updated in a consistent way.
N.B. When a path/HO trail (or a portion of it) is de-allocated, the defined TCTs and TCMs are auto-
matically removed.
All the flags on TP's and path/HO trail are updated in a consistent way.
The user can ask to enable or disable the monitoring function on the intermediate points of a path/HO trail.
By default when a path/HO trail is implemented, the monitoring function on intermediate points is disabled.
– The instantiation of the POM (Path Overhead monitoring function) on intermediate CTP's (both
egressing and ingressing according to the real availability in the NE and the path directionality)
– The enabling of all alarms on the intermediate CTP's (LOP, AIS, etc.).
When the monitoring function on intermediate points is disabled, alarms and Overhead Monitoring capa-
bility is only enabled on Nap's and on boundary CTP's.
This functionality is targeted to perform the needed troubleshooting on a not working or not properly work-
ing path/HO trail.
The user should limit the use of this functionality in order to not overload the system
This functionality is now intentionally disabled for SNC intermediate points in ASON. The reason
is that those CPTPs are directly managed by GMRE (ACD= G$ ), so RM cannot manage them.
The user can only ask to enable this functionality when the path is totally or partially implemented (not com-
missioned).
The system enables the monitoring function only on intermediate CTP's belonging to QB3 NE's. QB3*
NE's are not taken into account.
If the path/HO trail has the Trace identifier enabled, the expected trace identifier is set also on intermediate
points according to the type of the path.
The alarms received on POM functions and on CTP's are NOT propagated to the paths and are only used
to give information to the user. The main graphical view to be used for troubleshooting is the path/HO trail
route display.
The enabling status of this functionality is represented by a global attribute of the path/trail. To be noted
that the value enabled is only referred to the NE's supporting the functionality and it has in general the
meaning of "where possible".
When a path is de-implemented the monitoring function on intermediate points is disabled first.
The inter-working between Trace identifier management, alarm enabling/disabling on paths/HO trails,
monitoring function on intermediate points, is giving from the following table
– How to enable POM on a path, by pointing at the path icon and issuing the following command:
Path: Configuration: POM on Ctps: Enabling
– Trace Identifier read on a certain CTP, by issuing the command Trace Identifier: Read.
– No Loop
Figure which follows shows the Manage Loop pop-up menu available on NAP.
In this case, as shown in the following figure, on the port corresponding to the first NAP a line loop is exe-
cuted. AIS signal is sent toward the network, detected by the far end NAP and sent back.
The NAP loopback status can be shown via Show/set Attributes of the involved NAP. see below figure.
In this case, as shown in the following figure, on the port corresponding to the first NAP a loop is executed
toward the network. No alarm is detected by the network, while AIS signal is sent on the line and detected
by the client 2 Mb equipment.
The NAP loopback status can be shown via Show/set Attributes of the involved NAP.
N.B. From RM Rel.7.4.E on the KO response from the NE is correctly managed, in case the loop-
back functionality is not supported by the NE itself.
Up to now, if the loopback functionality is not supported by the NE, the loopback, even if not per-
formed on the NE, is present on RM and the remove loopback command has to be performed in order
to remove the loopback itself from RM.
The feature allows the management of the KO response from the NE, in case the loopback func-
tionality is not supported by the NE itself. In particular:
the loopback is stored in RM only if it has been successfully executed on he NE (i.e. only when the
OK response from the NE is received by RM)
if the NE or the related EML is not reachable, the loopback command is refused and a warning is
provided to the user
– Set
– Remove
Figure which follows shows the Manage Loop pop-up menu available on CTP. Point to the CTP and issue
Internal Loopback: Set to setup the loop or Internal Loopback: Remove to remove the loop.
In this case, as shown in the following figure, on a CTP a loop is executed toward the network. AIS signal
is sent toward the network and detected by the connected NAP.
Events which manage the switch position have a priority mark; in particular Forced SNCP commands have
priority greater than failure events, while failure events have priority greater than Manual SNCP com-
mands.
SEQUENCE
a) From the browser window, e.g. from the Routing display, point with the mouse at the path icon and
open the Manage SNCP pop-up menu. It is possible to obtain this menu by selecting the path icon
and selecting the Actions:Manage SNCP pull-down menu. The Manage SNCP menu allows to fur-
ther select between:
• Synchronize. This command retrieves the actual switch status of the B & S connections from
EML.
• Lockout. This command either locks( forces ) the path/switch to the main route if a Set Rever-
tive command has been previously entered or locks the path/switch to the actual position if a
Set not Revertive command has been previously entered.
• Force Main . This command forces the path on the main route. The path will remain on the main
route even in case of failure. This condition can be modified only by means of the Release com-
mand.This command is available for all types of Network Element.
• Force Spare . This command forces the path on the spare route. The path will remain on the
spare route even in case of failure. This condition can be modified only by means of the Release
command. This command is available for all types of Network Element.
• Manual Main . This command switches the path to the main route. The switch is rejected in
case of failure and if a previously issued Force/Lockout command is active. The Force/Lockout
condition can be cancelled by means of the Release command.
• Manual Spare . This command switches the path to the spare route. The switch is rejected in
case of failure and if a previously issued Force/Lockout command is active. The Force/Lockout
condition can be cancelled by means of the Release command.
• Set Revertive. This command causes the path to revert to the main route after the repair of the
involved objects. The Wait to restore time parameter is managed at Equipment layer. This com-
mand is available for all types of Add and Drop Multiplexers; it is not applicable to 1641SX cross
connect.
• Set not Revertive. ( default ) The path does not revert to the main route after the repair of the
involved objects. This command is available for all types of Add and Drop Multiplexers; it is not
applicable to 1641SX cross connect.
– C service. It means that the switch ( only for D & C ) is turned to the service position
The last operation executed on the switch can assume the values:
The Revertive operation mode icon is present if the switch has been set to Revertive.
b) After the execution of a Manage SNCP command a report is forwarded to the operator.
See Figure 759.
N.B. For a SNCP trail the same commands apply. Notice that The trail can be terminated with an
SNCP connection only in case of 1661SMC equipment with Enhanced connectivity (able to cre-
ate an SNCP connection with grooming). Otherwise the trail must utilize an unprotected phys-
ical connection and create the SNCP connection in another NE.
SPARE
LO-LCs
LO-CTPs
LO-CTPs
MAIN
SPARE
LO-LCs
LO-CTPs LO-CTPs
MAIN
In case of fiber breaks, the APS for 2F MS-SPRING uses a synchronized sequence of 'bridge' and 'switch'
operations that modify the internal connections of the two NEs adjacent to the failure.
The 'bridge' operation on the East (West) side has the effect of routing the outgoing high priority
West (East) traffic also to the outgoing protection East (West) capacity.
When a 'switch' operation is in effect on the East (West) side, all of the connections that have
as a source an Au4 belonging to the West (East) working capacity are replaced by connections
that have as a source the incoming East (West) protection traffic.
when one end of a connection is modified from working traffic to protection traffic, the Au4 of the protection
traffic that replaces the Au4 of the working traffic has an index that is always (n/2) greater (i.e., in case
of Stm16 aggregates, the Au4 #2, is substituted by the Au4 #10, where 10 = 2 + (16/2) ).
Note that the 'bridge' and 'switch' operations on the same side can co-exist (this is the typical case,
indeed): since they affect different class of connections, the final configuration is given by the sum of the
two.
W E W E
W E W E
protection
BEFORE working AFTER
W E W E
protection
BEFORE working AFTER
W E W E
W E W E
protection
BEFORE working AFTER
W E W E
protection
BEFORE working AFTER
In case of failure of a span, the failed span is replaced with the capacity of the protection traffic of the spans
not affected by the failure (note that the protection switching can also be triggered by a command issued
by the OS, as will be described in the following). This situation is the result of the following sequence of
steps, synchronized via a protocol that uses the byte K1-K2 of the MSOH;
1) The node that detects the failure (Tail End), sends a Bridge Request to the node that is adjacent
along the direction where the failure is present (that becomes the Head End): this Bridge
Request is sent on both the long and the short path.
2) The intermediate nodes substitute all of the connections pertaining the low priority traffic with
bypasses among the two aggregates.
3) When the Head End receives the Bridge Request on the short path, it sends back to the tail end
a Reverse Request on the short path and a Bridge Request on the long path.
4) When the Head End receives the Bridge Request also on the long path, it performs a ring Bridge
and sends to the Tail End, on both paths, the notification of this new status
5) When the tail end receives, on the long path, the bridge request from the Head End it performs
a ring bridge and sends the notification of this new status to the head end, using both paths.
6) When the tail end receives, on the long path, the notification of the execution of the bridge on
the head end, it performs a ring bridge and switch and sends the notification of this new status
to the head end, using both paths.
7) When the head end is aware of the bridge and switch activated on the tail end, via the report
of the bridge status on the long path, it performs a switch, so that both ends are now in bridge
and switch
When a protection switch is in effect, all of the protection capacity is used to recover the working traffic;
in this situation no low priority connections can be established on the protection capacity and it is required
that, in order to avoid mis-connections, all of the tributaries that terminate a low-priority connection output
an AIS signal (this operation is called 'squelching').
After the failure has been removed, a similar sequence of operations is performed by the head and tail
end; if the failure was single, the reverse procedure can starts after a specified time interval, called Wait
Time to Restore (WTR).
The following diagrams depict the sequence of operations that occur in a six-nodes ring when a single
failure (signal degrade, in this case) occurs on the fiber that carries the traffic from node '2' to node '3'.
Figure 766.depicts the initial situation, where a tributary at node '1' is connected with another tributary at
node '4', using the clockwise direction for the path going from node '1' to node '4' . The remaining capacity,
both working and protection, is used to source and terminate unequipped VC between the adjacent nodes.
Tributary
e w w
w e
1 2 3
6 5 4
e w
w e w e
Tributary
Working Channels
Protection Channels
e w w
w e
1 2 3
6 5 4
e w
w e w e
Bridge
Working Channels Tributary
Protection Channels Switch
A squence of bridge and switch operations occurs. The final configuration is shown in Figure 767.
With some classes of multiple failures, some nodes in a 2f MS-SPRING could be isolated, i.e. unreachable
by the other nodes. When a node is unreachable, it can be demonstrated that, due to the bridge and switch
operations that are performed by the ring itself, some tributaries could be misconnected, i.e. connected
to the wrong source or destination. In order to avoid this effect, a technique called SQUELCHING consists
in the injection of an AIS signal on the VCs that come from or go to an isolated node.
The squelching technique requires that two different squelching actions are taken on the HVC and on the
LVC. The HVC are squelched only at the switching nodes, i.e. at the nodes that perform bridge and switch,
while the LVC are squelched where they are terminated. Furthermore, a different squelching action is
taken on the HVC according if they are 'accessed at the LVC level' or not; in detail, if the VC4 is composed
of VC12 that are terminated at different nodes, the squelching performed at the switching nodes must be
removed after the final bridge and switch state has been reached: this is necessary in order not to loose
LVCs that would be otherwise unnecessarily squelched.
When a 2f MS-SPRING is interworked with another ring (either SNC/I or MS-SPRING), the interconnec-
tion of the two is performed by connecting two pair of nodes per ring with HVC connections, as shown
in the following figure.
Each VC4 that has to cross the ring boundary (only HVC level ring interconnections are considered here)
must be output by two nodes, one of which, the primary service node (PSN) drops it and continues to the
secondary service node (SSN). In the opposite direction, the SSN inserts a copy of the VC4 into the ring
and the PSN selects between the VC4 coming from the SSN and the VC4 that can be locally inserted.
The selection is performed on the basis of the path-AIS.
The protection mechanism works on the hypothesis that the other ring selects one of the two version of
the incoming VC4 and transmits two identical copies of the VC4 towards the PSN and the SSN (this is
guaranteed if the other ring is an MS-SPRING or an SNC/I ring).
Note that the PSN and the SSN need not to be adjacent and need not to be the same for all of the VC4
that cross the ring boundary: i.e. each crossing VC4 has two associated nodes that act as PSN and SSN.
It is also possible to connect two rings at more than two points, but this is usually unfeasible with the normal
ring topologies and has not been considered here.
This document does not address the case where the VC4 that crosses the boundary is terminated at its
primary service node.
2f MS-SPRING
Primary Secondary
Service Service
Node Node
SNCP or MS-SPRING
The APS Controller blocks need a set of configuration information for properly execute their functions.
First of all, the APS Controller must know whether it shall operate or not, e.g. because the ring is protected
with a different strategy: this information will be called 'APS Controller enabling' and can be considered
as a binary value (enabled or disabled).
APS Controller must be explicitly activated to exchange K1 and K2 bytes with the other N.E.; also this
information can have only two values (activate or inactive). Note that an enabled but inactive APS Con-
troller is in a well defined state, which corresponds to a particular set of transmitted K1-K2 bytes, 'default
APS bytes'; It is required that the 'default APS code' on K1-K2 is a pattern of 'all zeroes'
An enabled APS Controller (even when it is inactive) needs to know the 'node identifier' of the N.E.
where it is operating; the node identifier is a number in the range 0 through 15, and is unique within
the ring.
An enabled and active APS controller must be aware of the topology of the ring, i.e. of the
sequence of nodes (ring map) that is encountered when traversing the ring in a specified direction
(e.g. clockwise); the crossed nodes are identified by their 'node id' and may not be more that 15 (the total
number of N.E. in a 2F MS-SPRING is 16) neither less than 2.
A final parameter that must be known by the APS Controller is the Wait Time to Restore value; this value
may range from 0 to, at least, 15 minutes (a step of 1 minute is accepted);
The 'HpSq' block needs to receive two sets of 'squelching tables' that contain some routing information
that is necessary to properly identifiy where and when inject AIS.
The first set is composed of four tables that will be called, in the following, 'VC4 squelching tables'. There
is a VC4 squelching table for each aggregate input and output of the network element. The structure of
the four tables is identical: for each incoming (or outgoing) High Priority Au4 (i.e. Au4 1..2 for the Stm4
and Au4 1..8 for the Stm16) the table must contain the source and the destination nodes of the transported
VC4; note that, in case of ring interworking, the VC4 can have two source nodes . It is also allowed for
a VC4 to have multiple destination nodes (up to 15 in the worst case). It can be demonstrated that only
one source and one destination node is necessary for the VC4 squelching tables, namely the farthest
source node and the fartherst destination node.
If a VC4 contains LVC that have different source or destination nodes, the VC4 squelching table must indi-
cate this situation: for this field a binary value is enough.
If a fixed size table is chosen, the size of each row of each VC4 squelching table is 9 bits, where this num-
ber is obtained by adding 4 bits for the source node identifier, 4 bits for the destination node identifier and
1 bit that indicates whether the VC4 is accessed at the LVC level or not. Multiplying the row size and the
number of rows and the number of tables, the final value of
is obtained
The second set of squelching tables contains, for each terminated LVC, the indication of the source node
of the LVC itself. Also in this case an LVC may have two source nodes that musy be indicated in the table,
regardless of which is the primary and which is the secondary). In the worst case (8 VC4 structured as
63 TU12, all with double source) the following total size is obtained:
As said before, the VC4 squelching tables have to be provided to all of the nodes of the ring, while the
LVC tables are required only at the nodes where LVC traffic is terminated.
In order to explain with the sufficient detail level, an example of squelching table computation is presented.
In the following figure, a 7 node ring is considered, where the node id are represented by capital letters
from A to G. Five connections are supposed to exist, three regarding VC12 and two regarding VC4:
– VC12 #1 of VC4 #1 is supposed to be inserted at node A into the VC4 #1. The exit point of this VC12
is node G. Due to the connectivity restrictions, the VC12 will have not changed neither the TU12 nor
the Au4 along the path.
– VC12 #2 of VC4 #1 has two sources, due to the ring interworking: node B is the secondary service
node, while node C is the primary. The destination node is F. Vc12 #2 always occupies the TU12 #2
of the VC4 #1 that is transported into the Au4 #1.
– VC12 #63 of VC4 #1 has one source node, E, and two destination nodes, namely F and G: i.e. this
is a point-to-multipoint connection. The Vc12 #63 always occupies the Tu12 #63 of a VC4 that always
occupies the Au4 #1.
– VC4 #8 has two sources, A and B, respectively the secondary and primary service nodes, and has
two destination nodes, E and F.
WEST EAST
A B C D E F G
VC12 #1
VC4 #1 VC12 #2
SS PS
VC12 #63
VC4 #2
VC4 #8
SS PS
The VC4 squelching tables for the nodes represented in the example are listed in the following. Note that
a VC4 containing LVC is terminated each time an LVC is inserted and or dropped, so that the only node
where the VC4 #1 is not terminated is node D.
Node A
VC4 #1 A G YES
VC4 #2
VC4 #8 A F NO
Node A
From:
Node B
VC4 #2
VC4 #8 A F NO A F NO
Node B
From:
Node C
VC4 #2
VC4 #8 A F NO A F NO
Node C
From:
Node D
VC4 #2
VC4 #8 A F NO A F NO
Node E
VC4 #2 E G NO
VC4 #8 A F NO A F NO
Node E
From:
Node F
VC4 #2 E G NO E G NO
VC4 #8 A F NO
Node F
From:
Vc12 #2 of VC4 #1 B, C
Node G
VC4 #1 A G YES
VC4 #2 E G NO
VC4 #8
Node G
From:
Vc12 #1 of VC4 #1 A
Implementation, de-implementation and removing can only be performed on the complete ring and not
on single connections.
The payload configuration activity after ring implementation creates only 8 AU4s and any change of the
payload configuration requires the specification of 8 AU4s.
– synchronize
– release
– force east, west
– lockout east, west
– manual east, west
– Switch position (displayed on main view) : unknown, idle, bridge east or west, bridge & switch east
or west, pass through
– Switch cause (displayed on main view) : Failure, Restoration, Operator Request, None, Unknown.
– Active Operator Command : Release, Lockout, Force, Manual, None.
– Pending Operator Command : Release, Lockout, Force, Manual, None, Synchronize. It is the com-
mand under execution. It is set to "none" when the answer (OK or KO) is received from the EML.
At the beginning all the switch positions and switch causes are set to unknown, the pending is set to none.
After a parametric time T1, the managing process performs a synchronization for a parametric number
N of switches with the position set to unknown (i.e. not yet synchronized manually or through an event).
After another parametric time T2, the operation is repeated with another set of N "unknown" switches. Dur-
ing this automatic synchronization, the pending command of the switches under operation is set to Syn-
chronize.
A view of all the MS Protection Blocks in a MS-SPRing is available in the browser. To display this view,
execute the following procedure:
a) From the browser point with the mouse at the network and open the pop-up menu. Select item
Search: All related items... ( see Figure 770.)
b) From the selection box select item NPAs and click on OK button. The NPA drawing window is dis-
played.
All the HO SbnConn's belonging to HO-Paths and HO-Trails in MS-SPRING topologies include squelch-
ing Information (4 values : West - Src / West Dst / East Src / East Dst end Nodes Identifiers). Squelching
Info are also set for the connections between HO-TTP and HO-CTP.
The management of the protection is done by the EMLs. On RM side, only the presence of the protection
is displayed to the operator.
In addition to the alarm already foreseen in case of failure on both the fibers involved in the linear MS pro-
tection, a new alarm is emitted at SEN-IM level also when a failure on a single fiber will occur. This will
warn the operator on the reduced degree of protection.
A view of all the MS Protection Blocks in a MS-SPRing is available in the browser. To display this view,
execute the following procedure:
a) From the browser point with the mouse at the network and open the pop-up menu. Select item
Search: All related items...
b) From the selection box select item NPA and click on OK. The NPA list is displayed.
c) Point to the 4-F NPE RING NPA and click on NPA view button. The NPA view is displayed.
d) From each protection block it is possible to issue the ring switch and span switch commands.
The effect of the Span Switch and Ring Switch operations is described in Section Technical Annexes, NPE
ring.
The above mentioned commands are mainly used for maintenance purposes. See Section MAINTE-
NANCE, Chapter 4 Diagnostic of the NPE Ring.
3.11.1 Introduction
The aim of the Performance Monitoring at RM side is to allow the user to monitor transport objects, i.e.
the objects path and trail. The monitoring activity is executed on the involved tps.
In order to monitor transport objects, the user creates objects called " Measures ", which are performance
monitoring work sessions, defined by a set of characteristics according to the Customer's needs.
After creating the measure, the user must associate (correlate) to it the transport/s to monitor and the ter-
mination points (TPs).
– Stopped. This means that the collection activity is terminated. The collection activity can restart upon
entering the Activate command.
In addition, the system supports PM at level of MS trail. See dedicated para PM on Multiplex Sec-
tion. The following mechanisms are allowed:
• the manual start-up of MS PM through specific MS Trail(s) selection
• the automatic start-up of MS PM on all the MS Trails that are created upon physical connection
implementation
• to launch the off-line tool for automatic PM startup on MS-trail on an already managed network
N.B. Only one measure can be active at the same time on a PM termination point for a given gran-
ularity value ( 15 ', 24 h )
N.B. For a path terminated to all virtual objects, the relevant tps cannot be automatically correlated.
In the following paragraphs it is given a description of the main procedures relevant to PM.
The user is able to correlate a TCA to 24h measurements. For new NEs, the Maintenance measurement
should to be used but, for compatibility, also the QoS measurement is accepted.
a) From the Browser select the PM domain and open the pop-up menu. Select the command Create:
Measure. The object creation dialog box is presented.
– measure name (userlabel) . The measure name can be modified, by means of the SHOW/Set
Attributes command, only if the measure status is PLANNED.
• Maintenance. Counter started are: BBE, ES, SES, UAS near end, UAS far end.
• Qos for Tandem Connection. The transport being associated is involved in a tandem connection
and Counter started are: BBE, ES, SES, UASbidi
• Maintenance for Tandem Connection. The transport being associated is involved in a tandem
connection and Counter started are: BBE, ES, SES, UAS near end, UAS far end.
– granularity. The granularity is the monitoring frequency, i.e. the frequency of historical data counters
grouping. You can select:
– Monitored layer. You can specify the layer of the objects monitored by the measure:
• HO - high order
• LO - low order
• No layer restriction
• CBR
• DATA
• MS
• TRUE, the counters belonging to granularity periods will be collected, when the measure is acti-
vated
• FALSE, the historical data counters will not be collected, even when the measure is activated.
This implies that the goal of the measure is to set Threshold Crossing Alarm profiles on the ter-
mination points only.
– Add internal transport tps. If set to True, the internal pmtps are also set.
• TRUE. The PM transport is created with some default TPs automatically correlated ( for each
of them a PMTP instance is created )
– One pmtp ( NAP/CAP type ) for a bidirectional transport is enough because the NE pro-
vides the information relevant to both ends (NEAR END + FAR END).
– If the path is broadcast all sink ends are monitored. (Only real ends are considered.). Vir-
tual NAPs or CAPs are not automatically monitored; the closest real CTP ( boundary CTP
) will be monitored.
– Number of historical data kept in db it is the no. of months of permanence for 24H measure
or the no. of weeks of permanence for 15m measure
d) To verify the successful creation of the measure, check on the Measure Create report window.
e) You can now navigate from the pmDomain, in order to find the new measure icon.( from the Browser
pmDomain select Search related items : Measures. The Measure List is presented).
A measure can monitor paths and trails, i.e. transports of type path and transports of type trail. The
transports have to be correlated to the measure.
SEQUENCE
a) Select the Measure from the list. The Measure must be planned.
b) Select the menu Actions: Correlate/Merge. You can further select among:
• Correlate paths/trails
• Correlate reports
• Uncorrelate reports
• Merge measures
e) To verify that the correlation has been properly entered, navigate the browser in order to find the icon
of the PMtransport which has been just created. From the browser point with the mouse to the mea-
sure icon and issue Display: Related items: PMTransports. The PMTransport icon/s are displayed
in the browser window.
N.B. The correlation Measure-Transport can be also executed starting from the transport (path /trail)
by using the relevant pop-up menu.
The Add measure dialog box opens. Click on Measure list button.
MEASURE LIST
Select the measure to correlate and click on Apply. The measure icon is present in the correlate area. Click
on Finish to confirm.
For a transport ( path or trail ) to be monitored by a measure, at least one TP- termination point ( NAP,
CAP or CTP) of the transport must be monitored by the measure. This means that the measure, when
activated, will collect PM_ DATA relevant to the TPs correlated. To indicate that a measure has to monitor
a certain transport in a certain TP, the involved TP has to be correlated to the measure; the result of the
correlation procedure is that a new object is created: the pmTP. This object is created under the pmtrans-
port.
LIMITATIONS
– A TP can be correlated to a measure ( and so a PMTP can be created under a measure ) only if the
transport the TP belongs to is already correlated to that measure
– A TP can be monitored by at most 2 ( two ) activated measures at the same time, and the measures
must have different pm-Granularity values.
SEQUENCE
a) Select from Browser view the ctp / nap / cap to correlate. They must belong to a transport which is
already correlated to at least one Measure.
c) The tp is correlated to the Measure which is already correlated to the relevant path. By using the
Browser you can verify the tp correlation to the Measure, looking for the newly created pmTP.
N.B. If the transport object the TP belongs to ( e.g. a path ) is correlated to many measures and you
issue the command to correlate the tp to a Measure, the system provides a measure selection
dialog box, in order to select which measures you want to correlate the tp to.
In addition ,from Measure: Search related items: PMtp , the list below is displayed.
• the manual start-up of MS PM through specific MS Trail(s) selection (described in the following)
• the automatic start-up of MS PM on all the MS Trails that are created upon physical connection
implementation (refer to Administration Guide, chapter Configuration, para Environment vari-
ables configuration, Performance Monitoring Customization, Automatic PM startup on MS-
trail)
• to launch the off-line tool for automatic PM startup on MS-trail on an already managed network
(refer to Administration Guide, chapter Procedures, para Procedure for automatic PM startup
on MS-trail)
MANUAL PM STARTUP ON MS
– Objective: Maintenance. Counter started are: BBE, ES, SES, UAS near end, UAS far end
d) Click on Get Measures button. The list of the Measures is displayed. Select the related measure and
click on Apply
f) From the Physcon structure select the MS trail and click on Monitoring Measures
g) The list of the measures is displayed. Select the measure and click on button PM Transports.
i) The list of the PmTps is displayed. In this case only one is present, due to the fact that the involved
trail is connected to an external network.
– if the trail is unidir, only near-end counters are started on sink CAP.
– if the trail is bidir and maintenance, near-end counters are started on both CAPs.
– if the trail is bidir and QoS, near-end and far-end counters are started on both CAPs.
Ì The Force collection is executed globally, on the entire NE. The operation is asynchronous, no
response messages, such as <collection in progress..> are sent by the NE. Then the display
of the retrieved data is not subsequent to the issue of the command. The display of the data,
after the successful collection operation on NE, is available at the subsequent collection time
instant.
• REQUIRED SIDE. The REQUIRED SIDE is the direction of the signal to monitor. It can be set
by the 1354RM to one of the following values:
– sink
– source
– both
• ACTIVE SIDE. It represents the actual direction monitored on equipment for the specified TP.
• REQUIRED MODE. It represents the required mode to start the monitoring on the PMTPs.
The Mode (UNI or BIDI) determines the type of UAS counter to be collected by EML (SH/WX)
for a certain tp. The possible values are:
– unidirectional, RM will receive the values of two counters: Near End UAS (Unavailable
seconds) and FEUAS (Far End Unavailable Seconds)
– bidirectional, RM will receive the values of only one counter BID-UAS which represents
the logical OR function of the Near End UAS (Unavailable seconds) and FEUAS (Far End
Unavailable Seconds) counters.
REQ SIDE and REQ MODE are automatically selected by RM after executing the command
" Correlation of the tp to the measure ". They are chosen taking into account:
• ACTIVE PM. This attribute is set to TRUE if the RM wants to have PM available on that TP, e.g.
when the measures passes from the status planned to the status activated. This attribute is
set to FALSE if the RM does not want to have PM available on that TP, e.g. in case of transport
rerouting.
• sink/source REQUIRED TCA. This attribute is the name of the desired Threshold Crossing
Alarm profile on the termination point.
• sink/source ACTIVE TCA. This attribute is the name of the actual Threshold Crossing Alarm
profile on the termination point.
N.B. ACTIVE SIDE/ACTIVE MODE are not meaningful when the measure is planned.
After activating the measure it is possible to show the actual ACTIVE SIDE and the actual
ACTIVE MODE of the tp in the PMtp show/set attributes window. These attributes show the sit-
uation present on the equipments. If the PMTP is not consistent, this means that at least
one difference between Required and Active attributes is present.
An example of assignement of the attribute REQUIRED SIDE for a bidirectional path is shown in Figure
794.and Figure 795.Notice that for a bidirectional path the involved CTPs ( if correlated ), become PMTPs
marked both as sink and source. Figure 796.shows an example of assignement of the attribute SIDE for
a unidirectional path.
NE-A NE-B
ctp ctp
MAIN
sink
B&S
B&S
ctp ctp source
ctp
SPARE
sink
Figure 794. Side of the pmctps in a b&s connection ( signal from NE-A to NE-B )
NE-A NE-B
ctp ctp
MAIN source
sink
B&S
ctp ctp
SPARE source ctp
Figure 795. Side of the pmctps in a b&s connection ( signal from NE-B to NE-A )
ctp ctp
nap nap
Counter reports Profiles are objects which allow the automatic generation and sending of documents (
Counter Reports) containing all the data collected by the measure in a range of time (T1, T2).
The document name derives from the measure userlabel by adding the character " _ "( underscore ) as
prefix and the characters "_CO " as suffix. As an example, the document name of the counter report asso-
ciated to the measure "MEASURE1" will be "_MEASURE1_CO".
First of all, the counter Report Profile instance has to be created, then it must be correlated to all the mea-
sures that require the generation of documents; only when the measures will be activated, the document
will be periodically generated and sent.
A counter report profile can be associated to more than one measure at the same time.
SEQUENCE
a) To create a counter report, from the browser, point to the PM domain and issue the command
PMdom: Create: Counter Report. Enter:
• type (multiple report/single report/ printer / mail). The generated reports can be stored on file,
printed or sent by Email.
Multiple report means that a unique file will be created, containing all measures to which the
profile is correlated. Single report means that a single file will be created per each measure to
which the profile is correlated.
• frequency (15'/ 1 h / 1 Day / 1 Week / 1 Month / 1 Year). This attribute means that the counter
reports for the activated measures will be generated each quarter of hour / each hour / each
day...
While doing the correlation, measure granularity and Report window must be compatible, i.e.
the window must be a multiple of the granularity, according to the following table:
c) To verify the correlation, point at the measure and issue Display: Related items: counter Reports.
See Figure 798. and Figure 799.
N.B. The environmental variable PM_FORMAT can be set by the administrator to:
Threshold report profiles are objects which allow the automatic generation and sending of documents
(Threshold reports).
These documents contain only the values collected by the measure which exceed some user specified
threshold values.
As in the case of the counter report profiles, first you must create the threshold report profile object; then
it can be correlated to each measure you want the threshold reports to be generated for; threshold reports
will be sent only after measure activation.
SEQUENCE
type (/ printer / mail). The threshold report can be stored on file, printed or sent by Email.
Multiple report means that a unique file will be created, containing all measures to which the
profile is correlated. Single report means that a single file will be created per each measure to
which the profile is correlated.
– window (15'/ 1 h / 1 Day / 1 Week / 1 Month / 1 Year). This attribute means that the reports for the
activated measures will be generated each quarter of hour / each hour / each day...
– The threshold values which will determine the contents of the generated documents.
N.B. The environmental variable PM_FORMAT can be set by the administrator to:
To execute a correlation, Measure granularity and Threshold report granularity must be the
same. The granularity value and the Report window must be compatible, i.e. the window must
be a multiple of the granularity, according to the following table:
granularity window
b) You can verify, by using the browser, that the Threshold Report Profile has been created. See Figure
802.
SEQUENCE
a) From Measure list select a measure and issue Correlate/Merge:Correlate Report. A dialog box is
presented.
b) From Browser listt drag and drop the report profiles ( counter and threshold ) to the Correlation dialog
box drop area and click on button Create.
c) To verify the correlation, in the browser, from the measure issue Search: Related Items: Counter
reports/ Threshold Reports.
INTRODUCTION
– the user activates manually the measure. Stopped measures can be only manually reactivated.
Only when activated, the measure realizes the goal it has been created for: data collection from Network
Elements, automatic generation and sending of counters / thresholds reports (if they have been corre-
lated), generation of threshold crossing alarm ( in case TCA profiles have been correlated to pmTPs
belonging to the measure).
The activity period of a measure terminates manually ( by means of a Measure: Stop command ) or auto-
matically ( when the measure end time is reached ).
SEQUENCE
a) Select from the measure list the measure and issue the Start / Consistency / Stop : Start command.
The status of the measure becomes activated (green).
After the activation of the measure, if the measure is marked as "consistent", this means that the
activation command has been successfully completed for all the correlated points. This means that
the NEs have started the monitoring action and the EMLs will provide the required data.
If the measure is displayed as "not consistent", it means that the activation command has failed
for at least one of the tps actually correlated to the measure. It is required to execute a Consistency
activity on the measure.
INTRODUCTION
– Automatically, when the end time of the actually activated measure expires.
When Stopped, the measure will no longer collect data from the Network Elements and will not generate
reports or threshold crossing alarms.
After being stopped, the measure can be either Consistent or Not-consistent
SEQUENCE
a) Select from the browser the measure and issue the Specific: Stop command. The icon of the mea-
sure becomes light-blue.
INTRODUCTION
A Measure with Consistency attribute equal to Not consistent can be set consistent by means of the
Consistency action.
A measure is said consistent if all monitored TPs will provide the expected data to the measure.
SEQUENCE
a) Select from the browser the measure and issue the Actions: Start/Consistency/Stop: Consistency
command.
A Threshold Crossing Alarm Profile object allows the user to have the automatic generation of alarms for
each counter type, when the counter values run out of a range of values fixed by the user himself.
SEQUENCE
a) From the browser, point with the mouse at the PM Domain and issue the command Create: TCA Pro-
file. Specify the high threshold value, the low threshold value and the severity for the counters listed
in the following. Maximum values are listed herebelow.
N.B. At least one threshold value must be specified since default values are not present.
b) Point with the mouse at the PMTP to correlate and issue the pop-up menu Performance Monitoring:
Correlate to TCA. The following conditions can be met:
1) The correlation is executed if in the RM exists only one TCA profile with granularity and rate
compatible with the PMTPs to correlate.
2) If in the RM exists more than one TCA profile with granularity and rate compatible with PMTPs
to correlate, a dialog box is presented. The operator has to select the specific TCA to correlate.
4) To verify the successful correlation, from the browser point with the mouse to the involved
PMTP and issue the Display: Main Related items: TCA Profile.
N.B. In the QB3*ADMs all TPs with same rate and granularity must have the same TCA profile, then
if you try to associate to a certain PMTP a TCA profile different from the TCA profile already
assigned to another TP, a dialog box is presented, asking the user either to force or not the TCA
profile on that NE.
The above limitation does not apply to QB3 ( INFO MODEL ) cross connect equipment.
The merging of more measures (input measures) into another one (target measure) is a complex action
which allows to put together more monitored objects (paths, trails and their termination points) into one
measure.
SEQUENCE
a) From the measure list select one of the measures to merge and click on button Merge. The Merge
dialog box is displayed. It contains in the upper area the previously selected measure, whose name
will be the name of the merged measure being created. See Figure 808.
b) Drag to the drop area the measures to merge and select the button Merge measure. The measures
are merged into a new one. The dropped measures are deleted from MIB.
The collected PM data can be presented to the user by means of the "Displaying PM data" option.
a) Select the measure from the browser and select the functional button Show Performance Monitoring
Data.
Starting from the PM domain, you can navigate, by means of the Display: Related Items command, to the
Monitored NEs. See figure below.
The Show/Set attributes from this object contains the following attributes:
– userlabel
– NE type
– last collected file15m / last collected file 24h. These attributes are used to keep a history of the file
that has been collected from RM and to ask EML for sending the not yet received files.
– working status. This attribute is usually set to normal. It changes to Synchronizing when the attribute
On going activity is in one of the following states:
In addition, from browser it is possible to display the PM tp view and the PM transport view. See figure
which follows.
INTRODUCTION
To Archive Monitoring data means to memorize PM data on a storing support ( tape / file )
– measures
– PM transport
– pmTPs
– historical data
The result of the Archive procedure is to obtain a series of mag-tapes, each one storing data relevant to
a certain period.
The Archive procedure avoids memory disk saturation, with the objective of maintain hystorical data and
transfer them to tape.
It is strongly recommended to execute Archive and Delete procedures of the PM hystorical data with the
following time periods:
SEQUENCE
a) From TMN-OS view select the RM icon and issue the Actions: SMF: PMDS DB Administration item.
INTRODUCTION
To Retrieve Monitoring data means to memorize on RM_MIB data stored on archived tape.
SEQUENCE
a) From TMN-OS view select the RM icon and issue the Actions: Performance Monitoring menu item.
INTRODUCTION
To display Performance Monitoring data means to display data that have been previously retrieved.
SEQUENCE
a) From TMN-OS view select the RM icon and issue the Actions: Performance Monitoring menu item.
INTRODUCTION
To Delete Monitored data means to delete from RM-MIB all archived data. Only historical data are deleted.
SEQUENCE
a) From TMN-OS view select the RM icon and issue the Actions: Performance Monitoring menu item.
The Archive session allows to display previously completed archive to tape operations and programmed
archive operations.
SEQUENCE
Starting from the PM domain, you can navigate, by means of the Display: Related Items command, to the
Archive Session. The list of the Archive sessions is presented. For each item of the list the Show/Set
attributes dialog box contains the following attributes:
• user label, automatically built on from date and the granularity (e.g.: an archive performed on
15 min data from the 15/06/1998 will be given the following user label: “15 minutes counters
1998/06/15")
An instance of archive session, concerning the next archive session, is automatically generated at the
end of each archive operation.
The only attribute which can be set by the user is the attribute to date, in order to anticipate or postpone
the next archive operation.
This is the action opposite to the "Correlate Transport to planned Measures"; by uncorrelating a transport
from a planned Measure the user indicates that the termination points belonging to that transport will not
have to be monitored by the Measure.
SEQUENCE
a) From the browser point at the transport icon and issue the Performance Monitoring: Remove from
command.
1) More than one measure is correlated. The system provides the list of the planned measures
which are monitoring the involved transport object.The user selects the measure to uncorre-
late and clicks on the confirmation button.
This is the action opposite to the "Correlate tp to planned Measures"; by uncorrelating a tp from a planned
Measure, the user indicates that data concerning that tp are no more interesting for him: they will not be
collected when the measure will enter the activated state.
SEQUENCE
a) From the browser point at the tp icon and issue the Performance Monitoring: Uncorrelate from Mea-
sure pop-up menu.
1) More than one measure is correlated. The system provides the list of the planned measures
which are monitoring the involved tp object.The user selects the measure to uncorrelate and
clicks on the confirmation button.
The Remove from RM menu item allows to remove the following objects:
– pm TP
– PM transport
– Measure
The object containment tree is shown in Figure 811., i.e. if you remove an object, all the contained objects
are automatically removed.
N.B. The Remove from RM action applies only to stopped or planned measures.
MEASURE
REPORT
COUNTER/
THRESHOLD
PM TRANSPORT
PMTP
HISTORICAL
DATA
This is the action opposite to the "Correlate Counter/threshold report to planned Measures", by uncorre-
lating a Counter/threshold report profile from a planned Measure.
SEQUENCE
a) From the browser, point at the measure icon and issue the Performance Monitoring: Uncorrelate
from Measure command. The list of the associated reports is presented.
The feature is applicable to paths without virtual concatenation, on an SDH transport network.
In case of bidirectional path, both directions can be dropped to the same test port or two different
test ports.
The test port can be PDH (at the same rate of the path) or SDH. In the latter case, signals coming from
different paths can be multiplied on the same SDH test port.
To use a SDH port as a test port, create a physical connection between that port and an external network,
then implement it.
In order to monitor LO paths, configure manually the LO payload of this physical connection. An SDH
port marked as test port cannot be used as a normal SDH port: no path can be allocated; this port can
be used only for test.
Create a physical connection between an SDH port of node XC, to be used as test port and the external
node T.
This test connection will monitor the TX from A to B through an unidirectional test cross connection from
XC to T.
SEQUENCE
a) From the map select nodes XC and T and issue Create: Physical Connection
XC
A T
b) In the Create: Physcon box select: SDH,rate, and enter the physcon name (TESTPHYSCON in this
case). Click on Next.
e) With ref. to above figure, on the real node dialog area (upper-right hand), click on port selection but-
ton. The port selection list is presented. Select the SDH port and click on Apply.(see fig. herebelow)
f) In the main Create Physcon box, click on Finish to confirm. The Create: Physcon: Action report is
shown in figure which follows.
g) You can see that the port involved in the TESTPHYSCON is marked by attribute used for test=true.
See below figure.
j) The addition of the test port must be executed on the (being tested) path routing display. To get the
routing display, first get the crossed A to XC physcon.
l) From the path list of the Supported Paths, select the relevant path and click on routing display button.
m) From the routing display select the 1st CTP and issue Test Port: Addition Tool. See below figure
o) Select the port. The selection mechanism consists in clicking on the selection button, then selecting
the port from the list. The selection of the time slot (payload position) is also required (in case of an
SDH test port). Click on button payload position.
q) In the main box, click on Finish to confirm. The port is marked as Test Port and in the routing display
a dedicated icon is present on the involved CTP. See figure below.
r) If you click on this icon, you can get the Cross connection details box.
s) Notice that automatically a test path is allocated. See Physcon structure in figure herebelow.
XC
Figure 832. Test Port Addition Tool: left scroll payload position
d) In this case the 2nd CTP must be cross connected the same test port, then a time slot different from
the first must be selected. Do a right scroll of the CTP list and select the time slot. Click on Apply
button.
Figure 833. Test Port Addition Tool: right scroll payload position
g) The Forward and Backward Test Ports creation report is shown below.
h) On the other hand both test paths are displayed in the physcon view. See below figure.
a) In the following example, both CTPs have been selected and the command test port addition tool
has been selected.
d) Execute the connection, selecting the port and the time slot. Click on Next.
e) The 2nd CTP is presented. Execute the connection, selecting the port and the time slot. Click on Fin-
ish button to confirm the creation.
b) Point to the CTP to connect to the test port and issue Test Port: Test Port Addition Tool
d) The dialog box asks to select the test termination. Select the NAP to be used as test termination.
f) The connection to the test port is added. The involved CTP is marked by an arrow symbol.
g) You can check the creation of the test cross connection from the Equipment view issuing
– Class Type. The operator can choose to display events relative to:
– Event Type. The operator can select among the following types:
• Immediate. The report window will work as a virtual printer ( FIFO ), displaying messages in real
time.
• From Log File. The Report will contain data extracted from the historical event log file of HP-OV.
– Object_Instance. From "Browser" drag the object(s) whose event log is required and drop into this
area. A wrongly dropped object should be deleted by means of the "Delete" pop-up option. The pres-
ence of objects in this area automatically makes not meaningfull the content of the above described
Class-Type box.
– User's info
The Event Log dialog box contains the pull-down menu line with items File and Actions.
• Open, to start a read operation on an ASCII file. This file is selected by the user by means of
a file filter.
• Print all to print the Event Log content on the default printer.
• Print Selected to print part of the Event Log content on the default printer.
still closed.
4.1 Introduction
This chapter covers the following topics:
• Introduction to Functionalities
• Routing Algorithm
• Allocation
• NE Constraints
• RM Objects
• Object names
The 1354RM is a network management system that has been designed to handle SDH regional networks.
The aim of this chapter is to give an overview of the 1354RM. (See Figure 855.). The 1354RM covers the
1st NML level ( Network Management Layer). Figure 855. shows all the functional layers and the com-
munication protocols.
VPN NML
Client A
1354NN
http RMI
M
Web VPN ISN
Qnn
Server Server
NML
A
M 1354RM
QB3* QB
EML
A
QB3*
QB
NE M: MANAGER
A A: AGENT
– not protected: a single route (main) is defined between the end points
– protected SNCP: two routes (main and spare) are defined between the end points, in order to protect
the path against link faults and node faults;
– protected D&C SNCP: in addition to main and spare, one or more service route are inserted in the
path, in order to protect it against multiple faults; (available only for point_to_point paths and trails)
The basic algorithm has the objective of finding the minimum cost route between the end points (NAPs,
CAPs ).
This is the simplest case. The algorithm computes a single lowest cost route from the source point to the
sink one, called main route.
A path is called protected when supplementary arcs or connections, called spare, are allocated in addition
to the main one to provide an alternative way in case there are one or more failures along the main route.
A SNCP protected path has two routes, main and spare, from source to sink vertex, sharing as less as
possible common resources. The algorithm therefore tries to minimize the overlaps between main and
spare . As a result, an end-to-end protection is obtained whenever possible.
The algorithm used is slightly different whether the path allocation is completely automatic or not.
SEMI-AUTOMATIC VERSION
It occurs when at least one path constraint has been entered by the user
2.Then the spare route is computed with as less as possible overlaps with the main route.
In this case the algorithm would find the path with the lowest cost main route, not the lowest sum of main
and spare route costs,costs. This is acceptable for a semi-automatic path allocation, since the user has
forced the routing to be not necessarily the best one.
The Dijkstra Algorithm has been customized in order to minimize the sum of main and spare route costs,
with the minimum number of overlapped resources.
For a D&C protected path the algorithm computes a SNCP protected path with additional routes, called
services, obtained connecting, for each ring and for each direction of the path, the ring exit nodes of the
main and spare route through D&C connections in order to protect the traffic in that direction against mul-
tiple failures.
Notes:
If the path is unidirectional each ring can have at most one service, if it is bi-directional two.
The service can exist if, in the direction to protect, the main and the spare route exit from different nodes.
2. Then the spare route is computed with as less as possible overlaps with the main route (see 4.2.2).
– Allocation/Add Service (without end points). Services are allocated in rings crossed by both main
and spare routes protecting the existing traffic.
– Add Service between specific end points. The user can specify the connections involved in the
service ( without topological restrictions) choosing the direction to protect
If the path is protected and at least one constraint has been setup, the semi-automatic algorithm is applied
once per each leg.
If the path is protected, without constraints the fully automatic algorithm is applied once for each leg.
In general, different legs can share some arcs. It is also possible to use an arc in the main route of one
leg and in the spare route of another leg.
Legs are not routed independently: the base cost of arcs already used in a previous leg are decreased
by a configurable factor: in order to share as many as possible arcs between legs, by default the cost is
reduced to 20% of the original value if the arc is used with the same resource type, to 40% of the original
value if used with different resource type,
"Inter legs" checks are executed in order to avoid that 2 connections of different legs in the same node
result either in a connection not supported by the NE, or in a switch, whose main and spare TPs belong
to different legs.
1354RM manages the possibility to insert a node in more than one ring, as shown in the following two pic-
tures.
In these cases, the routing algorithm is not based on minimum cost criteria, but it tries to avoid ring cross-
ing.
– NPA Usage Cost: it is an extra cost used in the routing algorithm for the usage of the NPA. It ranges
from 0 to 100, like the cost of physical connection;
– NPA Reduction Cost Factor: the cost of physical connections inside a NPA is reduced by this factor
in the routing algorithm.
This reduction is introduced in order to compensate the cost for the usage of the ring.
By default, the NPA usage cost is 20 (like the default cost of a physical connection); the default NPA
Reduction Cost Factor is 20%. The user is allowed to modify these values. In particular, putting both val-
ues to 0 results in a minimum cost routing.
Example: in Figure 859. - below, using default values a path between N2 and N5 is routed through N3
and N4 using only ring 2 (continuous line), even if the minimum cost route, taking into account only the
physical connection costs, bypasses N3 but uses both ring 1 and ring 2 (dashed line).
In the fact, the cost of the chosen route (N2 - N3 - N4 - N5) for RM routing algorithm is 68: 3*16 (cost of
three links) + 20 (access to ring 2); while the cost of the other route (N2 - N4 - N5) for RM routing algorithm
is 72: 2*16 (cost of two links) + 40 (access to ring 1 and ring 2).
Two attributes are defined in path and trail objects, relevant to the spare route:
NPA Main & Spare Factor: it is meaningful for SNCP or D&C SNCP paths/trails. During spare calculation,
the NPA Usage Cost, for rings already used by the main route, is reduced by this factor.
If equal to 0, it has no effect, i.e. NPA Usage Cost is not reduced by the routing algorithm.
MS-SPring D&C Factor: it is meaningful for SNCP or D&C SNCP paths/trails crossing MS-SPring. It can
be used to encourage, during spare calculation, the usage of D&C inside MS-SPrings.
As bigger is set the NPA Main & Spare Factor, as more main and spare are attracted to use the same rings,
resulting in a more ordered routing. This can be particularly useful for D&C paths/trails that use SNCP
rings.
Examples:
in Figure 860. - below (case A), using default values, the main route of a path between N2 and N6 is routed
through N4 using only ring 1. The spare is routed through N1, N8 and N7 still using only SNCP ring 1 (con-
tinuous line), while the routing obtained disabling NPA Main & Spare Factor bypasses N8 but uses SNCP
ring 2 (dashed line), that wasn't used in the main route. In fact, the cost of the chosen spare route (N2 -
N1 - N8 - N7 - N6) for RM routing algorithm is 64: 4*16 (cost of four links), without any additional NPA usage
cost; while the cost of the other route (N2 - N1 - N7 - N6) for RM routing algorithm is 68: 3*16 (cost of three
links) + 20 (access to ring 2).
not in all cases, the NPA Main & Spare Factor avoids the usage of new rings not used in the main route.
In fact, the cost of the chosen spare route (N2 - N4 - N3) for RM routing algorithm is 52: 2*16 (cost of two
links), + 20 (access to ring 1); while the cost of the route that uses only ring 2 (dashed line) is 96: 6*16
(cost of six links), without any additional NPA usage cost.
Figure 860. NPA Main & Spare Factor effects in stacked SNCP rings
As bigger is the MS-SPring D&C Factor, as more the routing algorithm should automatically route main
and spare in order to create D&C-IC connections compared to other possible routes. When the cost of
the route with D&C-IC is too high, other solutions are preferred.
Examples:
In Figure 861. a MS-Spring is crossed by a protected path in such a way that there are a lot of NEs between
primary and secondary nodes. In this case, using default MS-SPring D&C Factor, the spare route of the
path is the one represented by the red continuous line. Increasing the value of the MS-SPring D&C Factor,
the dashed route can be preferred, resulting in two D&C connections in nodes N1 and N2.
In Figure 862. primary and secondary nodes in the MS-Spring are adjacent. In this case, using the default
value of MS-SPring D&C Factor, the spare route of the path is the red continuous line with D&C-IC con-
nection in nodes N1 and N2. Reducing the value of the MS-SPring D&C Factor, the dashed route can be
preferred.
Figure 862. Routing in stacked MS-Springs - primary and secondary nodes adjacent
Allocation of D&C protected paths: service routes are calculated in the rings (SNCP and 2F MS-SPrings
for LO paths) crossed by both main and spare. The NPA usage cost is not taken into account for rings
crossed by both main and spare; all the other rings cannot be used in the service route.
Add service between specific TPs of a path: service routes may connect the main with the spare branch
without topological restrictions. In this new scenario it is possible, for service routes, to traverse rings used
by both main and spare, only by the main, only by the spare or previously unused rings. As consequence,
the NPA usage cost taken into account by the routing algorithm is:
Half the value of the NPA usage cost for rings used only by the main/spare
Not modified for rings not yet used by main and spare
These rules advantage the use of rings already used by main and spare respect to others, but doesn't
prevent the usage of any ring.
For collapsed dual node D&C inter-working, it is not necessary to define a specific meshed ET including
N3 and N4.
A path can cross a node that is part of more than two rings; see N4 in the example shown in figure below.
As usual, the service routes are added only in the rings used by both main and spare of the path (N3-N4
for ring 1, N4-N5 for ring 3).
As a result, two classic D&C connections are created in N3 and N5; one dual node D&C is created in N4.
Depending on the placement of the two end nodes, the two following routes can be obtained.
Figure 866. Collapsed dual node D&C inter-working for 2f MS-Spring - config 1
Figure 867. Collapsed dual node D&C inter-working for 2f MS-Spring - config 2
In case of stacked MS-SPrings, paths ending in different rings can be routed differently, depending on the
number of nodes between the end nodes. Note that SNCP connections, if supported by NEs, can be cre-
ated by the routing algorithm also inside MS-Springs (Figure - below case A).
• inside a MS-SP Ring (both two and four fibers), the time slot interchange is not possible at HO:
the algorithm chooses the first free time slot in all the routing links of the ring used by the HO
path;
• in case of NE constraint (the protected connections in all QB3* ADMs must have the same time
slot at west and east aggregate ports), the algorithm chooses the first free time slot in both rout-
ing links adjacent to that NE.
DEFINITION
A physical connection or a trail is said fragmented if the busy time slots are not rationally organized and
impede the optimized allocation of higher order paths.
To avoid the fragmentation, the defragmentation mechanism is used. It applies to the nominal route.
The trail basic cost (see def. herebelow) is dinamically incremented to take into account the high rate
bandwidth that could be missing if that ts is used.
In practice the defragmentation is a structured (traffic) lower filling threshold which helps
resource(trail,physcon) filling up to the threshold.
On the other hand, the saturation is a structured (traffic) upper filling threshold which limits
resource(trail,physcon) filling up to the threshold.
Cases:
– empty physical connection or trail. In any case badwidth space fo higher rates is missing, i.e. setting
an AU4, the possibily of setting an AU4-4C/ an AU4-16C/ an AU4-64C would be lost.
– partially busy physical connection or trail. According to the actual traffic distribution, setting a new
path may affect the possibily of setting an higher rate path.
A trail extra cost is added. (MS trail or HO trail if a LO path is set. The extra cost is directly proportional
to the being missing bandwidth.
During the evaluation of the fragmentation cost, the routing algorithm does not consider the current pay-
load implemented on the NE but only the position of the busy bandwidth for allocated or implemented
paths/trail. The payload will be changed on the NE at path/trail implementation time. The change is done
directly by RM in legacy networks and by GMREs in the ASON. This is true only when the dynamic payload
is enabled.
Fragmentation cost
We define:
For lower order paths, the same concepts can be applied to tu3 and tu12 rates: in the allocation of a tu12
path, an extra cost can be added where the usage of a tu12 path reduces the available bandwidth of tu3
paths.
Environment Variables
• AU4_EXTRACOSTFACTOR: 5%
• AU4C_EXTRACOSTFACTOR: 5%
• AU16C_EXTRACOSTFACTOR: 5%
• AU64C_EXTRACOSTFACTOR: 5%
• TU3_EXTRACOSTFACTOR: 5%
These variables are the percentage of the basic cost that gives contribution to the extra cost
In the following, some examples are reported. The following basic hypothesis are used:
Cbasic = 20
the extra cost to pay to fragment an AU4-64C, an AU4-16C, an AU4-4C, an AU4 with an AU3 is, respec-
tively:
C1 = 5%
C4 = 5%
C16 = 5%
C64 = 5%
The following table shows an example with the total cost in different configurations of STM16link. Each
line is a different configuration of STM16. A busy time slot is in red (filled with 1 if used in a AU4 path, with
4 if used in a AU4-4c one), while other colours are used only to show different groups of time slots. The
cost to allocate paths with different rates is in the last 3 columns of each line.
N.B. In the example the AU3 is not supported and so it is not taken into account
– AU4-16C allocation => Cbasic = 20, because there is not any lost concatenation rate
– AU4-4C allocation => Cbasic + C16 = 21, because lost concatenation rate is AU4-16C
– AU4 allocation => Cbasic + C4 + C16 = 22, because lost concatenation rates are AU4-4C and AU4-
16C
case 2, 4 and 6:
– AU4-4C or AU4 allocation => Cbasic = 20, because there is not any lost concatenation rate
– AU4-4C allocation => Cbasic = 20, because there is not any lost concatenation rate
– AU4 allocation => Cbasic + C4 = 21, because lost concatenation rate is AU4-4C
Once the route has been found for all the parts of a path/trail, the selection of Link Connections / time slots
has to be done.
– Minimization of fragmentation.
– First free time slot. An exception to this rule is the protecting fibers inside 4F MS-Springs, where the
allocation of time slots starts from the last free one
The feature is an improvement of the path/trails allocation process, taking into account the prevention of
saturation.
The described improvement is related only to the allocation of the nominal routing.
The goal is to avoid that physical connections become saturated with path/trails.
This will minimize the effects of a single fault (in particular in case of restoration networks): part of the
resources not used by nominal paths are still available to support backup routes and restoration.
In order to prevent saturation, the basic physical connection cost is incremented of an additional cost when
the usage becomes higher than a parametric value.
The saturation cost is applied when the used bandwidth plus the bandwidth to be added is greater than
the saturation threshold. This means, for example, that an empty STM16 becomes automatically satu-
rated when used by an AU4-16C.
4.4.2.1 SaturationProfile
The saturationProfile contains the thresholds defining the three saturation extra cost bands and the
related extra cost. It includes:
profileId
userLabel
comment1
profileType: it indicates if the profile is defined by the user or not. Allowed values:
system: the profile is automatically defined by the system. It cannot be defined, modified and delet-
edby the user
mediumThreshold: (percentage of the whole band); it is the Medium usage extra cost band
highThreshold:(percentage of the whole band); it is the High usage extra cost band
mediumUsageExtraCost: it indicates the extra cost, expressed in percentage of the basic cost, to use
resources belonging to the Medium usage extra cost band
highUsageExtraCost: it indicates the extra cost, expressed in percentage of the basic cost, to use
resources belonging to the High usage extra cost band
Cost of
physical
connection
High usage
Medium Extracost
Low usage usage
Extracost
Extracost
Basic cost
Used
band-
Total widht
Bandwidht
lowUsageExtraCost 0% 0%
mediumUsageExtraCost 0% 75%
highUsageExtraCost 0% 175%
The predefinedExtraCost saturation profile has been defined in order to satisfy the following configura-
tions (in bold the chosen route):
1. cost of 1 Medium usage link < cost of 2 Low usage links (35 < 40)
L L
2. cost of 2 Medium usage links > cost of 3 Low usage links (70 >60)
L L
L
M M
3. cost of 1 High usage link < cost of 2 Medium usage links (55 < 70)
M M
4. cost of 2 High usage links > cost of 3 Medium usage links (110 >105)
M M
H H
L L
6. cost of 2 High usage links > cost of 3 Medium usage links (55 <60)
L L
According to the saturation profile associated to the physical connection, the total cost is calculated
according to the following formula:
Ctotal=Cbasic + Csaturation
If the fragmentation cost has to be taken into account, the total cost is calculated according to the follow-
ingformula:
4.4.4 ASON GBE restoration type, priority, reversion type management on path
level
This feature allows, for a GBE path in an ASON domain, the propagation of the values at path level to the
trails and to the SPCs.
Functional view
The change of the value of the restoration type, priority and reversion type on a path GBE is propagated
to all the server trails and, if required by the user, from the trails to each supporting SPC.
Viceversa, when the value is modified on a server SPC or on a server trail, no propagation is done to the
path. This because the value on the path and on the trail is a "preferred value" and it is not the synthesis
of the values on the server objects.
The AU3 SPC is managed as well as the AU4 SPC, from the point of view of routing, implementation,
alarms and GUI.
– handling of the new payload when interacting with GMRE through MTNM (e.g. in Active backup
route, Traffic Status on physical connections, Highlight)
The feature allows the management of trails with one of both the terminations inside the ASON domain.
These trails can only be created by means of the "Create new HO trail" command, while it is not possible
to create them by means of the payload of a physical connection inside the ASON domain.
These trails can be payloaded.
– The interface with GMRE (through MTNM) for the assignment of the TTP ending the SPC with the
related TTP rate and label
– The handling of the AU3 Trails (the AU3 SPC management is already required for the "AU3 SPC' s")
For the detailed description of a GBE path AU3-nV concatenated, please refer to the "Management of
GBE@AU3 in SDH networks" feature (DATA part of RM specifications).
In AU3 based networks (default payload is AU3), the SC is managed as before but in case of AU4, AU4-
nC rates, the system has to re-map the AU4, AU4-nC payloads in the correct AU3 payload positions of
the UNI physical connection
De-implementation of SPC's with unreachable GMRE's
– priority_1 is the priority of the SNC1, i.e. the SNC already working
– setUpPriority_2 is the set-up priority of the SNC2, i.e. the SNC to be implemented or rerouted that
should preempt the SNC already working;
N.B. The priority scale is inverse: maximum priority is "1" and minimum is "5". In other words the
matching "setUpPriority_2 < priority_1" means that priority of SNC2 is major of the SNC1 one.
N.B. As already wrote the pre-emption cannot be done if the existing resource (SNC1) works on the
nominal route. In fact in this case RM automatically doesn't allows a new nominal SNC to over-
lap an existing SNC working on its nominal route.
This new introduced priority concept may be used also to avoid that an existing resource is pre-empted
by another one (to be implemented/rerouted). In this case is sufficient to set "priority=1" to be sure that
the existing resource will never be pre-empted.
The new "defaultSetUpPriority" attribute may be set in the path/trail definition phase. If the allocated (or
implemented) path/trail doesn't cross the ASON domain this new attribute is not managed.
If the allocated (or implemented) path/trail crosses the ASON domain at least one SNC is created and this
attribute is managed. In particular the "setUpPriority" attribute value of the created SNC(s) will mirror the
related attribute of the path/trail which belongs to.
The user can modify the "defaultSetUpPriority" attribute value of a path/trail in any configurationState
(defined, allocated or implemented).
The modification is performed by the updSncAttrs action (see SNML-IM impacts). The user can choose
to propagate or not this modification to the related SNC(s) (if any). A flag in the GUI permits to do that.
Suggested behaviour is to align the "setUpPriority" of the SNC(s) with the related value of the path/trail.
The SNC "setUpPriority" modification is not propagated to the path/trail belongs to. This behaviour is jus-
tified in the case of a path/trail having two or more SNCs. In general the SNCs don't have the same "set-
UpPriority" value, then the path/trail "defaultSetUpPriority" attribute cannot reflect the situation of different
attribute values; for this reason an alignment is not meaningful and cannot be required.
SNC-2
priority 4
setup priority 5
SNC-1
priority 4
CONDITION RESULT
The equipment doesn't support some type of connection (e.g. old-generation ADMs can perform
Bridge&Switch only between one tributary port and two aggregate ports)
Even if the equipment supports it, in that moment it is not able to implement it (e.g. 1661smc and 1651smc
can provide some HO connections up to a fixed limit)
4.6 RM objects
The database contains the object classes which are described in the following.
NtwDomain
The ntwDomain (network domain) is the whole area controlled by the 1354RM.
Ntw (Network)
The network comprises all the interconnected SDH equipment. A network comprises sub-networks.
A network object instance has an associated symbol and a submap. The symbol represents the network
in the root submap, and "clicking" on it the corresponding submap can be opened.
EmlDomain
An EML domain is maintained by a single EML OS. This object is generated in order to inform the Operator
on the OS a certain NE belongs to.
An EML-domain contains the NEs managed by the EML OS.
NE
A node has an associated symbol and a submap. The symbol is used to represent the node in the submap
describing the topology of the sub-network or ET where the node is contained. Clicking" on the node, the
asociated submap will be opened. This submap contains the uploaded ports.
Physical Connection
A physical connection connects two ports in the network. These two ports belong to different NEs and must
have the same transmission rate.
A physical connection has a symbol, that is used to represent the physical connection in the submap asso-
ciated.
Site
Port
A port is a physical interface of a node. Two ports with the same interface can be connected by means
of a physical connection.
Path
Sbn
The subnetwork is a partitioning of the NML network. It contains Elementary topologies and intercon-
nected Nodes.
A sub-network is a grouping of nodes and ETs.
A sub-network has a symbol and a submap.
ConnInTopol
The connInTopol (connection in topology) describes a generic connection (subnetwork connection, net-
work connection) between two or more ends (they can be Naps,Caps or Ctps) to realize a path in any par-
titioning level.
A connInTopol between Naps corresponds to a path.
Cap
The Cap (Connection access point) is a higher order trail termination. It can be the client access point
towards the network.
Ctp
Ms CtpCap
It represents both the Msctp and the mscap entities related to an SDH physical port at MS layer.
NPA
Network Protection architecture. It is a protection modalkity, to be applied to a selected set of physical con-
nections.
SNC
nap
connInTopol
nap
LOPL
td
HOPL
connInTopol
MSL
msctpcap
msctpcap
Trail
It describes the connectivity between two caps in any partitioning level and in any layer. It defines the
association between client access points in the same transport network layer.
LOlink connection
ctp ctp LO
HOtrail
cap cap
HO
HO link connection
ctp ctp
ms trail
MS
msctpcap msctpcap
The link connection describes the connectivity between two CTPs in any partitioning level and in any layer.
The figure which follows describes the objects involved in the structure.
OMS
where:
OCH=optical channel
In particular:
• OMS TPs
• UNI ports ( OGPI ) of WDM NEs ( e.g. back to back with or without transponders )
It includes:
• OCH Link Connections connection ( LC's ) “logically interconnecting" OCH CTPs at the same
frequency
OCH LC
OCH-CTP
OCH-CTP
OMS Trail
OMS TP OMS TP
• OCH trails representing the logical interconnections between OCH TTPs crossing OCH CTPs,
OCH LCs and OCH cross connections
In addition:
• OADMs provide OCH pass-through at the same Lambda (pass-through of the extra-band),
called by 1354RM, OCH pass-through cross-connection.
• Client CTPs on transponders, that is TPs on I/O directions like rs-CTPs, gdc-CTPs, ochgdc
CTPs)
• Client paths interconnecting client terminations ( client NAPs ) with a sequence of LCs and
cross-connections.
– The OCH ( B / W ) is a “technical layer' added at RM level to balance the model mainly in case of
SDH inter-working. It contains objects with no counterpart in the NE.
LOPL
140cap1 (VC4)
(VC4) HOtrail(VC4S1)
# 140cap1
connInTopol
connInTopol
ctp16
HOlc ( AU4#16) ctp1
HOlc ( AU4#1) HOPL
MS
ms trail
mstp mstp
OSPI
OSPI
physConn
rsttp
rsttp
rs trail = CLIENT PATH
4x2.5
clientctp
clientctp rsct
rsct client lc client lc client lc client lc
omstrail omstrail
opsphyscon
OMSTTP
OMSTP
opsphyscon
OMS-LC OMS-LC OPS
OP
OMSCTP
opsport opsport
SDH otsphyscon SDH
OTS OTS
When the WDM interconnection is inserted in RM between a SDH-NE and a WDM transponder, the same
SDH port is presented two times:
Namely the SDH physical connection is merely a logical connection from SDH to SDH port, while OPTI-
CAL physical connections maintain physical properties.
4.6.3 Functions
1354RM allows:
– definition of OTS links and single lambda interconnections (OPS) between WDM NEs. OPS links are
needed for coloured or B/W back-to-back interconnections
– the upload of an existing connectivity at OCH and client layer during the implementation of physical
connections. The uploaded connectivity first generates raw connections and then OCH trails and in
turn client raw connections and client paths.
The type of WDM connection is OPS for SDH-WDM connection, OTS for WDM-WDM connection.
– A-Z, a-z, 0-9, all special characters except: tilde (~), backslash (\), pipe (|), double quote ("), TAB
The length of the user label of the path is extended up to 130 characters.
As a consequence, the length of the user label of other entities related to the length of the user label of
the path is extended. In particular:
– port: the length of the user label is extended up to 132 characters (path user label length + 2)
– trail: the length of the user label is extended up to 138 characters (path user label length + 8)
– snc: the length of the user label is extended up to 141 characters (trail user label length + 3)
– pmTransp: the length of the user label is extended up to 138 characters (trail user label length)
In addition, the length of the customer field of the path (comment3 attribute) is extended up to 45 char-
acters.
As a consequence, the length of the user label of other entities related to the length of the user label of
the npa is extended. In particular:
-msProtBlock, msProtBlock4f and msProtBlockLinear: the length of the user label is extended up to 125
characters (node user label length + npa user label length + 1)
ABBREVIATION MEANING
AP Access Point
AS Alarm Surveillance
AU Administrative Unit
BN Backbone Network
CAP Client Access Point. It represents a point where a client layer can
access a server layer ( i.e. a VC-4 that is configured to carry lower
order signals is a HO-CAP)
CI Communication Infrastructure
CT Craft Terminal
DS Degraded Signal
EML domain A set of NEs that are maintained by the same EML-OS.
FM FM Fault Management
IM Information Manager
LSP "Link single fault protection" index (LSP). The LSP index is deter-
mined (in a way similar to NSP for nodes) taking into account of
both the number (C) of archs belonging to the main route and the
number (D) of archs belonging to the main and spare routes.
Map Set of related objects , backgrounds,symbols and submaps
that provides a graphical and hierarchical representation of the
network.
MS Multiplex Section
NE Network Element
NSP "Node single fault protection" index (NSP). The NSP index is deter-
mined taking into account of both the number (A) of Nodes belong-
ing to the main route and the number (B) of Nodes belonging to the
main and spare routes, except the end nodes.
OH OverHead
OS Operation System
Physical Connection A Physical Connection connects two SDH ports in the network.
These two ports belong to different NEs and must have the same
transmission rate.
PM Performance Monitoring
PI Physical Interface
RC Raw Connection
RS Regenerator Section
SA Section Adaptation
SD Signal Degrade
SF Signal Failure
TF Transmit Fail
TM Terminal Mode
TN Telecommunications Network
TP Termination Point
TU Transport Unit
VC Virtual Container
XC Cross-Connect
Administrator:
A user who has access rights to all the Management Domains of the SDH Manager product. He has
access to the whole network and to all the management functionalities.
Alarm:
An alerting indication to a condition that may have an immediate or potentially negative impact on the state
of an equipment or the OS. An alarm is characterized by an alarm begin and an alarm end.
Alarm Status:
Identifies the type and severity of an occurring alarm.
Administrative Unit:
Entity composed of a high order virtual container (VC4) to which is added a pointer indicating the position
of the virtual container in the STM-N frame.
Board:
A board is part of an NE. They are electronic cards that fit into slots in the NE.
Craft Terminal:
Workstation or Personal computer (PC) from which local address to an NE is possible. It can be used to
configure or perform monitoring tasks on the NE.
Cross-connect (XC)
Cross-Connects provide the network with the Routing Capabilities, this is the possibility of routing one sig-
nal to a particular destination.
Degraded Signal:
Alarm sent when the number of errors detected in a received signal frame exceeds a certain threshold.
Filter:
Flushing:
This deals with logs. When a log is flushed, all its records are deleted.
Information Manager:
Processes used by the SDH Manger that are the functional part of the SDH Manager applications.
Line Terminal:
A line terminal is the end point of a communication link. it is used to transmit or receive signals. They can
undertake signal conversion functions (adapting a signal to two different transmission media) or multi-
plexing/demultiplexing functions.
Logs:
Logs are files used to store history data concerning the incoming notifications, operator commands and
system alarms. The size of the log can be configured.
Loss Of Frame:
Alarm linked to the regenerator section termination functional block, associated with the loss of signal
frame.
Loss Of Pointer:
Alarm linked to the section adaptation functional block, associated with the loss of a pointer in an admin-
istrative unit.
Loss Of Signal:
Alarm linked to the physical interfaces, associated with the absence of a received signal.
Multiplexer:
Equipment used to combine several signals to produce a single signal at a higher transmission rate and
to decompose it back to the smaller rate signals.
Multiplex Section:
In general, represents the section containing the multiplexed signals.
Network Element:
Either a telecommunication equipment or groups parts of a Telecommunication Network. Have charac-
teristics compliant with CCITT recommendations.
Notification:
Spontaneous data received by the system concerning an NE.
Operation System:
A system dedicated to the supervision of NEs in a standard way, using protocols and interfaces. it offers to
the operator a set of functions necessary to supervise the NEs. The SDH Manager is an Operation System.
Operator:
The end-user of the SDH Manager. He supervises a part of the network that is dependant on his user profile.
Physical Interface:
Electrical transformers that decouple the line signals and adapt the form of signal for further transmission.
This functional block also manages clock extraction, signal loss monitoring and loopback functions.
Port:
A physical point at which the Network Element can be attached to a transmission medium. A port is either
a termination point or an origination point.
Regeneration Section:
When there is at least one repeater between two interconnected equipments, each part of the line section
between two repeaters or between a repeater and an line system is called a regenerator section.
Repeater:
Equipment used to regenerate a signal when it has travelled a long distance.
Section Adaptation:
Synchronizes the incoming higher order virtual container (VC 4) or the incoming STM-1 signal to the out-
going STM-1 frame or the outgoing high order virtual container.
Severity:
Linked to alarms, severities indicate the magnitude related to the failure.
Session:
A session is a temporary association between an operator and the SDH Manager. A session always
begins with the identification and authentication of the operator (the login phase) and ends with the exit
of the operator from the SDH Manager (the logout phase). A session generally lasts a few hours.
Transmit Fail:
Alarm that indicate a dysfunction in the transmission of the signal.
Telecommunication Network:
Describes the network to be managed. Provides the transmission, the transport and the switching sup-
ports to the interconnected Network Elements.
Terminal Point:
Describes either the origin or the termination of a signal in an equipment. Is related to a port.
Thresholding:
This is the assignment of a specified value to monitored parameters ( for example BIt Error Rates) that,
when exceeded, generate trouble indications.
Tributary Unit:
Entity composed of a virtual container to which is added a pointer that indicates the position of the con-
tainer in the STM-N frame.
User Profile:
Identifies the functionalities of the SDH Manager to which a user has access. A finite number of predefined
user profiles is determined by a fixed set of FADs.
Virtual Container:
Virtual Containers are managed by the SDH Manager. Entity composed of an information signal to which
a path overhead has been added. The path overhead is used in the management of the information signal.
Different types of virtual containers exist depending on the rate of the information signal. Lower and Higher
order virtual containers exist. The SDH norm identifies VC11, VC12, VC2, VC3 and VC4 virtual containers
named from the lowest (VC11) to the highest (VC4) container capacity.
Wrapping:
Wrapping is the technique that enables the most recent entries in a file to replace the oldest when a file
is full.
F N
NAP, 177
fault localization, 590
Navigation to/from
Forced Switch / Span, 670
Alarms, 54
Forced Switch Ring, 667
NE, 615
Node, 622
H NODE CONDITION, 657
NPE Ring, 644
HO-trail, 595
P
I
Path, 180, 592, 606
Implementation, 168 Physical Connection, 617
Inhibition chain, 663 Physical connection, 594
Intermediate nodes, 644 PM, 740
Pop-up menus, 46
Probable Causes, 555
L protocol message, 644
Leg, 349 protocol reply, 644
List dialogue boxes, 47 protocol request, 644
Lockout, 663 Pull down menus, 46
Scope of this activity is the improvement and innovation of customer documentation through the under-
standing of customer needs.
You can send them to your Local Alcatel Technical Assistance Center.
The following form supplies an example only of useful info, as a guide of the type of expected feedback.
It is possible fill part of the form, add other data and so on.
• copying the example form, filling it and sending it to your Local Alcatel Technical Assistance
Center. In this case handbook data are already available at the page bottom.
• using the same form available as a file in the relevant documentation CD-ROM, saving, filling
and sending it by e-mail to your Local Alcatel Technical Assistance Center.
• creating a dedicated form on paper or file and sending it to your Local Alcatel Technical Assis-
tance Center.
We reserve to modify consequently the handbook according to the corretness and congruence of the sug-
gestion and requests.
How to deepen:
Other comments/suggestions
Errors Identified
Reader Info
Name:
Company:
Address:
E-mail:
Phone:
www.alcatel-lucent.com