Professional Documents
Culture Documents
V100R019C00
Issue 07
Date 2020-05-15
and other Huawei trademarks are trademarks of Huawei Technologies Co., Ltd.
All other trademarks and trade names mentioned in this document are the property of their respective
holders.
Notice
The purchased products, services and features are stipulated by the contract made between Huawei and
the customer. All or part of the products, services and features described in this document may not be
within the purchase scope or the usage scope. Unless otherwise specified in the contract, all statements,
information, and recommendations in this document are provided "AS IS" without warranties, guarantees
or representations of any kind, either express or implied.
The information in this document is subject to change without notice. Every effort has been made in the
preparation of this document to ensure accuracy of the contents, but all statements, information, and
recommendations in this document do not constitute a warranty of any kind, express or implied.
Website: https://www.huawei.com
Email: support@huawei.com
Purpose
This document describes the network position, highlights, architecture,
configuration, functions and features, and usage scenarios of iMaster NCE. With
this document, you can obtain an overall understanding of this product.
The features related to unified network management and control depend on NCE
components deployed. If only NCE management components are deployed, only
management capabilities can be implemented.
Intended Audience
This document is intended for:
Symbol Conventions
The symbols that may be found in this document are defined as follows.
Symbol Description
Symbol Description
GUI Conventions
The GUI conventions that may be found in this document are defined as follows.
Convention Description
Command Conventions
The command conventions that may be found in this document are defined as
follows.
Convention Description
Convention Description
Change History
Issue Date Description
Contents
2 New Features............................................................................................................................8
3 Architecture............................................................................................................................ 10
3.1 Solution Architecture........................................................................................................................................................... 10
3.2 Software Architecture.......................................................................................................................................................... 13
3.3 External Interfaces................................................................................................................................................................ 15
3.3.1 NBIs........................................................................................................................................................................................ 16
3.3.1.1 XML NBI............................................................................................................................................................................ 17
3.3.1.2 CORBA NBI....................................................................................................................................................................... 19
3.3.1.3 SNMP NBI......................................................................................................................................................................... 21
3.3.1.4 Performance Text NBI (FTP Performance Text NBI).......................................................................................... 22
3.3.1.5 RESTful NBI...................................................................................................................................................................... 22
3.3.2 SBIs......................................................................................................................................................................................... 25
3.4 Southbound DCN Networking......................................................................................................................................... 28
4 Deployment Schemes........................................................................................................... 31
4.1 On-Premises Deployment.................................................................................................................................................. 31
4.1.1 Deployment on Physical Machines..............................................................................................................................31
4.1.2 Deployment on Virtual Machines................................................................................................................................ 33
4.2 Deployment on Private Clouds.........................................................................................................................................36
4.3 EasySuite Deployment Tool............................................................................................................................................... 39
5 Configuration Requirements.............................................................................................. 41
5.1 Server Hardware Configurations for On-Premises Deployment...........................................................................41
5.2 VM Configurations for Private Cloud Deployment....................................................................................................41
7 Usage Scenarios...................................................................................................................231
7.1 IP Backbone.......................................................................................................................................................................... 231
7.2 5G Bearer.............................................................................................................................................................................. 233
8 High Availability..................................................................................................................237
8.1 Local HA................................................................................................................................................................................ 238
8.2 Disaster Recovery Solutions............................................................................................................................................ 240
9 Security.................................................................................................................................. 250
9.1 Security Architecture......................................................................................................................................................... 250
9.2 Security Functions.............................................................................................................................................................. 251
11 Specifications..................................................................................................................... 258
11.1 System-Wide Performance Specifications............................................................................................................... 258
11.2 NE Management Capabilities and Maximum Concurrent Client Connections...........................................265
11.3 Service Management Capabilities.............................................................................................................................. 266
11.4 Equivalent Coefficients................................................................................................................................................... 268
A Appendix............................................................................................................................... 399
A.1 Standards Compliance...................................................................................................................................................... 399
A.2 Glossary................................................................................................................................................................................. 406
1 Introduction
1.1 Positioning
1.2 Highlights
1.1 Positioning
Trends and Challenges
With the rapid development of the Internet industry and the advent of the cloud
era, new business models are emerging one after another, and enterprises are
moving towards cloudification and digitalization. The telecom industry, as a digital
transformation enabler for various industries, faces both challenges and new
business opportunities.
Service cloudification results in great flexibility and uncertainty in service
applications. However, there is a huge gap between carriers' infrastructure
networks and various applications.
● A large number of legacy networks coexist with newly-built software-defined
networking/network functions virtualization (SDN) networks, making it
difficult or costly to adapt to new services. Especially, deploying enterprise
private line services encounters long time to market, slow customer response,
and inflexible packages.
● With the migration of enterprise applications to the cloud and the
development of new services such as the telecom cloud, the network traffic in
carriers' pipes is more dynamic and unpredictable, making traditional network
planning and optimization impracticable and posing high requirements on
Service Level Agreement (SLA).
● With the continuous increase in the network scale and complexity, O&M
complexity is intensified. Carriers urgently need to take automatic deployment
measures to reduce the skill requirements for O&M personnel and effectively
control the operating expense (OPEX) in a long term.
Therefore, an intelligent adapter layer (that is, a brand-new management, control,
and analysis system) needs to be established between the service applications and
the infrastructure networks. The system must be able to abstract network
resources and capabilities, implement automatic and centralized scheduling, and
Product Positioning
iMaster NCE effectively associates physical networks with business intents. In the
southbound direction, it implements centralized management, control, and
analytics of global networks, as well as enabling cloud-based resource
management, full-lifecycle automation, and intelligent closed-loop management
driven by data analytics based on business and service intents; In the northbound
direction, it provides open network APIs for quick integration with IT systems.
NCE is located at the management and control layer of the cloud network:
● NCE manages and controls IP, transport, and access devices on lower-layer
networks, supports unified management and control of SDN and legacy
networks, and supports automation of single-domain, multi-domain, and
cross-layer services.
NCE can also connect to a third-party management and control system to
implement cross-vendor service orchestration and automation.
● NCE also opens capabilities to support interconnection and integration with
upper-layer OSSs, BSSs, and service orchestrators to support quick
customization of the application layer.
The goal of NCE is to build an intent-driven network (IDN) that is first automated,
then self-adaptive, and finally autonomous.
● Automated: Network deployment and maintenance are automated
throughout the network lifecycle.
● Self-adaptative: Service policies are automatically generated based on big
data using the real-time Analyzer to implement proactive maintenance and
closed-loop optimization.
● Autonomous: Artificial intelligence and machine learning are used to build an
intelligent network that can automatically generate dynamic policies.
1.2 Highlights
NCE is a network lifecycle automation platform that integrates management,
control, and analysis. It focuses on service self-adaptation, O&M automation, and
network autonomy to support carriers' transformations to network cloudification
and digital operations.
NCE adopts a cloud service architecture, and its management, control, and
analysis modules can be deployed on demand to meet different customer
requirements in different scenarios.
2 New Features
This section describes the changes in key features compared with the previous
NCE version.
Network New Compute E2E optimal paths for TE tunnels and centrally
Path manage network topology information to improve
Managem network resource utilization.
ent
IP Traffic New This app optimizes the paths of IP services. For this
Optimizat purpose, it collects network-wide topology, traffic, and
ion link bandwidth information in real time, optimizes services
to user-specified paths, and delivers the new paths to
forwarders. To leverage network bandwidths, it shows
traffic distribution and network resource utilization and
provides data support and implementation methods for
on-demand traffic scheduling.
Mobile New For IP RAN and PTN 5G networks, path restoration and
Transport quality visualization capabilities are provided to monitor
Service base station services in an E2E manner. This enables users
Assurance to quickly locate and rectify faults based on analysis
results of indicators, such as SLA.
3 Architecture
● IT/OSS/application layer
The IT/OSS/application layer is a platform for carriers to implement digital
operation transformation. In addition to traditional OSS and BSS, the IT/OSS/
application layer also includes service orchestrator, policy generators based on
big data analysis and artificial intelligence, and e-commerce portals that
support self-service. The IT/OSS/application layer provides functions such as
network infrastructure resource presentation, service path presentation, and
service policy management to implement end-to-end operation of the entire
network. Carriers provide application services to customers through this layer,
including traditional services such as broadband, video, and B2B enterprise
private line services and emerging services such as cloud computing and
vertical industry IoT.
● NCE
In the southbound, NCE implements centralized management, control, and
analysis of network infrastructure, enables cloud-based resources, full lifecycle
automation, and intelligent closed-loop driven by data analysis for business
and service intension. In the northbound, NCE provides open network APIs for
quick integration with IT systems, helping carriers accelerate service
innovation and implement e-commerce operations.
The following table lists the scenario-based apps supported by NCE (IP Domain).
Network Path Compute E2E optimal paths for TE tunnels and centrally
Management manage network topology information to improve
network resource utilization.
3.3.1 NBIs
NCE offers network monitoring information, such as the alarm, performance, and
inventory information, for OSSs through NBIs. The NBIs support network
management, control, and analysis functions, such as service configuration and
diagnostic tests. Through the NBIs, NCE can integrate with different OSSs flexibly.
The devices of each product domain support different NBI functions. For details,
see the following tables.
Supported √
Not supported ×
XML Alarm √ √ √ √ √ × √
(MTO
SI) Performanc √ √ × × √ × √
e
Inventory √ √ √ √ √ × √
Configurati √ √ √ √ √ × √
on
CORB Alarm √ √ √ √ √ × √
A
SNMP Alarm √ √ √ √ √ √ √
Perfor Performanc √ √ √ √ √ × √
manc e
e text (Historical
NBI Performanc
(FTP) e)
RESTf Alarm √ √ √ √ √ √ ×
ul
Performanc × × × × × × ×
e
Inventory × × × × × × √
NOTE
Only
VRPv
8-
base
d
PTN
NEs
are
supp
orted
.
Configurati √ √ × × √ √ ×
on
Performance Indicators
Indicator Description
Number of notification 10
connections
Alarm notification More than 60 records per second when three OSSs
processing capability are connected
Alarm notification Shorter than 10s when three OSSs are connected
transmission delay
IP Functions
Complying with the TMF MTOSI 2.0 series standards, the XML NBI enables NCE to
provide alarm, performance, inventory, configuration, diagnostic test, and
protection group management on IP devices for OSSs.
The XML NBI supports the following functions:
● Alarm management
– Alarm reporting
– Synchronization of active alarms
– Alarm acknowledgment
– Alarm unacknowledgment
– Alarm clearance
– Collection of alarm statistics
Performance Indicators
Indicator Description
Number of 4.
concurrent ● The maximum invocation concurrency of the CORBA NBI
interface is 4. If the number of invocations exceeds 4, the
requests invocations are queued.
● For interfaces that involve a large amount of data, such
as getAllEquipment and getHistoryPMData, it takes a
long time for the NCE server to process the interface
invocations. The number of concurrent interface
invocations is small. Therefore, single-thread serial
invocation is recommended. Otherwise, an error
indicating a fully loaded task may be reported.
Alarm sending Shorter than 10s when three OSSs are connected.
delay
NOTICE
● The alarm handling capability of the CORBA NBI depends on many factors,
such as the alarm quantity on the network, and CPU performance and memory
size of the server. At the same time, the CORBA NBI sends alarms
synchronously, that is, another alarm will not be sent until the OSS receives the
previous alarm and responds to the CORBA NBI. Therefore, the network
stability between NCE and the OSS and the handling capability of the OSS will
affect the alarm handling capability of NCE.
● If an alarm storm occurs, the CORBA NBI will possibly reach its handling limit.
The CORBA NBI can report a maximum of 1,000,000 alarms within one hour. To
ensure the stability of the system, the CORBA NBI will discard some alarms if
the alarm quantity exceeds 1,000,000. You are recommended to handle
network faults instantly if an alarm storm occurs. In addition, the OSS is
suggested to synchronize alarms actively at proper time, for example, when the
system is idle.
IP Functions
Complying with the TMF MTNM V3.5 series standards, the CORBA NBI enables
NCE to provide unified alarm and inventory management for IP devices.
● Alarm management
– Alarm reporting
– Synchronization of active alarms
– Alarm acknowledgment
– Alarm unacknowledgment
– Alarm clearance
● Inventory management
– Query of physical inventory, including NEs and boards.
● Configuration management
– Configuration of E2E services for tunnels (only for PTN devices) (static-CR
tunnel)
– Configuration of E2E services (only for PTN devices) (CES PWE3 and
Ethernet PWE3)
Performance Indicators
Indicator Description
Functions
The SNMP NBI supports the following functions:
● Alarm reporting
● Synchronization of active alarms
● Alarm acknowledgment
● Alarm unacknowledgment
● Alarm clearance
● Heartbeat alarm reporting
● Setting of alarm filter criteria
● Alarm maintenance status reporting
Performance Indicators
Maximum number of As the FTP client, NCE transmits files to one OSS
connected OSSs only.
Functions
The performance text NBI supports the following functions:
● Generates the performance text file in a unified format (*.csv).
● Exports the performance text file based on the collection period (the period
can be 5, 10, 15, 30, 60, 360, or 1440 minutes).
● Exports the performance text file at the scheduled time (5, 10, 15, 30, 60, 360,
or 1440 minutes; the time must be longer than the collection period).
● Specifies the start time to export the performance text file.
● Checks data integrity of the performance text file. If the performance text file
fails to be generated, the data will be saved to the performance text file that
will be generated in the next period. (SDH, WDM and OTN performance data
does not support this function.)
● Transmits the performance text file to the specified FTP or SFTP server.
● Exports the performance text file by indicator.
● Specifies the start time to delete the performance text file.
● Clears earlier performance text files periodically.
● Specifies the number of data records in a single file.
Performance Indicators
Indicator Description
Number of concurrent 10
requests for a single
interface
IP Functions
● Resource management
– Query NEs, boards, ports, fiber links, and IGP links.
– Report resource changes of NEs, ports, fiber links, and IGP links.
● Service management
– EVPN Over VxLAN, SR TE, RSVP TE, and L3VPN provisioning
– Query of L3VPN, EVPN, and tunnel services
– Service path computation
– Service deletion
● Network optimization
– IP traffic optimization
– MPLS traffic optimization
● Fault management
– Alarm subscription
– Alarm reporting
– Alarm synchronization
– Alarm acknowledgment/unacknowledgement
– Query of static alarm information
Restrictions and limitations:
The RESTful interface IDs have been unified. The new RESTful interface models are
unified, including L2EVPN/L3VPN service provisioning interfaces, NE, board, and
port inventory query interfaces, and L3VPN, EVPN, and tunnel service query
interfaces. Other capabilities are planned based on market requirements.
3.3.2 SBIs
Using SBIs, NCE can interconnect with physical-layer network devices and other
management and control systems to implement management and control
functions.
The IP devices that NCE can manage include NE series routers, CX series routers,
Ethernet switches, BRASs, ATN devices, and security devices.
Telnet/ The Telnet and STelnet SBIs are a basic type of All IP devices
STelnet interface used for remote login to and
management of NEs. The Telnet and STelnet
SBIs address the disadvantages of the SNMP
SBI and allow NCE to provide more
management functions.
● Telnet is a TCP/IP-based network
management protocol at the application
layer. Through the Telnet SBI, users can log
in to an NE in the CLI and run commands
directly in the CLI to maintain and
configure the NE. Using the TCP protocol at
the transmission layer, the Telnet protocol
provides services for network
communication. The Telnet protocol
transmits communication data in plain text,
which is not secure.
● STelnet provides secure Telnet services
based on SSH connections. Providing
encryption and authentication, SSH
protects NEs against attacks of IP address
spoofing.
TFTP/FTP/ TFTP, FTP, and SFTP are TCP/IP-based network All IP devices
SFTP management protocols at the application
layer and are dependent on the UDP protocol.
● TFTP is a simple and low-overhead protocol
(as compared with FTP and SFTP) used to
upload and download files. The TFTP
protocol does not support password
configuration and transfers file contents in
plain text.
● FTP is a set of standard protocols used for
transferring files on networks. The FTP
protocol transfers passwords and file
contents in plain text.
● SFTP uses the SSH protocol to provide
secure file transfer and processing. For data
backup using the SFTP protocol, passwords
and data are encrypted during
transmission.
Routers and switches whose VRP version is 5.7
or later use the TFTP, FTP, or SFTP SBI to
synchronize data with NCE. IP NEs use NE
Software Management to implement
functions such as NE upgrades, backup, and
patch installation.
Syslog The Syslog SBI serves as an interface for NCE All IP devices
to receive system logs from NEs. With the
Syslog SBI, NCE can manage NE logs. IP NEs
support Syslog running logs.
NCE and each managed device communicate with each other through the internal
data communication network (DCN) or external DCN. The two modes can also be
used together for DCN networking.
For details about the bandwidth requirements of the southbound DCN, see 5.5 Bandwidth
ConfigurationsBandwidth Configurations.
4 Deployment Schemes
Based on whether Huawei provides E2E support for software and hardware, NCE
supports two deployment modes: on-premises and private cloud.
System Networking
Based on different system protection expectations, deployment on physical
machines can be divided to two modes: single site and disaster recovery (DR).
● Single site: A complete set of NCE is deployed in a place with internal
protection enabled.
● DR system: Two sets of NCE with the same installation solution are deployed
in two places to form a DR system. In addition to the internal protection of a
single site, the two sets of NCE protect each other.
● The management DCNs of the primary and secondary sites can be isolated from each
other or not.
● The DR system requires high bandwidth. A replication link must be configured between
the primary and secondary sites.
The DR system requires high bandwidth. A replication link must be configured between the
primary and secondary sites.
Basic Concept
EasySuite is a green web-based engineering tool provided by Huawei. It covers
complex engineering scenarios such as planning, installation, and migration. Using
EasySuite to create an NCE installation project simplifies installation and
deployment operations and improves efficiency.
5 Configuration Requirements
NCE has specific requirements on the hardware, software, client, and bandwidth to
ensure the stable running of the system.
5.1 Server Hardware Configurations for On-Premises Deployment
5.2 VM Configurations for Private Cloud Deployment
5.3 Server Software Configurations
5.4 Client Configurations
5.5 Bandwidth Configurations
Configuration Constraints
● Do not configure CPU, memory, or storage overcommitment. Otherwise, NCE
performance will deteriorate.
DR arbitration - 1 4 8 150
PC Minimum Configuration:
● CPU: 2 Core, 2.6GHz
● Memory: 4GB
● Hard disk: 8GB
Recommended Configuration:
● CPU: 4 Core, 3.1GHz
● Memory: 8GB
● Hard disk: 8GB
Type Requirements
Web ● Recommended:
browser – Google Chrome 70 or later (32-bit or 64-bit)
– Firefox ESR 61.0.1 or later (32-bit or 64-bit)
● Compatible:
– Google Chrome 57 or later (32-bit or 64-bit)
– Firefox ESR 52 or later (32-bit or 64-bit)
Type Requirements
Network delay ● Between NCE and external systems (client, NE, and
third-party arbitration site): < 50 ms
● Between NCE and OSS: < 20 ms
● Between NCE VM nodes: < 10 ms
● Between the primary and secondary sites of the DR
system: <50 ms (If NCE contains the Controller, it is
recommended that the network delay between the
primary and secondary sites be less than 20 ms.)
Type Requirements
Packet loss rate ● Between NCE and external systems (client, NE, OSS,
and third-party arbitration site): < 1%
● Between NCE VM nodes: < 0.2%
● Between the primary and secondary sites of the DR
system: < 1% (If NCE contains the Controller, it is
recommended that the packet loss rate between the
primary and secondary sites be less than 0.1%.)
Bandwidth between The bandwidth between each OSS and the NCE NBI is 10
the server and OSS Mbit/s or above.
Bandwidth for communication between the server and
OSSs = Bandwidth for communication between the server
and each OSS × Number of OSSs For example, if three
OSSs are connected to the REST NBI of the same NCE, the
required bandwidth is 3 x 10 Mbit/s or above. If there are
two OSSs, one is connected to the REST NBI of NCE, and
the other is connected to the SNMP NBI of NCE, the
required bandwidth is 10 Mbit/s +10 Mbit/s or above.
Type Requirements
Type Requirements
Table 5-8 Bandwidth between the primary and secondary sites of the NCE
Manager DR system (without performance data collection)
Network Scale Minimum Bandwidth Recommended
Bandwidth
Table 5-9 Bandwidth between the primary and secondary sites of the NCE
Manager DR system (with SNMP performance data collection)
Network Scale Performance Minimum Recommen
Collection Capability Bandwidth ded
with Max/Min Data Bandwidth
Aggregation Disabled
(Unit: Max Equivalent
Records/15 Minutes)
Table 5-10 Bandwidth between the primary and secondary sites of the NCE
Manager DR system (with transport NE performance data collection)
Network Scale Minimum Recommended
Bandwidth Bandwidth
System Interconnection
● Southbound interconnection: Integrated with Huawei or third-party systems
to quickly access NEs or virtual resources and obtain NE resources, alarm and
performance data, and virtual resources required for NCE service provisioning
or assurance. This improves interconnection efficiency.
– Configuring and managing southbound drivers: Before interconnecting
NCE with a southbound system, users need to import external drivers by
means of driver lifecycle management and configure SNMP parameters
so that SNMP alarms can be reported to quickly adapt to NEs and service
models (resources, alarms, and performance) of the interconnected
system. This achieves quick driver access and improves interconnection
efficiency. Users can also query driver types and monitor and delete
driver instances for unified driver management.
System Configuration
● Time synchronization: NCE nodes are managed and maintained in a unified
mode. Therefore, the Coordinated Universal Time (UTC) on each node must
be the same to ensure that NCE can properly manage services and data on
the nodes. An NTP-based external clock source is required to serve as the NTP
server of NCE so that the system time can be adjusted at any time without
manual intervention.
– A maximum of 10 NTP servers can be added on NCE. Only one active
NTP server can be configured, and the active NTP server is mandatory. In
a disaster recovery (DR) system, the primary and secondary sites must
use the same NTP server to ensure time consistency between the two
sites.
– After an active NTP server is configured, the OMP node synchronizes time
with the active NTP server preferentially. Service nodes then synchronize
time with the OMP node.
– When the active NTP server fails, NCE selects an available NTP server
from the standby NTP servers within 15 minutes and sets it as the active
NTP server. If multiple NTP servers configured on NCE become invalid,
the OMP node cannot synchronize time with the NTP server, and service
nodes will no longer synchronize time with the OMP node.
● License management: Updating and maintaining a license allow the system
to properly run based on the features, versions, capacity, and validity period
authorized in a license file.
License management allows users to initially load, update, and routinely
maintain licenses.
– Initially loading a license
After the system is deployed, you need to load a license by importing
license files so that you can use the system properly.
– Updating a license
During O&M, you need to update a license file under any of the following
conditions:
▪ Automatic mode: The O&M personnel set the message content and
message sending rules. Then, NCE automatically sends alarms and
reports to relevant personnel in the form of SMS messages or emails
through the short message service gateway (SMSGW) or mail server
connected to NCE.
System Monitoring
Global monitoring capability is supported to monitor NCE resource indicators such
as services, processes, nodes, and databases. This helps conduct predictive analysis
and detect potential risks in time. For key resources, the administrator can set
thresholds to trigger alarms and handle exceptions promptly.
● Service and process monitoring: Monitors the service running status and
indicators such as the CPU usage, memory usage, and number of handles.
When a process in a service stops abnormally or becomes faulty, NCE
attempts to restart the process. A maximum of 10 consecutive restarts are
allowed. If the number is exceeded, an alarm is generated, requesting users to
process the exception manually.
● Node monitoring: Monitors node indicators such as the CPU, virtual memory,
physical memory, and disk partitions. If any resource of the node encounters
an exception, the node is displayed as abnormal. If a key resource remains
abnormal within a sampling period, an alarm is generated.
● Database monitoring: Monitors database indicators such as the space,
memory, and disks. If any resource of the database encounters an exception,
the database is displayed as abnormal. If a key resource remains abnormal
within a sampling period, an alarm is generated.
System Maintenance
● System backup and restore: Backs up and restores the dynamic data, OS,
database, management plane, or application software of NCE. Data is backed
up in a timely manner. If any backup object is abnormal, you can use the
corresponding backup file to recover the object to the normal state.
● O&M management: Provides system maintenance and management
functions to help O&M personnel learn the health status of the system during
system running and reduce running risks. If a system fault occurs, fault
information can be collected for fault demarcation and locating to facilitate
repair and reduce losses.
– Health check: Checks and evaluates hardware, OSs, databases, networks,
and NCE services to learn the health status, detect abnormal check items,
and determine whether operation or running risks exist in NCE.
– Data collection: Provides data collection templates based on fault
scenarios, services, and directories. When a system fault occurs, O&M
personnel can collect logs and database tables as required and analyze
and locate the fault.
– Quick fault demarcation: Each service operation in the system is
implemented by invoking one or more services. During service operations,
the system automatically collects statistics on service operation status,
memory usage, and CPU usage for O&M personnel to quickly demarcate
faults and analyze resource consumption.
– Quick fault locating: This function provides default locating templates for
automatic fault locating. O&M personnel select templates based on fault
scenarios. This helps O&M personnel quickly obtain solutions and shorten
the fault locating time.
– System guard: System guard forwards critical and major alarms and
alarms (including common alarms, OS alarms, hardware server alarms,
and OMP alarms) that potentially affect the stable running of NCE from
the O&M plane to the management plane, and displays a pop-up
window to remind O&M personnel to view alarm details and handle
alarms in a timely manner on the System Guard page, ensuring the
normal running of NCE.
– Unified Monitoring: The unified monitoring function monitors the real-
time and historical data of NCE and compares and analyzes the data in
multiple dimensions to provide data reference for O&M personnel.
Help System
NCE provides a layered design for the help system adapting to user needs in
diverse scenarios. The help system supports anytime, anywhere, and on-demand
learning. A variety of help forms such as tooltips, panels, question mark tips, and
Information Center are provided. All necessary information is directly displayed on
the GUI. Information that is closely related to the current operation is folded. You
can expand the information if necessary. Systematic learning information is placed
in the Information Center.
Alarm severity
Alarm severities indicate the severities of faults. Alarms need to be handled
depending on their severity. Alarm severities can also be redefined, as shown in
Table 6-2.
Different handling policies apply to different alarm severities. You can change the
severity of a specific alarm as required.
The severity of an alarm needs to be adjusted when the impact of the alarm becomes
larger or smaller.
Alarm statuses
Table 6-3 lists the alarm statuses. Figure 6-2 lists the alarm status relationship.
Acknowledged and cleared alarms are moved to the historical alarm list, and a
non-historical alarm is called a current alarm. Table 6-4 shows the definition of
an alarm.
Alarms or events are displayed on the page when NEs, services, and
interconnected third-party systems detect their exceptions or significant status
changes. Table 6-6 describes the types of alarms and events.
Operation alarm Alarms generated when the required services cannot run
properly due to problems such as service unavailability,
faults, or incorrect invocation. Example: service rejection,
service exit, and procedural errors.
Type Description
File transfer status Alarms or events reported when the file transfer succeeds
or fails.
Alarm merging To help you improve the efficiency of monitoring and handling
rule alarms, alarm management provides alarm merging rules.
Alarms with the same specified fields (such as location
information and alarm ID) are merged into one alarm. This
rule is used only for monitoring and viewing alarms on the
Current Alarms page and takes effect only for current alarms.
The specific implementation scheme is as follows:
● If a newly reported alarm does not correspond to any
previous reported alarm that meets the merging rule, the
newly reported alarm is displayed as a merged alarm and
the value of Occurrences is 1.
● If the newly reported alarm B and the previous reported
alarm A meet the merging rule, alarm B and alarm A are
merged into one alarm record and are sorted by clearance
status (uncleared alarms are displayed first) and occurrence
time in descending order.
If alarm A is displayed on top, it is still regarded as a
merged alarm, and the Occurrences value of the merged
alarm increases by one. Alarm B is regarded as an individual
alarm.
If alarm B is displayed on top, it is regarded as a merged
alarm, and the Occurrences value of the merged alarm
increases by one. Alarm A is regarded as an individual
alarm.
In the alarm list, click Occurrences of an alarm, you can
view the detailed information about the merged alarm and
individual alarm.
● If a merged alarm is cleared, it is converted into an
individual alarm. All individual alarms will be sorted by
clearance status (uncleared alarms are displayed first) and
occurrence time in descending order. The first one is
regarded as a merged alarm.
● If a merged alarm or individual alarm is cleared and
acknowledged, the alarm will be converted to a historical
alarm and the value of Occurrences decreases by one.
Mechanism Description
Alarm dump To avoid excessive alarm database data, the system processes
rule events, masked alarms, and historical alarms every two
minutes according to the following rules. The dumped alarms
or events cannot be queried in the alarm or event list.
● If the database space usage reaches 80%, alarm
management dumps the data in the database to files
according to the sequence of occurrence time and data
table type (event, masked alarm, or historical alarm). When
the space usage after dumping reaches 80% of the usage
before dumping, the dumping is stopped.
● The dumped file will be deleted after 180 days.
● If the total size of the dumped files exceeds 1 GB or the
total number of files exceeds 1000, the system deletes the
earliest files.
Function Description
Function Description
For details about how to monitor alarms or events and handle alarms, see Table
6-9.
Monitoring and O&M personnel can monitor alarms and view alarm or event
Viewing Alarms information in alarm management in real time.
or Events ● Alarm or event list
– Provides a current alarm list to push alarms to the
Current Alarms page. O&M personnel can monitor and
handle alarms in real time using the list.
– Provides an alarm log list. You can view current and
historical alarms. By default, 20,000 alarms can be
displayed.
– Provides an event log list, which presents the event
messages sent by devices to the system. By default,
20,000 events can be displayed.
● Statistics panel
On the Current Alarms page, the statistics panel is
provided to display the following statistics:
– Top 10 Alarms: Collects statistics on the top 10 alarms
that are most frequently reported.
– Duration: Collects statistics on the number of current
alarms by duration.
– Top 10 Alarm Sources: Collects statistics on the top 10
alarm sources with the largest number of current
alarms.
– Severity: Collects statistics on the total number of
current alarms and the number of current alarms at
each alarm severity.
– Status: Collects statistics on the number of alarms by
acknowledgement and clearance status.
● Alarm or event name group
You can add multiple alarm or event names to a name
group to perform operations on them at a time.
● Object group
You can add multiple alarm or event sources to an object
group to perform operations on them at a time.
● Alarm sounds and indicators
When a new alarm is reported, alarm management plays
a sound. The alarm indicator that corresponds to the
severity of the alarm starts to flash to remind you to
handle alarms in a timely manner.
● Filter
You can set criteria to filter alarms that require special
attention.
● Browsing alarms by status or severity
A page is divided into four areas to display current alarms
by status or severity.
Function Description
Table 6-10 describes the routine maintenance functions such as alarm data
management.
User Management
● User
– Information about a user includes a user name, password, and
permissions.
– User admin is the default user in the system, that is, the system
administrator. User admin can manage all resources and has all
operation rights. This user is attached to both the Administrators and
SMManagers roles.
– The user who has the User Management permission in the default
region is a security administrator.
– The Administrators role has all the permissions except User
Management. The user attached to this role is an administrator.
● Role
Users attached to a role have all the permissions granted to the role. You can
quickly authorize a user by attaching the user to a role, facilitating permission
management. Figure 6-3 shows role information.
Users attached to a role have all the permissions granted to the role and can
manage all the resources managed by the role. A user can be attached to
multiple roles. If a user is attached to multiple roles, this user has all the
permissions granted to the roles and can manage all the resources managed
by the roles.
Default roles cannot be deleted and their permissions cannot be modified
because the permissions are granted by the system. The system provides the
following default roles:
NOTICE
Administrators The user group has all the permissions except User
Management, Query Security Log, View Online Users,
and Query Personal Security Log. The user attached to
this role is an administrator.
The role to The user group has the Invoke Southbound APIs
invoke permission.
southbound
APIs
NBI User Group The user group has the permission to configure the
northbound interfaces such as SNMP, CORBA, XML,
OMC, TEXT, and RESTful NBIs.
Guest The domain of this user group is All Objects, and it has
operation rights for default monitor operation sets. They
can perform query operations, such as querying statistics,
but cannot create or configure objects.
Maintenance The domain of this user group is All Objects, and it has
Group operation rights for default maintenance operation sets.
In addition to the rights of the Guests and Operator
Group groups, users in this group have the rights to
create services and perform configurations that affect
the running of the NCE and NEs. For example, they can
search for protection subnets and trails, delete composite
services, and reset boards.
Operator Group The domain of this user group is All Objects, and it has
operation rights for default operator operation sets. In
addition to the rights of the Guests group, users in this
group have the rights to modify, (rights to perform
potentially service-affecting operations are not involved).
For example, they can change alarm severities.
Permission Management
A permission defines what operations a user can perform on what objects.
Permission elements include an operator, operation objects, and operations as
shown in Figure 6-4.
● Permission
– Users act as operators.
– Operation objects include the system and resources (physical and virtual
resources, such as servers, network devices, and VMs) where users
perform operations.
– Operations include application operations and device operations.
Application operations are performed on the system. Device operations
are performed on resources.
● Authorization mechanism
Authorization is a process of granting permissions on certain objects to users.
Authorization mechanism of User Management is as follows:
– To authorize a user with an object on which this user needs to perform
operations, add this object to the managed objects of the role that this
user is attached to.
● Users can perform application operations and device operations. If only managed
objects are configured for a role but no device operation is configured, users of this
role can view the managed objects after logging in to the system but do not have
the operation rights for the managed objects.
● If Assign rights to users directly is selected, permissions can be directly granted to
users.
● Authorization method
The authorization method of user management grants permissions by
attaching a user to a role. After the security administrator sets role
permissions (including managed objects and operation rights), the security
administrator attaches the user to a role so that the user has the permissions
of this role. If Assign rights to users directly is selected, permissions can be
directly granted to users.
User authorization allows security administrators to implement authorization
for all users in a post at one time. If the employees of a post are changed,
security administrators can delete the original user from the role and add the
new user to authorize the new user.
● Secondary authorization
Secondary authorization policies are required to ensure that users can
cautiously perform operations that are dangerous or have major impact.
Regions Management
Regions can be classified by geographic location or resource usage. Users can be
authorized based on regions.
The permissions and managed objects set for a region administrator on the
Mandate-Operation Rights and Mandate-Managed Objects tab pages can
be assigned by the region administrator to roles in the region.
● When users modify their personal data, such as mobile numbers and email
addresses, they are obligated to take considerable measures, in compliance with
the laws of the countries concerned and the user privacy policies of their company,
to ensure that the personal data of users is fully protected.
● To ensure the security of personal data, such as mobile numbers and email
addresses, these data is anonymized on the GUI, and HTTPS encryption
transmission channels are used.
● Resetting a User Password: If a user other than admin loses the password or
cannot change the password, this user needs to contact security
administrators to reset the password.
NOTICE
● You are not allowed to reset the password of user admin. If you forget the
password of user admin, it cannot be retrieved and you can only reinstall
the system. Therefore, ensure that you memorize the password of user
admin.
● For account security purposes, it is recommended that third-party system
access users contact the security administrator to periodically reset their
passwords.
Security Policies
Security Policies allow you to set access control rules for users. This function
improves O&M efficiency and prevents unauthorized users from performing
malicious operations in the system to ensure system security. The security policy
function allows you to set account policies, password policies, login IP address
control policies, and login time control policies.
● Account policies: An account policy includes the minimum user name length
and user login policies. Appropriate setting of an account policy improves
system access security. The account policy is set by security administrators
and takes effect for all users.
● Password policies: A password policy includes the password complexity,
change interval, and character limitation. Appropriate setting of a password
policy prevents users from setting weak passwords or using a password for a
long period of time, improving system access security. The password policy is
set by security administrators and takes effect for all users. A new password
policy does not affect the configured password.
● Login IP address control policies: A client IP address control policy provides a
control mechanism for checking the accessibility of the IP address used by an
external access request during system operation. After an IP address control
policy is set and applied, users are allowed to log in to the system only using
IP addresses within a specified IP address range.
● Login time control policies: A login time control policy provides a control
mechanism for checking the validity time of an external access request during
system operation. After a login time control policy is set and applied, users
are allowed to log in to the system only within the specified period.
Scenario
Log Management is used when you need to perform routine maintenance, locate
and troubleshoot faults, trace historical logs, and query operation logs across
systems.
● Routine maintenance
You need to view logs during routine maintenance. If there are logs recording
failed, partially successful, or unknown operations, or logs in Risk level,
analyze the exception causes and troubleshoot the faults.
● Fault locating and troubleshooting
To locate and troubleshoot faults occurring during system running, you can
analyze logs to detect whether risk-level operations or operations that affect
system security are performed.
● Historical log tracing
Logs are stored in the database after being generated. The system periodically
dumps logs from the database to a hard disk for sufficient database space.
The system periodically deletes the dumped logs from the hard disk for
sufficient disk space. To ensure the integrity and traceability of logs, you can
forward these logs to the Syslog server.
● Cross-system operation log query
If you need to query operation logs meeting the same criteria on different
systems, you can set filter criteria on one of the systems, save these criteria as
a template, and import the template to other systems.
Log types
Log Management allows the system to automatically record the information
about operations performed by users in the system and the system running status.
Log Management records five types of logs. Table 6-11 describes the log types.
Log Management
When operations are performed by users in the system or events are triggered by
the system, Log Management records logs and saves the logs to the Log
Management database for users to view on the GUI. In addition, Log Management
can automatically dump the logs from the database to the hard disk.
Figure 6-7 shows the principles of Log Management.
To trace user operations, system operations, and system tasks, you can forward
concerned logs to the Syslog server.
Log Forwarding
Log Forwarding Settings is used when users need to trace the logs recorded by Log
Management, and query and analyze the logs recorded by Log Management and
the logs of other functions (such as NE Syslog run logs and NE Syslog operation
logs) in real time.
● Users need to permanently store the logs recorded by Log Management so
that they can trace the logs to locate problems or rectify faults.
● Users need to query and analyze the logs recorded by Log Management and
the logs of other functions (such as NE Syslog run logs and NE Syslog
operation logs) in real time on Syslog servers so that they can centrally
manage the logs and detect and handle potential security risks in a timely
manner.
Figure 6-8 shows the principles of Log Forwarding Settings.
6.1.4.1 NAIE-I
Network artificial intelligence engine infer service (NAIE-I) provides AI model
management for intelligent incident management. Intelligent incident
management manages and trains probable root cause models through AI model
management. Before using the intelligent incident management function to
analyze alarms, you need to add and deploy probable root cause models on the AI
model management page.
The NAIE-I provides full-lifecycle management of AI algorithm models, including
model management, model deployment, inference execution, model retraining
and optimization, optimal selection and upgrade, and other one-stop services. The
NAIE-I provides a fully automated, manual-intervention-free main service
procedure for model self-evolution.
The telecom domain is evolving towards all-cloud networks. With the NAIE
solution, Huawei is committed to providing an industry-leading universal AI
platform and services for the telecom domain and enabling steadfast autonomous
driving networks featuring automation, self-optimization, self-healing, and
autonomy.
Scenarios
The NAIE-I is integrated to an NMS.
The NAIE-I is integrated into each single-domain control system or edge device.
This deployment mode is oriented to the real-time stream data processing
scenario, in which data is not stored locally. AI models share the online computing
platform and use the lightweight gPaaS for self-management.
Principles
An AI model developed based on NAIE model specifications is released in the AI
marketplace as a ZIP file. AI models downloaded from the AI marketplace or
obtained from a local file are dynamically loaded to the NAIE-I. The models are
published as microservices based on the dynamic AI model servitization
mechanism provided by the NAIE-I. The process is shown in Figure 6-10 (step 1 to
step 6).
During inference execution, the model engine parses, interprets, and executes the
AI model orchestration logic, and invokes the model service based on the
orchestration intention. The process is shown in Figure 6-10 (step 7 to step 10).
The prediction result meets or exceeds the expectation at the initial stage after the
AI model goes online, but no longer does so as time goes by. In this case, it is
costly to use new data for algorithm redesign and model retraining. The retraining
service can resolve this problem, The process is shown in Figure 6-10 (step 11 to
step 14).
Functions
The NAIE-I provides multiple functions, including inference execution, inference
data engine, and model package management.
The NAIE-I provides the following functions:
● Model package management
– Model packages can be uploaded, configured, deployed, and upgraded.
Models can be deployed on the GUI or in backend in silent mode.
– Users can view model package information, delete, start, and stop model
packages, and use the pip provided by model packages.
● Inference execution: Inference execution of AI models, traffic control, and
other capabilities are supported. The following inference frameworks are
supported:
– The machine learning framework provides the inference capability of
traditional machine learning.
– The deep learning framework provides the inference capability of the
deep learning model.
– The big data processing framework provides capabilities related to big
data processing. The supported big data processing capabilities vary
according to the form of the NAIE-I.
● Inference data engine: Data collection, data preprocessing operations such as
data extraction, filtering, and noise reduction, and generation of theme data
and sample data are supported to provide data services in various scenarios
based on AI computing.
noise reduction, alarm aggregation, root alarm analysis, incident category and flag
definition. It resolves pain points such as a large number of alarms, difficult root
cause identification, and low handling efficiency, and effectively improves the
automatic fault handling capability and reduces the O&M costs of carriers.
Alarm Handling
Alarm handling process includes the alarm noise reduction, alarm aggregation,
root cause analysis, and incident category and incident flag definition operations.
Table 6-13 describes the operation definitions.
Alarm Among massive alarms, there are some alarms that do not have
noise actual effects on fault handling, such as repeated alarms, invalid
reduction alarms, maintenance-state alarms, and idle alarms. These alarms
are considered as noises in alarms. Intelligent incident management
automatically filters alarm noises based on preconfigured noise
reduction rules accumulated by experts, reducing the number of
alarms to be handled.
Alarm Among massive alarms, multiple alarms are generated for the same
aggregati fault. These alarms have similar characteristics, such as similar
on alarm names, close alarm generation time, and associated alarm
path in the topology view. Intelligent incident management uses
multi-dimensional machine learning algorithms (such as time,
name, and topology information dimensions) and preconfigured
expert experience to automatically aggregate alarms caused by the
same fault to a group and use an incident to represent the group.
Operatio Description
n
Incident Based on fault scenarios and causes, incidents can be classified into
category the following: line, device software, device hardware, power
definition environment incident. Intelligent incident management classifies
fault scenarios based on incident classification rules.
Incident Status
Incidents can be in the Unacknowledged & uncleared, Unacknowledged &
cleared, Acknowledged & uncleared, or Acknowledged & cleared state. For
details, see Table 6-14.
Incident Description
Status
Incident Priority
Incident priority indicates the level and urgency of an incident. Users can take
measures based on the incident severity. Table 6-15 lists incident priorities.
Incident Categories
Incidents are classified into six categories: line incident, unreachable NE incident,
performance incident, device incident, environment-based incident, and service
incident. For details, see Table 6-16.
Service Process
After receiving the collected alarm data, intelligent incident service processes the
alarms, involving noise reduction, alarm aggregation, incident generation,
probable root cause analysis, and incident classification.
1. Data Pre-processing
Intelligent incident service obtains alarm data from the alarm service, queues
the alarms by time, slices the alarm queue at a certain interval, and writes the
periodic alarm queue into the data bus. Ensure the stability of the alarm
slicing result because the alarm slicing result affects the analysis result of the
incident. That is, the same input data sliced in the same time period
concludes the same slice data, which does not vary according to the execution
time. Based on this principle, intelligent incident service slices alarms at a full
minute.
If the slicing is not conducted at a full minute, the slicing result will become
unstable due to unstable execution time. Use slicing in the following two
figures as an example. For the same alarm input (alarm serial numbers are 1,
2, 3, and 4) in the same period, the slicing by minute starting at different time
points results in different alarm slices.
In the following figure, the slicing is conducted at a full minute, and the
slicing result is stable.
2. Noise Reduction
Intelligent incident service performs noise reduction to reduce the huge
number of alarms in NCE, which provides the basis for subsequent alarm
aggregation. Noise reduction filters out invalid alarms such as intermittent
alarms, and repeated alarms through the preset denoise rules to reduce
alarms in the next handling phase.
3. Aggregation Group and Service Impact Analysis
An aggregation group consists of two parts: alarm aggregation and conflict
incident merging.
a. Alarm aggregation
After the invalid alarms are filtered out, the remaining alarms are further
analyzed, and then aggregated using the correlation rules and
aggregation algorithms to generate incidents.
▪ Rule-based aggregation
The alarm list and aggregation logic are defined in the correlation
rules. By rule-based aggregation, intelligent incident service obtains
periodic alarms from the data bus based on the enabled correlation
rules, queries required resource data from the resource service, and
aggregates alarms that meet the filter criteria based on the rule logic
to generate an incident.
▪ Algorithm-based aggregation
In algorithm-based aggregation, alarms related to service topology
are aggregated first. Then, the remaining alarms are aggregated
based on the hierarchical clustering algorithm. The algorithm is used
to query the resource data (such as the topology distance) of the
alarms, and repeatedly combine the alarms whose topology
distances are smaller than the preset value to generate incidents.
b. Conflict incident merging
A device may carry different services. An alarm may be involved in the
analysis of multiple service scenarios. As a result, the alarm may belong
to multiple incidents. If multiple algorithms and rules are used for
parallel analysis in the same service scenario, an alarm may also belong
to multiple incidents. Therefore, the incidents generated by rule-based
aggregation and algorithm-based aggregation may contain the same
alarms. You need to merge the incidents that contain the same alarms to
ensure that one alarm belongs only to one incident.
4. Service impact analysis
Intelligent incident service analyzes alarm-affected services based on the NEs,
links, and service bearing relationships and provides the affected services in
an incident.
5. Fault Detection
In this phase, probable root cause analysis and classification will be conducted
for incidents generated by an aggregation group.
– Probable root cause analysis
Probable root cause analysis is conducted by means of the probable root
cause model deployed in AI Model Management.
The possible root cause analysis model deployed in AI Model
Management can be used to analyze the root causes of incidents.
Different methods are used to analyze the root causes of incidents based
on the different aggregation approaches.
▪ Classify incidents using the neural network algorithm, and mark the
incidents that need to concerned and those that need to be ignored.
6. Online Feedback
The web pages of Intelligent Incident Management allow you to manually
mark root alarms and non-root alarms to provide handling suggestions for
similar faults. The manually marked root causes can improve the algorithm.
The longer the system running time, the more accurate the fault analysis.
Functions
Intelligent incident management provides the following functions: rule
management, incident monitoring and viewing, and incident handling.
Table 6-17 lists the intelligent incident management functions.
Function Description
Function Description
information over NETCONF, SNMP, and ICMP to manage third-party devices. This
meets customer requirements for network convergence and service growth.
Functio Description
n or
Feature
DCN NCE communicates with NEs and manages and maintains network
manage nodes through a data communication network (DCN).
ment For details, see 6.2.1.2 DCN Management.
Functio Description
n or
Feature
Alarm Display
In the topology view, alarms are displayed in different colors or icons to indicate
different status of the subnets and NEs. The default method is color-coded display.
The alarm display in the topology view has the following features:
● The color of a topological node indicates the operating status (such as
normal, unknown, or offline) and alarm status of the monitored NE.
● When an NE generates multiple alarms of different severities, the color or
icon that indicates the highest alarm severity of these alarms is displayed in
the topology view.
● When multiple nodes in a subnet generate alarms, the subnet is displayed in
the color or icon that indicates the highest alarm severity of these alarms.
● Users can switch to the current alarm window of an NE using the shortcut
menu of the NE node. In addition, users can query the details of current
alarms on the NE Panel.
Automatic Topology-Discovery
NCE provides automatic topology-discovery to automatically add NEs to the
topology view, which helps reduce the operation expenditure (OPEX).
1. A wizard is provided to instruct users to set the parameters required for the
automatic discovery, such as NE type, SNMP parameters, and the IP address
range.
2. When parameters are set, NCE searches for the required NEs in the specified
network segments according to the preset conditions. All NEs from Huawei
and other vendors that meet the conditions will be displayed in the topology
view. Meanwhile, the basic configuration data of these NEs is uploaded, which
simplifies configuration.
3. Users can pause the discovery at any time. If the discovery fails, the cause of
failure is provided when the discovery ends.
NCE supports the following automatic topology-discovery functions:
● Creating NEs in batches
– Batch creation of SNMP/ICMP-based NEs: When NCE communicates with
these NEs successfully, it can search out the required NEs by IP address or
by network segment and then bulk create these NEs.
SNMP/ICMP-based NEs involve:
▪ routers series
▪ switches series
▪ security series
– Batch creation of transport/PTN NEs: Based on the IP address, network
segment, or network service access point (NSAP) address of a GNE, NCE
can automatically search out all the NEs that communicate with the GNE
and bulk creates these NEs.
– Batch import of NEs: Security GNEs, service monitoring GNEs, and
security virtual network (SVN) series security NEs periodically send
proactive registration messages that contain the IP addresses of NEs to
the NCE server. With proactive registration management, NCE can bulk
create these NEs after receiving the messages.
● Automatically discovering NEs: NEs can be automatically discovered and
created on NCE and NE configuration data can be uploaded automatically to
NCE.
NCE provides a secure channel for discovering NEs. The channel supports the following NE
versions:
● V600R009C00 and later versions of PTN 6900, NE series, and CX series NEs
● Scheduling NE searches: NCE can search for specified NE types in specified
network segments at scheduled intervals and automatically add discovered
NEs to the topology view. The NE types include routers, switches, and security
and access NEs.
● Automatically creating fibers/cables/microwave links or links: NCE can search
for new fibers/cables/microwave links and links in batches and automatically
add them to the topology view.
network (PON) clock, physical layer clock, PTP clock, ACR clock and ATR clock. In
the clock view, a variety of NEs can be displayed, such as:
● PTN series, NE40E routers, ATN series and CX600 NEs
Custom View
The custom view is a subset of the main topology view. The network entities can
be NEs, NCEs, and subnets. Typically, network management personnel need to
customize views, and choose network entities within their management scope
from the main topology view.
● IP and OSI are standard communication protocols, which enable the management of
hybrid device networking. In addition, these two standard protocols can be adopted on
networks consisting of only Huawei's transmission devices. In the case of a hybrid
network consisting of transmission NEs from different vendors that do not support IP or
OSI, Huawei provides solutions such as transparent transmission of DCC bytes and
Ethernet service channels' transparent transmission of management information.
● NEs must respond to collection requests sent from NCE in 0.05s. Otherwise, the actual
performance collection capability compromises.
● The performance collection capability listed in the preceding table is based on SNMPv1
and SNMPv2c. The SNMPv3-based performance collection capability achieves only two
thirds. For example, on a large-scale network, the performance collection capability for
SNMPv1 and SNMPv2c is 150,000, and for SNMPv3 is 100,000 when max/min data
aggregation is disabled. SNMPv1 and SNMPv2c are insecure protocol, it is recommended
to use a more secure SNMPv3 protocol.
● Bulk collection based on a file transfer protocol, which is usually used for
large-capacity performance management.
● Collection based on Qx, a protocol developed by Huawei, which can be used
for MSTP, WDM, RTN, PTN, and OTN equipment.
Table 6-19 describes the performance collection capabilities.
An equivalent record is a basic unit to describe the performance collection capability of the
PMS.
SLA Template
This function enables users to configure SLA parameters in a template. This saves
operation time for configuring SLA parameters when creating an instance.
● Resource: A model of telecom resource such as device, card, port, or link in the
performance management domain. A resource can be either a physical or logical entity.
Logical resources contain physical resources. A resource has specific performance
indicators. A performance monitoring system collects indicator values for resources.
● Template: A collection of indicators classified into indicator groups. Users can configure
templates to manage performance monitoring tasks easily.
● Indicator group: An indicator group consists of one or more indicators with similar
properties.
● Indicator: A performance indicator defines a specific aspect of performance of the
associated resource, for example, traffic, availability, and CPU usage. Performance
indicator values are calculated based on the performance data collected from the
monitored resource. A performance indicator has properties, such as the data type,
precision value (only for float), maximum value, and minimum value.
● Create monitoring instances for the IP SLA from resources such as NEs,
boards, ports, and links to PTN and third-party equipment.
● Modify monitoring instances.
● Query monitoring instances.
● Delete monitoring instances.
● Suspend monitoring instances.
● Resume monitoring instances.
● Synchronize resources corresponding to monitoring instances.
● Query thresholds.
● Query the VPN SLA test result.
● Export instance information.
● Collect statistics about instances.
● Display KPIs.
Scheduled Task
A schedule task specifies the time range and period for collecting performance
data. Users can configure a scheduling policy for resources when creating or
modifying a monitoring instance.
resources. The resources can be exported to XLS, XLSX, TXT, HTML, or CSV files in
a unified manner. This helps users obtain resource information on the entire
network in a convenient, quick, and accurate manner to support service planning,
routine maintenance, NE warranty, and network reconstruction.
● Physical resources (such as equipment rooms, NEs, ports, optical/electrical
modules, and passive devices) and logical resources on the entire network can
be managed or maintained in unified and hierarchical mode. You can easily
query and export various types of resources of multi-layer attributes. You can
also customize filter criteria to query data on the live network, which
improves resource maintenance efficiency.
Power
(dBm),
Reference
Receive
Time,
Receive
Status,
Upper
Threshold
for Receive
Optical
Power
(dBm),
Lower
Threshold
for Receive
Optical
Power
(dBm),
Transmit
Optical
Power
(dBm),
Reference
Transmit
Optical
Power
(dBm),
Reference
Transmit
Time,
Transmit
Status,
Upper
Threshold
for Transmit
Optical
Power
(dBm),
Lower
Threshold
for Transmit
Optical
Power
(dBm),
SingleMode
/
MultiMode,
Speed
(Mbit/s),
Wave
Length
(nm),
Transmissio
n Distance
(m), Fiber
Type,
Manufactur
er, Optical
Mode
Authenticat
ion, Port
Remark,
Port
Custom
Column,
OpticalDire
ction Type,
Vender PN,
Model,
Rev(Issue
Number).
of the disk where the backup directory is located. NCE backs up data in the
following ways:
– Manually performing the backup operation
– Automatically performing the backup task
– Automatically performing the backup policy
● Policy management: Setting policies in advance enables NCE to perform
operations on NEs periodically or when trigger conditions are met. This is
applicable to routine NE maintenance. A policy is periodic and is used for
operations that are performed frequently, such as data saving and data
backup. Users can select a policy based on the scenarios at the sites.
● Loading: Software is loaded for NE upgrade. If NCE has the permissions to
manage NE upgrade and the loading, backup, or restoration operation is not
being performed on the NE, the NE will accept the request to load the
software. NCE then transmits the contents to be loaded to the NE by using
the transfer protocol. NCE loads data in the following ways:
– Automatically loading by creating a task
– Automatically loading through an automatic upgrade task
● Activating: A newly loaded NE can be activated to take effect. If NCE has the
permissions to manage NE upgrade and the loading, backup, or restoration
operation is not being performed on the NE, the NE will accept the request to
be activated NCE activates the NE automatically through an automatic
upgrade task.
● Restoration: An NE can be restored using the backup NE data. If NCE has the
permissions to manage NE upgrade and the loading, backup, or restoration
operation is not being performed on the NE, the NE will accept the request to
restore the NE data. NCE then transmits the contents to be restored to the NE
by using the transfer protocol. NCE restores data in the following ways:
– Manually performing the restoration operation
– Automatically performing the restoration task
● Task management: NCE encapsulates all operations into tasks. By creating an
upgrade task or a downgrade task for software or a patch, users can upgrade
or downgrade the software or patch in one-click mode or at the scheduled
time. A task is not periodic and is used for operations that are not performed
frequently, such as data upgrading. Users can select a task based on the
scenarios at the sites.
● Software library management: The software used for NE upgrade can be
managed in a centralized manner. For example, users can upload NE software
from the NCE client or NCE server to the software library. In this manner, the
process of loading software is simple and fast.
● NE license management: NE license management involves querying, applying
for, installing, and changing an NE License. In addition, you can adjust the
capacities defined in the license. The license controls the validity period or
functions of an NE. Therefore, users need to view the license status and
change the expired license. Otherwise, services will be affected.
6.2.2.1 NE Management
IP NEs
NCE supports the following series of IP NEs: PTN, NE, ATN, CX, service gateway,
R/AR, switch, voice gateway, and security.
PnP
Plug-and-play (PnP) facilitates remote commissioning and basic configuration of
NEs in batches, freeing engineers from going to sites and greatly improving the
deployment efficiency.
Scenario
PnP is used for making scripts and configuring NEs during deployment. It provides
a rich set of system-defined templates, where users need to set only a few of
parameters for generating basic NE scripts. DCN remote commissioning eliminates
the need for planning before NE power-on, and NEs are automatically added to
NCE for management.
During deployment, PnP is mainly used for remotely commissioning newly added
NEs and bringing them online so that NCE can manage these NEs. PnP applies
basic configurations to NEs in different networking scenarios to complete batch
NE deployment.
Automatically Available DCN
● Connections are automatically established between NCE and NEs based on
the automatically available DCN. Scripts are automatically generated based
on the planning sheet.
● After NEs go online, templates are planned based on scenarios to implement
PnP.
– Templates can be customized based on L2+L3 and HVPN service
scenarios.
– The management IP addresses, NNI IP addresses, and IGP parameters can
be automatically allocated for online NEs.
Custom deployment solution
Create a customization template based on the site scenario information and
typical configuration, customize template parameter IDs and expressions, and
create a deployment template group for the site scenario.
● Export the service planning table based on the deployment template and fill
in the planning data. The custom deployment solution allows you to import
device configuration planning information (such as NE addresses and
interface IP addresses) in batches and customize the sequence of parameters
in the planning table.
● NCE supports the import of device command scripts, the setting of parameter
correlation between different device role templates, and the creation of
scenario-based custom service deployment templates.
Basic and service configuration scripts are generated at the same time. With the
DCN, devices can go online while configurations are applied.
IP Network Troubleshooting
IP network troubleshooting helps users quickly locate faults in service paths,
improving O&M efficiency.
IP network troubleshooting provides the following functions:
● Unicast service path visualization: E2E service paths and backup paths are
displayed in the topology view. Backup paths support five backup modes:
primary/secondary PW, VRRP, E-APS, TE hot standby, and VPN FRR. Paths are
displayed at the service, tunnel, IP, and link layers. If a path is incomplete or
used as a backup path, a message will be displayed asking users whether to
display the historical paths that are complete and not used as backup paths.
● Multicast service path visualization: NCE can discover shared paths and
shortest paths, and paths are displayed at the service, IP, and link layers.
● Display of NE and link status: After users select an NE or link in the topology
view, the NE performance data or the link type, source, and sink are displayed.
The performance data, alarm information, and optical module information of
all NEs and links in the topology view are displayed on tab pages in the
details area to help users with preliminary fault locating.
● Fast fault diagnosis: After users click Quick Diagnosis, path and service check
items are executed layer by layer. The check results are displayed in a table. If
a check item is abnormal, it is highlighted in red and handling suggestions are
provided for it. Clicking an underscored record opens the associated window
in the NE Explorer where users can quickly rectify faults.
● Fault detection: Faults can be detected through packet comparison, port
loopback tests, ping tests, interface packet loss/bit error collection, TDM PW
statistics, path detection, smart ping, ACL traffic statistics, or fault information
collection, or by using the MultiCast Tools or IGP Source Tracing tool.
IP Network Assurance
NCE provides various functions, such as network health checking, intelligent
troubleshooting based on path visualization, automatic locating of top N typical
alarms, and network-level alarm correlation. This greatly reduces skill
requirements for fault locating. The average fault locating time is reduced from
more than 1 hour to 10 minutes.
● IP NE health check: IP NE health status can be checked efficiently and
automatically. Checking a single NE (optical power and IP address) only needs
several seconds. The check efficiency is greatly improved because users no
longer need to manually check configurations. In addition, this function
reduces the potential faults caused by improper basic configurations.
● PTN network health check: This tool provides a centralized GUI for checking
and viewing network running indicators. During routine maintenance, users
can compare the current and historical network running statuses to detect
risks and rectify faults in advance.
● Intelligent troubleshooting based on path visualization: NCE supports
protection path discovery, covering five protection schemes (primary/
secondary PW, VPN FRR, VRRP, E-APS, and TE hot standby) on the live
network. It can also discover and display primary and backup paths to meet
fault locating requirements during service switching. Paths are displayed by
layer (including service, tunnel, route, and link layers) so that specific fault
locations can be easily identified. Path discovery in the VPLS and HVPLS
scenarios and visualized fault locating based on paths are provided. NCE
automatically determines the diagnosis process based on MBB scenarios and
fault types (such as interruption, deterioration, and clock switching). It
provides up to 300 check items, covering key MBB features and improving
check accuracy and efficiency.
● Automatic locating of top N alarms: For top N alarms, NCE automatically
selects check methods, completes fault diagnosis with just one click, and
provides rectification suggestions.
● Network-level alarm correlation: By analyzing the alarms reported by IP
NEs within a period, NCE identifies root alarms and correlative alarms based
on rules and displays them to the maintenance personnel.
Service Provisioning
NCE provides a user-friendly graphical user interface (GUI) on which you can
complete all service configuration operations. Parameters for multiple NEs can be
automatically generated by using service templates. User configuration results can
be previewed in the topology before being applied.
● FlexE Channel
– Creating FlexE Channels.
– Creating FlexE Channel Protection Groups.
● Dynamic Tunnel
– Provision SR-TE and RSVP-TE tunnels.
– Configure tunnel separation groups.
● SR Policy Tunnel
– Provision SR policy tunnels.
– Select the color attribute for SR policy tunnels.
– Configure candidate paths.
● Static Tunnel
– Deploy Static LSP or Static CR LSP services to implement MPLS access
schemes.
– Configure the link bandwidth threshold.
During the establishment of a static CR LSP calculation path, the U2000
can generate a link weight based on the remaining link bandwidth and
the threshold, achieving traffic balance.
● Dynamic L3VPN service
– Provision dynamic unicast and multicast L3VPN services.
– Provision services through templates.
manner. This not only saves time but avoids the impact of misoperation on the
original services.
● Static tunnels, static L3VPN services, VPLS services, PWE3 services,
aggregation services, and composite services can be automatically discovered
based on preset policies.
● Dynamic tunnels, EVPN services, and dynamic L3VPN services can be
automatically discovered based on service templates.
Service Diagnosis
Diagnostic tools are used to check network connectivity and locate faults. You can
generate diagnostic tasks according to selected services and directly perform
operations on NEs in topology views. Diagnostic results can be directly displayed.
Service Searching for NETCON You can search for MBGP L3VPN
deployment services F services created by Ubiquoss
and E7124 and Dasan M3000 NEs by
management template.
Benefits
In the PTN 5G scenario, the IGP/BGP-LS/PCEP dynamic protocol is used to detect
the network topology in real time and implement flexible control over the
network in a centralized and real-time manner. However, this also brings
challenges to the delivery of basic configurations.
1. The number of basic network configurations increases greatly.
2. The complexity and requirements for personnel skills are higher.
3. In the traditional mode, the service provisioning is low-efficiency and error-
prone.
In Network Setup Automation, resources pooling in advance and delivery by using
templates based on NE roles of key parameters reduce the operation difficulty and
improves going-online efficiency. The following resources are planned:
Category Principles
LSR-ID The system automatically uses the Loopback0 address as the LSR
ID.
Link IP The system uses a 30-bit subnet mask to obtain the link IP
Address address from the address pool.
Pool
IGP Each core ring or each access ring is planned as an IGP domain.
Planning
BGP-LS Each IGP domain requires two NEs to establish BGP-LS neighbor
relationships with NCE.
6.3.2.1 Background
This section describes the challenges brought by the 5G network, pain points in
traditional O&M, and position of the Mobile Transport Service Automation feature
in network O&M.
network, O&M phases are separated from each other. Work orders are used for
interaction between process steps, and a large amount of manual intervention is
required. NCE hopes to build an unmanned 5G network to fundamentally change
the O&M process of carriers. NCE is able to implement network autonomy and
self-healing and system self-closed-loop, helping carriers reduce OPEX.
This document focuses only on the network deployment in the entire network
lifecycle.
The Entire Process of the Mobile Bearer Network: from Network ready to
Service Provisioning
To provision a base station service on the mobile bearer network, perform the
following operations:
● Phase 1: network planning, that is, high level design (HLD), defining which
devices and networking are used at the physical layer, which protocols and
tunnel technologies are used at the protocol layer, and which services and
protection schemes are used at the service layer to ensure service reliability.
● Phase 2: detailed network design, that is, low level design (LLD), including the
design for:
– cabinets on the device panel and connection of physical ports at the
physical layer.
– names of network objects including link port NEs, logical interfaces, and
network protocol parameters at the protocol layer.
– VPN service templates and protection schemes, and parameters for
connecting base stations and the mobile bearer network at the service
With the development of the 1G, 2G, 3G, and 4G networks, the frequency of the
radio wave is higher and higher. This is mainly because a higher frequency
indicates richer frequency resources and higher transmission rates. One of the
main features of the 5G network is the use of millimeter waves.
Compared with the 4G network, the physical topology of the 5G network changes
in that the NEs related to the core network are moved closer to the base station
side. The degree of moving the NEs closer to the base station varies with the role
of the NEs. For example, because NB-IoT has low requirements for delay and
bandwidth, it is still kept in the core equipment room. NEs such as the content
delivery network (CDN) and mobile edge computing (MEC) that have high
requirements on bandwidth and delay can be moved down to the access
aggregation layer or backbone aggregation layer.
Service multi-direction
As core network NEs are moved closer to base stations, the service traffic direction
changes. Originally, most traffic is diverted from base stations to the core network
side. Now, some traffic is directly transmitted through access aggregation nodes or
backbone aggregation nodes. In addition, the following service interface types are
added to the 5G network:
Compared with the 4G network era, the number of devices on the bearer network
increases significantly. In addition, because the east-west traffic between MECs
and the traffic between the central unit (CU) and MEC are complex, L3VPN
services on the bearer network must be transmitted to edge devices. As a result,
the number of services increases greatly. The traditional management and O&M
methods cannot cope with such a large number of managed objects.
App Description
Enables devices on the access rings of a mobile bearer network to quickly go
online. You can plan key information such as configuration templates and resource
pools in advance. After new devices are powered on, NCE applies your
configuration to the devices to complete access ring configuration, reducing the
attendance time of NOC personnel.
Feature Panorama
Feature Description
Automatic Service design This feature enables you to design VPN services
base station and tunnels, and to create service templates.
service
provisioning Base station This feature enables you to configure
service automatic base station connectivity, base
NOTE
This feature
management station service provisioning, and site O&M.
only
supports the
IPRAN
scenario.
The mobile app 5G-ZTP is not released along with NCE. This section is for reference only.
1. After NCE detects that devices go online, hardware installation engineers start
commissioning on the mobile app. On the mobile app, hardware installation
engineers scan the bar codes or manually enter the ESNs of the NEs to go
online, enter the planned NE names, and click Start Commissioning. The
mobile app sends related information to NCE through the NBIs of NCE. NCE
applies the planned NE names to the NEs.
2. A hardware installation engineer clicks Start Check on the mobile app. NCE
checks status logs and the optical power, and sends the check result to the
mobile app. The hardware installation engineer can check the NE optical
power and online result on the mobile app or NCE.
Terminology
Table 6-23
Name Description
Name Description
6.3.3.1 Background
On a radio network, the clocks of different base stations must be synchronized
with certain precision. Otherwise, exceptions such as call drops and one-way audio
may occur during base station handover. For all wireless standards, frequency
synchronization must be within +/-0.05 ppm. For time division wireless standards,
time synchronization must be within +/-1.5 us.
In the traditional clock tracing solution, base stations are connected to the GPS to
achieve time and frequency synchronization. The GPS has strict requirements on
the installation environment. When 5G base stations are deployed on a large
scale, it cannot be ensured that all base stations are connected to the GPS.
Synchronous Ethernet (SyncE) and IEEE 1588v2 can be deployed on devices of the
bearer network to implement network-wide clock tracing. clock tracing
deployment has two major pain points: clock planning and deployment, and fiber
asymmetry measurement.
● The parameter configuration is difficult. SyncE and IEEE 1588v2 are highly
professional in clock network planning and configuration, and involve a large
number of parameters. Therefore, the workload is heavy, and incorrect or
missing configurations may occur.
● The maintenance workload is heavy. Manual assessment of potential risks on
a clock network is difficult because the network is large and contains many
nodes.
● The SyncE clock forms a loop. A clock loop causes network-wide clock
flapping. The Synchronization Status Message (SSM) protocol cannot
completely prevent a clock loop, and manual planning is required to prevent a
clock loop. However, in actual manual planning, a potential risk of a timing
loop may easily occur.
Smart Planning
Through a home-grown ICPF algorithm, the Smart Clock app automatically
computes the optimal path when planning tracing paths in a clock area. During
path planning, you can set key parameters, such as hop first or loop first and the
maximum number of hops.
Based on the planned paths, Smart Clock automatically generates a topology and
shows basic hop statistics and NE and link status to help you determine whether
the planning result meets expectations and whether to deploy the paths.
Smart Deployment
The Smart Clock app automatically converts the planned paths to configurations
and batch delivers the configurations to NEs layer by layer. From planning to
deployment, all work is automatic. Compared with manual configuration, it
ensures that no configuration item will be omitted or set incorrectly.
Asymmetry Calibration
To measure and compensate for possible asymmetrical errors on the network,
self-detection on GPS-enabled base stations combines with supplementary onsite
measurement to ensure that the E2E tracing quality and errors meet the
requirements of service clocks.
The sites requiring onsite measurement must be listed to help you arrange onsite
measurement.
Health Check
For an installed network or long-established clock areas, the Smart Clock app can
check their health status and provides a report on the status of tracing and
protection paths, whether the paths have excessive hops, and whether the paths
are looped.
It helps you learn the tracing status on the current clock network and better
conduct clock area O&M and management.
Specifications
Table 6-24 provides the specifications of IP analysis reports.
Functions
● Dashlets are used on home pages to display device and network status
through lists, line charts, bar charts, or pie charts.
● Dashlets are appropriately categorized for easy device status monitoring.
Specifications
Analyzer allows users to maintain and manage the home page of the Network
Performance Analysis app and Dashlets based on service requirements. The
following operations are supported:
● Home page maintenance, including:
– Customizing the Dashlets to be displayed or hidden on a home page
– Modifying the name of a home page
– Pinning a home page on top
– Deleting a home page
● Dashlet management, including:
– Setting Dashlet parameters
– Refreshing Dashlets manually
– Hiding Dashlets
– Relocating Dashlets on a home page
– Viewing the historical performance data of devices
● Dashlet customization, including:
– Customizing bar charts, line charts, pie charts, or ring charts
– Customizing the resources, indicators, and periods displayed on charts
NE NE Health Report: -
Collects performance indicators
of NEs such as CPU usage and
memory usage based on subnets,
helping you quickly locate NEs
with the heaviest loads.
The report panorama includes the mainstream PTN device reports and PTN 6900 reports.
● Except Ethernet Port Optical Report and Eth-Trunk Traffic Statistics Report in the
report panorama, all other reports support the mainstream PTN devices.
● In the report panorama, Channelization Subinterface Traffic Report and FLexETH
Interface Traffic Report support PTN 7900s only.
● In the "Supporting PTN 6900 or Not" column of the report panorama, "Not support"
indicates that the report does not support PTN 6900s, "Support" indicates that the
report supports PTN 6900s, and "Support PTN 6900s only" indicates that the report
supports PTN 6900s only.
Functions
● The PTN and IP RAN traffic monitoring solutions provides regional traffic
maps that clearly display the traffic condition and ranking of each area.
● The TWAMP and ICMP quality monitoring solutions provide regional quality
maps that clearly display the quality condition and ranking of each area. The
displayed indicators include packet loss rate, delay, and jitter.
Specifications
Regional Traffic Map
● Coloring
Regions on the regional map are displayed in different colors, depending on
which thresholds they have exceeded.
– Green indicates that the regional traffic is less than the Minor Alarm
threshold.
– Yellow indicates that the regional traffic is less than the Critical Alarm
threshold but greater than or equal to the Major Alarm threshold.
– Red indicates that the regional traffic is greater than or equal to the
Critical Alarm threshold.
– Gray indicates that the regions are not monitored.
● Map drilldown
The regional PTN traffic monitoring map supports two-level drilldown and
traffic data display.
● Region ranking
Regions are ranked by total traffic or bandwidth usage in descending order,
and the ranking is refreshed every hour.
● Traffic visualization
– The regional PTN traffic monitoring map clearly displays the total traffic,
inbound traffic, and outbound traffic, and service traffic of regions,
helping users identify key regions in a timely manner.
– The regional IP RAN traffic monitoring map clearly displays the inbound
bandwidth usage, outbound bandwidth usage, inbound peak bandwidth
usage, and outbound peak bandwidth usage of regions, helping users
identify key regions in a timely manner.
Functions
The key event monitoring function uses a dashboard to easily manage monitoring
tasks. It has a topology view and various performance reports, which intuitively
show the network status. It automatically archives historical records to effectively
support future assurance.
Only the PTN and IP RAN solutions support key event monitoring.
Specification Description
Traffic IN Average
Traffic IN Average
Traffic IN MAX
R Value
MOS
Functions
● The physical topology consists of a navigation pane on the left and a view on
the right. The navigation tree shows the layered network structure, and the
view displays managed objects in different places (coordinates).
● The physical topology integrates NE performance indicators and alarms,
helping users learn the NE condition and running status of the entire network.
● The physical topology integrates link performance indicators and alarms,
helping users learn the structure and running status of the entire network.
● Some NCE resources, such as PW trails, Layer 2 links, rings, and Ethernet
ports, support warning settings.
Functions
● Policy configuration
Users can select different service types to set the upper and lower thresholds
for the average busy and peak bandwidth usage of CIR and PIR as well as the
threshold-crossing days. These settings help NCE learn the threshold-crossing
condition and determine whether adjustment is needed.
● Service adjustment analysis
Users can modify, delete, and refresh periodic report tasks.
– If the average busy or peak bandwidth usage of CIR is above its upper
threshold for the specified number of days, increase the CIR.
– If the average busy or peak bandwidth usage of CIR is below its lower
threshold for the specified number of days, decrease the CIR.
– If the average busy or peak bandwidth usage of PIR is above its upper
threshold for the specified number of days, increase the PIR.
– If the average busy or peak bandwidth usage of PIR is below its lower
threshold for the specified number of days, decrease the PIR.
Specifications
● A maximum of 24 tasks can be created.
● Hourly, daily, weekly, and monthly reports are exported at every hour, 05:00
every day, 09:00 every Monday, and 13:00 on the first day of every month,
respectively.
● All data can be exported if the report format is XLS or CSV. However, if the
report format is PDF, only the first 100 records can be exported.
● If SendMethod is set to local storage, the exported reports are saved to the
NCE server by default, and only the latest 30 files are reserved. If
SendMethod is set to SMTP, users can send the exported reports to multiple
email boxes.
Benefits
● NCE provides the object management function, which allows you to select
performance indicators of multiple resource objects of the same type within a
specified period for statistics collection and analysis.
● Maintenance Suite is provided for users to manage multiple objects and view
performance data or even the performance aggregation results of objects. The
aggregation results can be exported as a report. Maintenance Suite
aggregates performance data by area, service type, or device. For example, it
can aggregate performance data for multiple ports of the same device or in
the same area. In addition, Maintenance Suite allows users to flexibly set
object layers for easily collecting and querying performance data by layer.
Functions
● Users can put objects of the same type into the same group and specify a
period (15 minutes or 1 day), a time range, performance indicators, and an
aggregation type (Sum, Avg, Min, or Max) for the group to obtain aggregated
values.
● Users can view and export the results.
Specifications
● Groups can be queried, created, or deleted, and objects in the same group
must be of the same type.
● Users can modify group names but cannot modify resource types. During the
modification, all objects in the group are listed. Users can add or delete
objects as required.
● The performance data of groups can be browsed and exported to reports, but
cannot be saved to the database.
Table 6-27
PTN_CP
L2Link
PTN_Ethernetport
PWTrail
IP solution NE
CP
IpOpticalPort
IPLink
IPInterface
L2Link
Indicator Description
Two way Ratio of the number of discarded packets to the total number of
Packet packets transmitted within a period.
Loss Ratio
Two way Time used by a packet to be transmitted from the source to the
Delay destination.
Two way Variation between delays of two continuous packets towards the
Jitter same destination.
One-way Delay change from the source end to the sink end or from the sink
Jitter end to the source end.
MOS A test to obtain users' view of the network quality. The MOS
provides a numerical indication of the perceived quality from the
users' perspective of received media and is expressed as a single
number in the range of 1 to 5, where 1 indicates the lowest
perceived quality, and 5 indicates the highest perceived quality.
The voice quality is determined based on E-Model calculation.
● For an L2VPN, an L2VPN name and an L2VPN interface have to be configured on the
PTN reflector.
● For an L3VPN, an L3VPN interface has to be configured on the PTN reflector if the PTN
device works in dual-stack mode and an L3VPN name and an L3VPN interface have to
be configured if the PTN device works in single-stack mode.
NCE All NA NA NA Y N
V100R ATNs
019C00
Specifications
The following lists the specifications supported by TWAMP-based IP RAN or PTN
quality monitoring:
buffer test at a time, with the packet sending interval of 0.1 ms and
sending period of less than 3 minutes. Loop detection can be enabled
only when the destination is a Huawei PTN device.
● Supporting TWAMP payload check parameter configuration for PTN 7900
V100R007C10
If a PTN 7900 V100R007C10 serves as the source of a TWAMP test, four types
of payloads (0x00, 0xff, 0x55, and 0xaa) can be configured. In this case, the
test result will contain the number of error packets.
● Supporting unified alarm management
For various indicators, users can set thresholds for different severities of
alarms. If the values of network or service indicators exceed the preset
thresholds during the TWAMP test, alarms are generated.
● Exporting TWAMP performance data through the performance text NBI
The data dictionary is provided, allowing TWAMP performance data to be
exported through the performance text NBI for interconnection with a third-
party system.
Typical Networking
ICMP tests apply to various scenarios and feature easy deployment. NCE brings
the following benefits to carriers by working with built-in probes of device to
perform ICMP jitter tests:
● Conducts an E2E polling test for base stations of the entire network to obtain
service quality, screen out base stations that require long-term monitoring,
and analyze the IP address usage of base stations.
● Monitors base station quality in an E2E and real-time manner to obtain base
station E2E quality as well as quality on the wireless and transmission sides.
● Monitors the link quality of important base stations in real time to obtain
network quality of important sites.
● Assists network fault demarcation and locating, including demarcation of
faults to the wireless side or transmission side.
Figure 6-24 and Figure 6-25 show the typical networking schemes.
Base station E2E To manage network quality and locate faults, carriers
polling test deploy proactive test cases (such as ICMP test cases)
initiated by a built-in probe of device. Due to the limited
number of built-in probes of device and a large number of
base stations, available built-in probes of device cannot
test all base stations simultaneously. In this case, a polling
test can be used to address this issue.
Configure base station IP addresses as the destination, and
deploy an EPC device as the source . Deploy an ICMP jitter
test to implement the polling test on all base stations. This
polling test brings the following benefits to carriers:
● Obtains statistics about the base station IP address
usage: Obtain the IP address usage of base stations by
checking whether the polling test is successful and
whether the data is valid. Based on the IP address usage
of base stations, users can know information about base
station deployment in different areas.
● Obtains the general service quality of the entire
network: Obtain network quality information such as
the packet loss rate, delay, and jitter by conducting an
ICMP jitter polling test on all the base stations of the
network.
● Screens out base stations that require long-term
monitoring: Screens out base stations for which the
average number of alarms is large, the alarm duration is
long, and long-term monitoring is required by analyzing
the alarm results obtained from an ICMP jitter polling
test, improving monitoring efficiency and reducing
deployment costs.
Indicator Description
Packet loss Ratio of the number of discarded packets to the total number
ratio of packets transmitted within a period.
Indicator Description
Device Type Support for the ICMP Support for the ICMP
Source End Destination End
Base station N Y
Destination device IP N Y
address (ICMP-capable
device)
NEs N Y
Specifications
The following lists the specifications supported by network quality monitoring
based on ICMP jitter tests:
Function Overview
During a trace test, packets with different time to live (TTL) are sent to the
destination to determine the IP address, packet loss rate, and delay of each hop
on the path.
The following tables describe the related indicators, source and destination ends,
and version mapping of trace tests.
Indicator Description
Packet loss Ratio of the number of lost packets on each hop to the total
ratio number of packets transmitted on the forwarding path from the
source to the destination within a period of time.
SNC Y N
Specifications
The following lists the specifications supported by network quality evaluation
based on trace tests:
Function Overview
NCE utilizes the path restoration function triggered by TWAMP tests and ICMP
jitter tests to help carriers achieve the following:
● Discover and restore hop-by-hop service paths from the alarm source to the
alarm destination.
● Based on the restored service paths, read indicators of existing or on-demand
TWAMP tests or ICMP jitter tests hop by hop; implement hop-by-hop fault
diagnosis based on the test results.
Packet loss Ratio of the number of discarded packets to the total number of
rate packets transmitted within a period.
Table 6-41 Requirements on ICMP jitter test source and destination ends
Device Type Function as ICMP Function as ICMP Jitter
Jitter Source Destination
NEU200 Y N
Base station N Y
Device/Interface IP N Y
address
NEs N Y
Device IP (TWAMP- Y N
capable device)
Destination device IP Y Y
address (TWAMP-
capable device)
TWAMP-capable base N Y
station
Specifications
The following describes the specifications supported by ATN+CX quality path
restoration and auxiliary fault demarcation:
● A TWAMP test case alarm can trigger path restoration and auxiliary fault
demarcation.
If a TWAMP test case with the source of a built-in probe of device or NE
generates an alarm, click the alarm device in the physical topology. In the
quality alarm panel displayed in the right pane, manually trigger path
restoration and auxiliary fault demarcation to help fault analysis.
● An ICMP jitter test case alarm can trigger path restoration and auxiliary
fault demarcation.
If an ICMP jitter test case with the source of a built-in probe of device
generates an alarm, click the alarm device in the physical topology. In the
quality alarm panel displayed in the right pane, manually trigger path
restoration and auxiliary fault demarcation to help fault analysis.
● Hop-by-hop fault information collection is supported.
Auxiliary fault demarcation is implemented based on the restored path, and
performance indicator values are accumulated. The fault information is
displayed on each hop of the path, including the link traffic, optical power,
and queue packet loss rate. The lower pane of each hop of the path provides
a report tab page to display detailed indicators.
Function Overview
Path restoration brings the following benefits to carriers:
Indicator Description
Packet loss Ratio of the number of discarded packets to the total number of
rate packets transmitted within a period.
Destination device IP Y Y
(TWAMP-capable device)
TWAMP-capable base N Y
station
Specifications
The following describes the specifications supported by IP network quality path
restoration and auxiliary fault demarcation:
A TWAMP test case alarm can trigger path restoration and auxiliary fault
demarcation.
If a TWAMP test case with the source of an NE generates an alarm, click the
alarm device in the physical topology. In the quality alarm panel displayed in the
right pane, manually trigger path restoration and auxiliary fault demarcation to
help fault analysis.
Function Overview
Path restoration brings the following benefits to carriers:
● Based on the restored service paths, read indicators of existing or on-demand
TWAMP tests or ICMP jitter tests hop by hop; implement hop-by-hop fault
diagnosis based on the test results.
Auxiliary NCE determines a device model based on the trace test result. If a
fault device has an IP address, it is a Layer 3 device; otherwise, it is a
demarcat Layer 2 device.
ion After path restoration is complete, the hop-by-hop diagnosis rules
are as follows if the alarm source is a built-in probe of device:
● Hop-by-hop diagnosis rules for Layer 2 devices:
If the destination device is a single-stack L2VPN or L3VPN device
or a dual-stack PTN device, check whether TWAMP test cases to
the device exist.
– If TWAMP test cases exist, report the results in the last 15
minutes.
– If no TWAMP test cases exist, no data is reported and no
indicator data is accumulated in the path restoration view.
● Hop-by-hop diagnosis rules for Layer 3 devices:
When the test protocol type is TWAMP:
Check whether TWAMP test cases to the destination IP address
exist.
– If TWAMP test cases exist, report the results in the last 15
minutes.
– If no TWAMP test cases exist, no data is reported and no
indicator data is accumulated in the path restoration view.
When the test protocol type is ICMP:
Check whether ICMP jitter test cases to the destination IP address
exist.
– If ICMP jitter test cases exist, report the results in the last 15
minutes.
– If no ICMP jitter test cases exist, create an on-demand ICMP
jitter test case and report the test results.
Packet loss Ratio of the number of discarded packets to the total number of
rate packets transmitted within a period.
Table 6-48 Requirements on ICMP jitter test source and destination ends
Device Type Function as ICMP Function as ICMP Jitter
Jitter Source Destination
Base station N Y
Device/Interface IP N Y
address
NE N Y
Destination device IP N Y
(TWAMP-capable device)
TWAMP-capable base N Y
station
RTN device N Y
Specifications
The following describes the specifications supported by PTN path restoration and
auxiliary fault demarcation:
● A TWAMP test case alarm can trigger path restoration and auxiliary fault
demarcation.
If a TWAMP test case with the source of a built-in probe of device generates
an alarm, click the alarm device in the physical topology. In the quality alarm
panel displayed in the right pane, manually trigger path restoration and
auxiliary fault demarcation to help fault analysis.
● An ICMP jitter test case alarm can trigger path restoration and auxiliary
fault demarcation.
If an ICMP jitter test case with the source of a built-in probe of device
generates an alarm, click the alarm device in the physical topology. In the
quality alarm panel displayed in the right pane, manually trigger path
restoration and fault diagnosis to help fault analysis.
● Hop-by-hop fault information collection is supported.
Auxiliary fault demarcation is implemented based on the restored path, and
performance indicator values are accumulated. The fault information is
displayed on each hop of the path, including the link traffic, optical power, bit
error, and queue packet loss rate. The lower pane of each hop of the path
provides a report tab page to display detailed indicators.
Global optimization
NOTE
If traffic imbalance exists on a large number of tunnels, you
can perform global optimization to optimize network-wide
service paths.
Least cost Select a path with the least cost among all
paths that meet the specified constraints.
Availability and least cost Select a path with the maximum link
availability and least cost among all paths
that meet the specified constraints.
Availability and minimum delay Select a path with the maximum link
availability and minimum delay among all
paths that meet the specified constraints.
6.4.2.1 Background
With the development of networks, services occupy more and more network
resources, and the network becomes increasingly complex and large. The
traditional MPLS TE technology cannot meet the requirements of the live network.
MPLS TE enables the establishment of label switched path (LSP) tunnels with
specified paths based on reserved resources and preempts bandwidth resources of
LSPs with lower priorities to control traffic paths when resources are insufficient.
Although MPLS TE can use bandwidth resources to a large extent, manually
planning explicit paths in a complex large-scale topology is complicated. In
addition, MPLS TE path computation depends on IGP TE topology information. IGP
TE can only flood topology information of the IGP domain where it resides, and
cannot compute and establish end-to-end TE tunnels across IGP domains or even
ASs.
In addition, the constrained shortest path first (CSPF) path computation algorithm
used in MPLS TE can only be determined by the tunnel ingress, and this
distributed computation and management manner cannot coordinately manage
network bandwidth resources. Lack of global network bandwidth resource
optimization leads to problems such as bandwidth resource waste and even tunnel
establishment failures.
6.4.2.2 Overview
Network Path Management provides QoS assurance for network services by
optimizing service paths.
Network Path Management has the following technical advantages:
● Visualized global tunnel topology
Network Path Management provides a visualized topology of tunnels on the
entire network and monitors link bandwidth usage based on collected traffic
statistics. This topology allows administrators to detect traffic path changes in
real time and optimize traffic accordingly to prevent network faults.
● Centralized global multi-domain path computation
Network Path Management combines the topologies collected from multiple
IGP domains into one and uses an innovative optimization algorithm to
compute constraint-based multi-domain paths to optimize network
bandwidth utilization. Compared with distributed path computation, this
implementation avoids
the problem of bandwidth resource conflicts.
● Intelligent maintenance during a fixed period of time
During a maintenance window, traffic automatically bypasses maintained
nodes or links. After the maintenance is complete, traffic switches back to the
original paths. If faulty nodes or links exist, traffic can also automatically
bypass these nodes or links.
● Multiple optimization mechanisms
Network Path Management provides trigger mechanisms for different usage
scenarios to ensure optimal service paths. The automatic optimization
mechanism provides the automatic approval function. You can determine
whether to directly deliver path computation results by enabling or disabling
automatic approval. Manual approval is required if automatic optimization is
disabled, automatic approval is disabled, or manual optimization is used.
Global optimization
NOTE
If traffic imbalance exists on a large number of tunnels,
you can perform global optimization to optimize
network-wide service paths.
Least cost Select a path with the least cost among all
paths that meet the specified constraints.
Availability and least cost Select a path with the maximum link
availability and least cost among all paths
that meet the specified constraints.
all NEs. The number of physical links contained in each virtual link cannot exceed
64, and the number of virtual links cannot be greater than the number of physical
links.
● By selecting a service flow, you can view traffic distributed on each NE and
link, and the traffic topology workspace displays the link that the service flow
traverses and route constraints of the service flow.
● You can select a service flow to be optimized in the custom flow list and
specify an appropriate direction and target path for optimization based on the
bandwidth usage and peak link traffic displayed in the report and traffic
topology workspace. The target path can be a link, virtual link, tunnel, or IP
address.
● After you apply configurations, the NCE (Analyzer) issues path optimization
commands to the NCE (Controller). The NCE (Controller) then converts the
path optimization commands to route constraints and applies the route
constraints to NEs.
● NEs implement path optimization for traffic based on the configured route
constraints.
Table 6-54
● Custom flow: You can identify custom flows according to your plan based on the source
IP address/community, sink IP address/community/AS, or their combination or ASs on
NCE.
● For custom flows, if the source and sink are combined, the source and sink cannot be of
the aggregation type at the same time. Communities and ASs are of the aggregation
type.
● Top N flows: Top N flows refer to globally top N service flows that are collected through
the NCE. Traffic optimization cannot adjust top N flows. These flows can be involved in
traffic optimization only after Set as Custom Flow is selected.
Service Trend
In the 5G and cloud era, cloud VR and AR are growing rapidly, and 5G has a huge
market space in B2B vertical industries. Multi-industry multi-service is enabled
through 5G networks, posing a major challenge to the Service Level Agreement
(SLA) assurance and O&M efficiency of 5G transport networks.
SLA commitment is the basis for the transport network to provide services for
vertical industries. Differentiated SLAs will enable carriers to win in homogeneous
service competition. SLA assurance requires networks featuring ultra-high
reliability and ultra-low delay and packet loss. For example, the VR/AR service
requires a lower packet loss rate of 10-5 to 10-6, the live TV service requires zero
packet loss and low delay (< 20 ms) to ensure that no erratic display or frame
freezing occurs, the industrial control network requires a delay of no more than 2
ms, the Internet of Vehicles (IoV) requires a delay of no more than 5 ms, and the
remote ultrasound scan and remote emergency require a delay of no more than
10 ms as well as no packet loss or frame loss.
Service diversity, service level agreement (SLA) differentiation, and the long-term
coming coexistence of 5G networks with existing 2G/3G/4G networks put forward
unprecedented challenges to the O&M of 5G networks. High-precision
performance measurement technologies are required to implement automatic
O&M of 5G transport networks throughout their lifecycles.
● Routine performance monitoring: Real-time SLA monitoring based on IP
service flows of base stations is required to monitor the real-time network
health status and long-term network performance to detect and prevent
potential deterioration.
● Quick fault demarcation and locating: O&M efficiency requires that fault
locating be shortened from hours to minutes. For external faults on transport
networks, fast fault demarcation methods must be provided. For internal
faults on transport networks, you need to use methods similar to hop-by-hop
fault demarcation and locating to precisely locate the fault points and
improve the fault rectification efficiency.
● Automatic and intelligent network O&M: More and more complex networks
require the innovation of O&M modes. Based on the real-time performance
measurement data of the entire network, the O&M system can intervene,
adjust, and optimize the network risks in advance, change the traditional
network O&M mode driven by faults, and implement automatic and
intelligent O&M.
O&M As-Is
From the perspective of services, industrial applications have strict requirements
on performance including packet loss and delay, which results in harder
connectivity diagnosis, routine maintenance, and fault locating compared to
traditional network services. There is a big gap between the current O&M under
the existing performance measurement technology and the full-lifecycle
automated O&M required by the 5G transport network.
● The service SLA cannot be measured and the passive O&M experience is poor:
Traditional out-of-band measurement uses analog packets to indirectly detect
network quality. This cannot ensure that analog packets are transmitted along
the actual service path and cannot completely reflect the service SLA. The
packet loss measurement precision can only reach 10-3. When packet loss
occurs in services such as AR/VR, faults may not be detected. NE information
collection within minutes cannot detect changes in transport networks in real
time. The network O&M department can respond to complaints from
peripheral departments only after service faults or quality deterioration
occurs, resulting in poor passive O&M.
● Service status cannot be detected hop by hop, and faults are difficult to locate
and demarcate: Service status cannot be detected hop by hop or replayed
during the fault period, making it difficult to accurately demarcate the silent
and poor-QoE faults. Multiple teams on the wireless, fixed, and core network
sides are required to locate the fault, which takes several days or even several
weeks. According to the actual case on the live network of customer L, 1200
complaints were received within 20 minutes, and no alarm was reported on
the device. It took 8 hours to locate the faulty board, involving more than 50
associated devices, more than 100 locating parameters, and more than 10
O&M experts.
● Faults have no self-healing capabilities: Automatic switching and intelligent
optimization aimed at service faults are not supported.
Measurement Technology
From the perspective of technologies, the existing network performance
measurement technologies in the industry each have defects, so none of them can
meet the requirements of 5G transport networks on measurement precision, hop-
by-hop measurement, service scenario, and performance.
Out-of- Construct test packets to measure The measured traffic is not the
band the SLA such as the delay and actual traffic. Hop-by-bop
measur packet loss rate to obtain the measurement is not supported.
ement network quality. Because the The measurement precision is
(also measured traffic is not the actual low. Measurement results are
known traffic, the measurement precision not convincing. Self-proving is
as is different from that of the actual not supported. Test packets sent
proactiv network. Proactive measurement consume network resources.
e technologies include RFC 2544,
measur TWAMP/OWAMP, Ping, and
ement) Traceroute.
In-band Directly measure actual service ● iOAM and INT: The MPLS
measur flows, featuring high scenario is not supported.
ement measurement precision. Passive Hop-by-hop packet loss
(also measurement technologies include measurement is not
known iOAM (in-situ OAM), INT, and IP supported. The forwarding
as FPM. plane requires large amounts
passive of overheads and data to be
measur collected. The solution is hard
ement) to implement in the early
stages.
● IP FPM: It has weak service
expansion capabilities. Hop-
by-hop measurement has
many restrictions and
complex configurations.
Benefits
Scenario Benefits Feature
Typical Networking
● IP RAN
● If multiple paths for load balancing exist, the paths can be restored in the E2E
service path information.
● The network cannot contain VRPv5- and VRPv8-based devices at the same time.
● The network cannot contain third-party devices and VRPv8-based devices at the
same time.
● PTN
● If multiple paths for load balancing exist, the paths can be restored in the E2E
service path information.
● Only 4G and 5G devices are supported.
● The network cannot contain third-party devices and PTN devices at the same time.
greatest impact and the base station quality status on the entire network
and in key regions. The faults can be handled preferentially by key region
and severity.
– Alternatively, choose Issue Insight from the main menu to view the fault
type statistics and fault list of the entire network or each region in the
last 7 days or every day. You can also export the fault list and sort the
faults by region and number of affected base stations. In this way, you
can make a troubleshooting plan in advance and handle severe faults in
key regions before users complaint.
▪ Double-click a port marked in red of a flow path. The KPI trend chart
of the corresponding port within 24 hours is displayed, facilitating
troubleshooting.
▪ In the lower right corner of the topology, view information about the
top 3 E2E threshold-crossing flows.
c. Based on expert experience and big data analysis, provide clear fault
locations, possible causes, and rectification suggestions. If the fault source
is performance data, you can view the performance data change curve
within six hours before the fault occurs to facilitate troubleshooting.
d. View the details about the base stations affected by the fault. After the
fault is rectified, check the recovery status of the base stations.
The numbers of interruption threshold-crossing times, packet loss
threshold-crossing times, and delay threshold-crossing times in the list
area are the sum of the numbers of times that the collected indicators of
E2E flows of base stations exceed the interruption, packet loss, and delay
deterioration alarm thresholds in the last minute of the current day or in
the last day, respectively.
3. You can also view performance reports to learn detailed indicator data of
service flows in different periods from the dimensions of base stations, data
flows, and signaling flows, helping you learn about the QoS of base stations
on the entire network.
2. Based on the iFIT in-line and hop-by-hop detection technology, restore the
complete service path from the base station to the EPC. Select the upstream
and downstream flows to view the hop-by-hop indicators of the top 3
threshold-crossing flows or all threshold-crossing flows of the base station.
When the hop-by-hop flow or NE KPI exceeds the threshold, the link, NE, and
port are marked in red. Fault demarcation in the wireless and transport
network domains is clear, and faults in the transport network can be easily
located.
– In the upper right corner of the topology, view all or abnormal indicators
of service flows, or perform fuzzy search to locate devices in the topology
one by one.
– Double-click a port marked in red of a flow path. The KPI trend chart of
the corresponding port within 24 hours is displayed, facilitating
troubleshooting.
– In the lower right corner of the topology, view information about the E2E
flows.
3. Select a time point in the timeline. Based on the fault clustering and diagnosis
results, summarize the fault analysis and fault list of the base station at the
selected time point in the timeline. Quickly rectify the faults based on the
fault locations, possible causes, and rectification suggestions.
4. Pay attention to the faults of the affected base stations in the Not restored
state. If the diagnosis status includes Diagnostic failure or Not diagnosed,
enter Issue Insight, select the corresponding faults under the fault list to
perform diagnosis again.
5. View the base station and flow indicator trend and flow report information to
facilitate troubleshooting.
– View the change trend of base station rates, data flows, and signaling
flow indicators within 24 hours.
– View the source and sink IP addresses, source and sink ports, VPN routing
and forwarding (VRF) of E2E data flows and signaling flows in different
periods, the colored threshold-crossing indicators such as packet loss rate,
delay, retransmission rate (only supported by IP RAN signaling flow), and
interruption times (only supported by IP RAN signaling flow), and the
indicator change trends.
In PTN scenarios, you can also view information about single flow faults
to facilitate fault locating and handling. Click Hop By Hop Performance
in the Operation column to view the change trend of the maximum rate,
delay, and packet loss rate within 24 hours. Pay attention to the links,
NEs, and ports marked in red in the physical topology and the indicator
trend chart.
6. Play back 24*7 SLA data to accurately restore historical faulty service topology
paths, fault diagnosis results, base station and flow indicator trends, and flow
report information, supporting tracing and locating of historical issues.
6.4.4.5 Specifications
This section describes the specifications of the Mobile Transport Service Assurance
feature. Currently, only the performance of the transport network can be
monitored.
Item Specifications
Item Specifications
AI 90%
clustering
accuracy
(Number of
faults that
are
correctly
clustered in
the public
path/Total
number of
faults)
7 Usage Scenarios
7.1 IP Backbone
7.2 5G Bearer
7.1 IP Backbone
Background
In the cloud era with endless new services and new requirements emerging, the
backbone network is an indispensable bridge for connecting various Internet
services and inevitably faces new challenges. Carriers need to construct a data
center-oriented intelligent backbone network to meet the requirements of the
cloud computing age for more flexible, lower cost, lower latency, higher
bandwidth, and higher reliability.
● Frequent expansion because the backbone network traffic doubles every two
years. With the rapid development of applications such as 4K and VR, video
traffic increases exponentially, occupying most of the total bandwidth. This
proposes challenges such as large capacity, low power consumption, and
scalability to core routers on the backbone network.
● Complex network structure and O&M. Each service is carried by an
independent network, causing a large number of dedicated networks and
devices. The optical layer and IP layer are deployed separately. The service
deployment takes a long time and backup resources are redundant. These
factors cause a high total cost of operation (TCO).
● Difficult to be planned due to changeable services: Service cloudification has
become a trend. In the future, about 80% new applications will be deployed
in the cloud, and cloud data centers will become new traffic distribution
areas. Due to the uncertainty of cloud services, traffic burst, and
unpredictable traffic, traffic congestion, difficult monitoring, and adjustment
difficulties become new challenges for the backbone network in the cloud
age.
Solution
Based on the NCE solution, the NCE provides the following solutions to solve
problems such as slow deployment of IP WAN leased line services, low network
resource efficiency, difficult application innovation, and complex O&M for carriers
and service providers:
1. Service automation
Based on users' intentions, detail parameters are shielded to reduce the
workload of manual information input. Based on model drivers, service
provisioning is implemented in an end-to-end manner in minutes.
2. Improving network utilization by global optimization and quickly restoring
congested links by partial optimization.
Through the quality map, user can view the network SLA and diagnose the
faulty links one by one to quickly determine congested links for partial
optimization. Preview before the optimization and view of history after
optimization are supported.
During optimization, tunnels can be locked to ensure that key services are not
affected.
3. Intelligent traffic prediction and online simulation for intended network
expansion.
Benefits
The CloudBackbone solution provided by Huawei enables real-time visualization,
adjustment, automation, and openness of network resources, implements real-
time network performance detection in seconds, and implements network
optimization based on optimization algorithms in minutes. This solution improves
the utilization of backbone network resources by 50%, enables carriers to achieve
efficient and automatic O&M, and greatly reduces OPEX.
Features
1. Service automation: NCE automatically creates service-driven tunnels to
provision service in minutes, greatly shortening the service rollout period and
improving service provisioning efficiency. NCE supports on-demand bandwidth
on demand (BoD) to enhance service flexibility. NCE supports intelligent
routing based on multi-factor path computation algorithm to help customers
make optimal path decisions.
2. Network path management: NCE performs unified management, real-time
analysis, and innovative ROAM algorithm to calculate the optimal end-to-end
path for MPLS TE tunnels, achieving optimal single-service paths and global
network traffic balancing, as well as differentiated service management to
preferentially guarantee high-priority services.
3. IP traffic optimization: For native IP networks, NCE provides single-hop
control for outbound and inbound traffic among domains and single-hop or
multi-hop optimization in a domain, which allows flexible bandwidth for VIP
traffic, localizes intra-city traffic, and balances egress link load. This feature
improves backbone network resource utilization to 80%, greatly improving
operation efficiency.
7.2 5G Bearer
Background
Solution
During the evolution from 4G to 5G, the services on the bearer network will
become more complex. The traditional bearer solution will evolve with the 5G
process. The intelligent control capability will become more and more important.
NCE adopts a centralized control mechanism, integrates and communicates with
the management module in real time to implement unified management and
control over old and new services, which is more efficient than the independent
management and control mechanism.
Benefits
As a management and control platform for 5G bearer networks, NCE simplifies
service deployment and provides complete closed-loop O&M SLA assurance
capabilities. With technologies such as Big Data, NCE discovers and resolves
problems before users complain to implement proactive O&M, and greatly
improves troubleshooting efficiency to reduce OPEX.
1. NCE provides a sustainable evolution of 5G solution that supports co-
management of 4G and 5G. Customers can control the evolution process
based on the planning, while the inventory services are not affected.
2. Simplified service deployment and provisioning can effectively reduce the skill
requirements for personnel and reduce OPEX.
The integrated management and control architecture can meet the requirements
of differentiated SLA for 5G bearer networks.
Feature
NCE provides the following capabilities for 5G intelligent O&M:
1. Quick provisioning of basic configurations. The SR, IGP ID, LSR ID, and link IP
address are planned in by planning the resource pool. When the PTN network
is being deployed, these parameters are directly invoked from the resource
pool to improve the PTN 5G online efficiency.
2. Quick site densification based on users' intend to implement site deployment
in minutes. NCE also supports virtual network design, automatic route
diffusion, and service-driven tunnel creation. (For PTN services)
3. Quick location and demarcation for service faults. NCE supports path
restoration and historical replay. Network-wide services are displayed in
different levels.
4. Centralized path computation: Based on the industry's most comprehensive
routing algorithms (hierarchical, cross-domain, bandwidth, and delay
8 High Availability
8.1 Local HA
In the on-premises scenario, NCE provides detailed HA protection solutions for the
hardware, virtualization layer, and application layer of a single site. These
solutions can prevent unknown risks caused by hardware or software faults and
ensure secure and stable running of NCE.
8.2 Disaster Recovery Solutions
Disaster Recovery solutions are provided to prevent unknown risks on the entire
system and ensure secure and stable running of NCE.
8.1 Local HA
In the on-premises scenario, NCE provides detailed HA protection solutions for the
hardware, virtualization layer, and application layer of a single site. These
solutions can prevent unknown risks caused by hardware or software faults and
ensure secure and stable running of NCE.
Hardware Availability
If a fault occurs on the hardware with redundancy protection, the hardware
automatically switches to the normal component to ensure that the NCE OS and
application services are running properly.
RAID ● If the server has eight hard disks, the first and second hard
disks are configured as RAID 1, the third, fourth, fifth, and sixth
hard disks are configured as RAID 10, the seventh hard disk is
configured as RAID 0, and the eighth hard disk is used for full
backup and restoration.
● If the server has 12 hard disks, the hard disks are configured as
RAID 10.
HA of Application Layer
Data HA Backup and restore: The backup and Restoration duration <=
restore function is provided for data. 60 minutes
Data is backed up in time. If data
becomes abnormal, users can restore
them to the normal state by using
backup files.
Notes:
1. Recovery Point Objective (RPO): A service switchover policy that ensures the
least data loss. It tasks the data recovery point as the objective and ensures
that the data used for the service switchover is the latest backup data.
2. Recovery Time Objective (RTO): The maximum acceptable amount of time
for restoring a network or application and regaining access to data after an
unexpected interruption.
Notes:
1. Recovery Point Objective (RPO): A service switchover policy that ensures the
least data loss. It tasks the data recovery point as the objective and ensures
that the data used for the service switchover is the latest backup data.
2. Recovery Time Objective (RTO): The maximum acceptable amount of time
for restoring a network or application and regaining access to data after an
unexpected interruption.
Historical performance data is not synchronized between the primary and secondary sites.
Automatic There are two equipment rooms, and the statuses of the
switchover (without primary and secondary sites need to be monitored in real
the arbitration time. After a site-level fault occurs, an active/standby
service) switchover needs to be quickly implemented to restore
services. In addition, services can bear the risks caused by
the dual-active state.
Manual switchover There are two equipment rooms, and the statuses of the
primary and secondary sites are manually monitored.
After a site-level fault occurs, the system does not have
high requirements on the fault rectification time. Manual
O&M plane can be performed.
DR Solution Scenario
Manual switchover There are two equipment rooms, and the statuses of the
primary and secondary sites are manually monitored.
After a site-level fault occurs, the system does not have
high requirements on the fault rectification time. Manual
O&M can be performed.
Manual Switchover
Solution introduction:
The primary and secondary sites communicate with each other through heartbeat
links and detect the status of the peer site in real time. The primary site
synchronizes product data to the secondary site in real time through the data
replication link to ensure product data consistency between the primary and
secondary sites.
When a disaster occurs at the primary site, perform the takeover operation at the
secondary site. The secondary site becomes the active site and provides services
externally. The primary site becomes standby.
In the DR scenario where premium broadband is deployed, the system cannot automatically
replicate the raw performance data stored in the HDFS in remote HA mode. After the
active/standby switchover is complete, the system automatically collects data from NEs for
service analysis.
The DR network can reuse the original network of NCE to reduce the network
configuration of the primary and secondary sites.
The primary and secondary sites communicate with each other through heartbeat
links and detect the status of the peer site in real time. The primary site
synchronizes product data to the secondary site in real time through the data
replication link to ensure product data consistency between the primary and
secondary sites.
If the primary site is powered off unexpectedly, the hardware is faulty, or the
system breaks down, and the fault is not rectified within the specified time, the
secondary site automatically becomes active and the primary site becomes
standby after the fault is rectified.
If only the heartbeat link between the primary and secondary sites is interrupted,
the secondary site automatically becomes active. In this case, the DR system is in
the dual-active state and generates related alarms. However, both the primary and
secondary sites are running properly.
● If the heartbeat link is recovered within 2 hours, the system enters the dual-
active negotiation mode. The active site before the heartbeat link is
interrupted automatically works as the active site, and the other site becomes
the standby site.
● If the heartbeat link is recovered after 2 hours, the system does not
automatically perform an active/standby switchover. Users may perform
operations at the two sites in the dual-active state and the automatic
switchover may cause data loss. Determine whether to manually switch the
active and standby sites based on the site requirements.
To obtain NCE Process and Service List, perform the following steps:
● For carrier users, log in to https://support.huawei.com/carrier. Search for
"Network Cloud Engine" on the Product Support tab page. On the Network
Cloud Engine page, search for "Common Documents". Process and Service
List is contained in Common Documents.
● For enterprise user, log in to https://support.huawei.com/enterprise. Search
for Network Cloud Engine on the homepage. On the Network Cloud Engine
page, search for "Common Documents". Process and Service List is contained
in Common Documents.
– If the service network (southbound or northbound network) is faulty due
to a network port fault on the server, the system automatically triggers a
switchover.
– If all database instances are faulty, the system automatically triggers a
switchover.
The DR network can reuse the original network of NCE to reduce the network
configuration of the primary and secondary sites.
The arbitration service periodically checks the connectivity between the primary,
secondary, and third-party site, and share the check results through arbitration site
communication link. When the network connection is abnormal or a site fault
causes an arbitration heartbeat exception, the arbitration service selects the
optimal site in the network based on the internal algorithms to perform an active/
standby switchover.
To obtain NCE Process and Service List, perform the following steps:
● For carrier users, log in to https://support.huawei.com/carrier. Search for
"Network Cloud Engine" on the Product Support tab page. On the Network
Cloud Engine page, search for "Common Documents". Process and Service
List is contained in Common Documents.
● For enterprise user, log in to https://support.huawei.com/enterprise. Search
for Network Cloud Engine on the homepage. On the Network Cloud Engine
page, search for "Common Documents". Process and Service List is contained
in Common Documents.
When multiple arbitration services are deployed at a third-party site, the OS of the
third-party site can trace only one external clock source. To ensure that the time of the
third-party site is the same as that of all primary and secondary sites, the clocks of
multiple DR systems must be the same.
● NCE in Manager+Controller+Analyzer deployment scenarios adopts five-node
arbitration service deployment. The arbitration service is deployed at three
sites in 2+2+1 mode.
– Two arbitration nodes are deployed at both the primary site and
secondary site. It is recommended that the two arbitration nodes be
deployed on the Common_Service node. The arbitration nodes between
the two sites are mutually protected. One arbitration node is deployed at
the third-party site.
– ETCD is deployed on the five arbitration nodes to form an etcd cluster.
Monitor is deployed on the four nodes of the primary site and secondary
site, which monitors the network connectivity between sites and saves
the results in the etcd cluster.
The DR network can reuse the original network of NCE to reduce the network
configuration of the primary and secondary sites.
9 Security
NCE uses the security architecture design that complies with industry standards
and practices to ensure system, network, and application security from multiple
layers.
9.1 Security Architecture
9.2 Security Functions
User NCE can manage the roles, permissions, and access policies
management of system users.
Log NCE can manage operation logs, system logs, security logs,
management NE logs, and northbound logs and, dump Syslog logs.
Security Description
Function
10 Privacy Protection
The preceding figure shows the personal data and usage in the current NCE
version. For details about the personal data scope and protection measures, see
NCE V100R019C00 Personal Data Description.
NCE complies with the following seven principles when processing personal data:
● Lawfulness, fairness and transparency: Personal data shall be processed
lawfully, fairly and in a transparent manner in relation to the data subject.
● Purpose limitation: Personal data shall be collected for specified, explicit and
legitimate purposes and not further processed in a manner that is
incompatible with those purposes.
● Data minimization: Personal data shall be adequate, relevant and limited to
what is necessary in relation to the purposes for which they are processed.
Huawei shall apply anonymization or pseudonymization to personal data if
possible to reduce the risks to the data subjects concerned.
● Storage limitation: Personal data shall be kept for no longer than is
necessary for the purposes for which the personal data is processed.
● Integrity and confidentiality: Personal data shall be processed in a manner
that ensures appropriate security of the personal data, including protection
against unauthorized or unlawful processing and against accidental loss,
destruction or damage, using appropriate technical or organizational
measures.
● Accuracy: Personal data shall be accurate and, where necessary, kept up to
date; Proper measures must be taken to promptly delete or correct inaccurate
personal data based on the purpose of data processing.
● Accountability: The data controller must be responsible for and demonstrate
compliance with the preceding principles.
11 Specifications
Alarm response speed In normal circumstances, alarms are displayed on NCE within
10 seconds after they are generated on NEs.
Table 11-3 Relationship between the alarm capacity and the NE management scale
Management Maximum Current Alarms (unit: Maximum Historical Alarms (unit:
Scale 10,000) 10,000)
2000 2 100
6000 5 200
NOTE
The value is 10 in the Manager
+Controller+Analyzer scenario of NCE
(IP domain), and 5 in other scenarios.
15000 10 400
30000 10 400
NOTE
The value is 30 in the Manager
+Controller+Analyzer scenario of NCE
(IP domain), and 10 in other scenarios.
For details about the NE management scale of NCE, see 11.2 NE Management
Capabilities and Maximum Concurrent Client Connections.
Topology Capabilities
Indicator Value
Subnets The number of subnets is not limited. Each subnet can contain a
maximum of 500 physical NEs at a maximum of six layers. 200
physical NEs are recommended.
Users ≤ 2000
● The PMS performance data can be collected in SNMP, Bulk, or Qx mode. The maximum
number of equivalent records that can be collected in each mode are as follows (in the
unit of maximum equivalent records/15 minutes):
● SNMP mode: 150,000
● Bulk mode: 500,000
● Qx mode: 40,000
● If multiple collection methods are used, conversion is required. For example, if SNMP
+Bulk is used for collection and 50,000 records are collected in SNMP mode, the number
of records collected in Bulk mode can be calculated as follows:
X=50/15 x (15 - 5) ≈ 33
Qx - 2,000 20,000
Qx - 6,000 40,000
Qx - 15,000 80,000
Qx - 30,000 100,000
Qx - 50,000 100,000
Netstream A maximum of 1,000,000 flows ● For details about how to calculate the
per 5 minute number of equivalent NEs, see 11.4
Equivalent Coefficients.
● Only Analyzer (basic analysis+flow
collection) with 6000 equivalent NEs is
supported.
● Netstream collection applies only to the
servers added to the Analyzer (basic
analysis) hardware resources. Analyzer
(basic analysis) can also use other collection
modes.
The collection node of NCE Analyzer does not support dynamic load balancing of existing
tasks.
NBI Capabilities
CORBA 4
XML 20
RESTful 10
For CORBA, XML, and REST, the number of concurrent requests refers to the maximum
number of interfaces that OSSs can invoke. The number is collected among all OSSs and
interfaces. For example, if the number is 4, it is probable that one OSS invokes four
interfaces (a, b, c, d) at the same time, or four OSSs invoke one interface (a) at the same
time.
TEXT ● As the FTP client, NCE transmits files to only one OSS.
● As the FTP server, NCE can be accessed by a maximum
of three OSSs.
For SNMP and TEXT, the number of NCE connections is collected by OSS.
Table 11-8 Maximum NE management capability and client connection indicators (IP domain)
Component Maximum Maximum Equivalent Maximum
Physical NEs NEs Concurrent Client
Connections
Table 11-9 Maximum NE management capability and client connection indicators (NCE-
CrossDomain)
Sub-domain Component Maximum Physical Maximum
NEs Equivalent NEs
Maximum
Concurrent Client
Connections
Number of LSPs ● If only RSVP or SR tunnels are ● If only RSVP or SR tunnels are
involved, NCE can manage a involved, NCE can manage a
maximum of 128,000 dynamic maximum of 128,000 dynamic
tunnels and 256,000 LSPs, tunnels and 256,000 LSPs,
assuming that hot standby is assuming that hot standby is
enabled for all of these tunnels. enabled for all of these tunnels.
● If only SR Policies are involved, ● If only SR Policies are involved,
NCE can manage a maximum of NCE can manage a maximum
64,000 dynamic tunnels and of 64,000 dynamic tunnels and
128,000 LSPs, assuming that hot 128,000 LSPs, assuming that
standby is enabled for all of hot standby is enabled for all
these tunnels. of these tunnels.
● If RSVP tunnels, SR tunnels, and ● If RSVP tunnels, SR tunnels, and
SR Policies are all involved, NCE SR Policies are all involved, NCE
can manage a maximum of can manage a maximum of
128,000 dynamic tunnels 128,000 dynamic tunnels
(including 64,000 SR Policies at (including 64,000 SR Policies at
most) and 256,000 LSPs. most) and 256,000 LSPs.
Number of IP service IP service interfaces include access IP service interfaces include access
access interfaces service interfaces and network service interfaces and network
service interfaces. The total number service interfaces. The total
of IP service interfaces is calculated number of IP service interfaces is
as follows: calculated as follows:
Total number of IP service Total number of IP service
interfaces = N × 20 interfaces = N × 20
N indicates the maximum number N indicates the maximum number
of equivalent NEs. of equivalent NEs.
Indicator Value
Definition
● Equivalent NE: a uniform criterion used to describe and calculate the
management capabilities of NCE. This criterion is needed because different
types of NEs occupy different system resources to support different functions,
features, cross-connect capacities, and numbers of boards, ports, and
channels. Therefore, different types of NEs and ports must be converted to
equivalent NEs based on the number of system resources they occupy. An
equivalent NE occupies as many system resources as an STM-1 transport NE.
● Equivalent coefficient: Resources occupied by physical NEs or ports/Resources
occupied by equivalent NEs
Calculation
The number of equivalent NEs that NCE can manage is calculated according to
the following rules:
For example, if there are 5 NE5000Es (equivalent coefficient: 10), 200 S5300s (equivalent
coefficient: 1.25), and 1000 CX200s (equivalent coefficient: 0.625), then:
Number of equivalent NEs in the IP domain = 5 x 10 + 200 x 1.25 + 1000 x 0.625 = 925
NE05E-S/NE05E-M 0.5
NE08E-S/NE08E-M 1.0
NE20/NE20E 1.25
NE20E-S4 0.5
NE20E-S8/S16/S8A/S16A 1.0
NE20E-M2E/NE20E-M2F 0.5
NE40/NE80 5.0
NE40E-X1 0.5
NE40E-X2 1.0
NE40E-X3/X3A 1.25
NE40E-4 1.25
NE40E-X8/X8A 2.5
NE40E-8 2.5
NE40E-X16/X16A 5.0
NE40E-M2E/NE40E-M2F/ 0.5
NE40E-M2H/NE40E-M2K
NE40E-F1A 0.5
NE80E 5.0
NE5000E 10.0 x N
N indicates the number
of chassis.
AR150 0.125
AR200 0.125
AR1200/AR2200/AR3200/ 0.25
AR3600
NE16EX 0.25
R series 1.0
NE9000/NE9000-20 10.0
NE9000-8 5.0
RM9000 1.0
S9300X-4 6.0
S9300X-8 6.0
S9300X-12 9.0
S9703 2.0
S9706 3.5
S9712 6.0
CE16808 8.0
CE16816 10.0
CE12804 6.0
CE12808 8.0
CE12812 10.0
PTN6900-F1A 0.5
PTN6900-M8C 0.5
PTN6900-M2K/M2E/M2F 0.5
PTN6900-2-M8A/M16A 1.0
PTN6900-2/PTN6900-2-M8/ 1.0
PTN6900-2-M14/PTN6900-2-
M16
PTN6900-3/3A 1.25
PTN6900-8/8A 2.5
PTN6900-16/16A 5.0
Layer 2 Virtual NE 1
Layer 3 Virtual NE 1
CX600-X1 0.5
CX600-X2 1.0
CX600-X3 1.25
CX600-4 1.25
CX600-X8 2.5
CX600-8 2.5
CX600-X16 5.0
CX600-16 5.0
CX600-M2E/CX600-M2F/ 0.5
CX600-M2H/CX600-M2K
CX600-F1A 0.5
CX6620 10.0
CX6601/CX6602 0.5
CX6608 5.0
NGFW 0.75
NE40E-FW 4.0
NE80E-FW 8.0
USG9120 4.0
USG9310 4.0
USG9320 8.0
USG9520 1.5
USG9560 4.0
USG9580 8.0
USG3000 0.25
USG50 0.25
SIG9820 8.0
SIG9800-X3 1.5
SIG9800-X8 4.0
SIG9800-X16 8.0
SeMG9811-X8 4.0
SeMG9811-X16 8.0
NE80E-DPI 8.0
SVN2200 0.25
SVN5300 0.75
SVN5500 0.75
ASG2200 0.25
ASG2600 0.75
ASG2800 0.75
BGW9916 5.0
Direct 1
Static 1
OSPF 1.5
IS-IS 1.5
BGP 1.6
VPN 1.6
FIB 1
On a network, there are different node roles such as PEs, CEs, and UPEs. Calculate
the total number of equivalent routes on the network as follows:
1. Query the total number of protocol routes on a node of each role.
2. Calculate the number of equivalent routes of the node based on the formula.
3. Multiply the number of equivalent routes by the number of nodes of a role to
obtain the total number of equivalent routes of the role.
4. Sum up the numbers of equivalent routes of nodes of all roles.
Finally, compare the estimated number of equivalent routes with the maximum
number of equivalent routes (10 million) supported.
If there are 500 PEs, 1000 CEs, and 2000 UPEs on a network and the numbers of
equivalent routes of a PE, CE, and UPE are A, B, and C respectively, the total
number of equivalent routes on the network is estimated based on the formula as
follows: 500 x A + 1000 x B + 2000 x C.
12 Version Requirements
● The New Version column lists the NE versions newly supported by the current NCE
version.
● The Compatible Version column lists the NE versions supported by earlier NCE versions.
Unless otherwise specified, the current NCE version also supports these NE versions.
Rules for defining commercial versions of NE software: a.bb.cc.dd. "a" indicates the NE
platform version. Currently, 4, 5 and 8 are supported. "bb" indicates the product name. "cc"
indicates the R version of the product. To be specific, 01 represents R001, 02 represents
R002, and so on. "dd" indicates the C version of the product. Mapping principle:
1. If the mapping table provides only the information that a.bb.cc.20 is supported by
version A of the NCE, a.bb.cc.2x is supported by version A of the NCE.
2. If the mapping table provides only the information that a.bb.cc is supported by version
A of the NCE, a.bb.cc.xx is supported by version A of the NCE.
S5320-32X-EI-24S-DC
S5320-50X-EI-46S-AC
S5320-50X-EI-46S-DC
S5320-32X-EI-AC
S5320-32X-EI-DC
S5320-32P-EI-AC
S5320-32P-EI-DC
S5320-52X-EI-AC
S5320-52X-EI-DC
S5320-52P-EI-AC
S5320-52P-EI-DC
S5320-50X-EI-AC
S5320-50X-EI-DC
S5300-28TP-PWR-LI-AC
S5300-10P-PWR-LI-AC
S5320-28X-SI-DC
S5320-52X-SI-DC
S5320-52X-PWR-SI-ACF
S5321-28X-SI-AC
S5321-28X-SI-DC
S5321-52P-SI-AC
S5321-52X-SI-AC
S5321-52X-SI-DC
S5320-28P-SI-AC
S5320-28X-SI-AC
S5320-52P-SI-AC
S5320-52X-SI-AC
S5320-28X-PWR-SI-AC
S5320-52X-PWR-SI-AC
S5320-12TP-LI-AC
S5320-12TP-PWR-LI-AC
S5320-28P-LI-AC
S5320-28X-LI-AC
S5320-28X-LI-DC
S5320-28P-PWR-LI-AC
S5320-28X-PWR-LI-AC
S5320-52P-LI-AC
S5320-52X-LI-AC
S5320-52X-LI-DC
S5320-52P-PWR-LI-AC
S5320-52X-PWR-LI-AC
S5321-28X-SI-24S-AC
S5321-28X-SI-24S-DC
S5320-28X-LI-24S-AC
S5320-28X-LI-24S-DC
S5321-28X-SI-24S-AC
S5321-28X-SI-24S-DC
S5320-28X-LI-24S-AC
S5320-28X-LI-24S-DC
S5320-28X-PWR-SI-DC
S5320-52X-PWR-SI-DC
S5320-28P-SI-DC
S5320-52P-SI-DC
S5320-12TP-LI-DC
S5320-28X-PWR-SI
S5320-52X-PWR-SI
S5320-28P-SI S628X-E
S628X-PWR-E S652-E
S652X-E S652-PWR-E
S652X-PWR-E S628-
PWR-E S628-E
S5700-28P-LI-24S-4AH
S5700-28X-LI-24CS-AC
S5700-28X-LI-24CS-DC
S5710-52C-PWR-EI
S5700-28X-LI-AC
S5700-28X-LI-DC
S5700-52X-LI-AC
S5700-52X-LI-DC
S5700-28X-PWR-LI-AC
S5700-52X-PWR-LI-AC
S5710-108C-HI-AC
S5710-108C-PWR-HI-AC
S5710-28C-PWR-EI-AC
S5710-52C-PWR-EI-AC
S5700-28C-PWR-SI
S5700-52C-PWR-SI
S5710-28C-PWR-LI
S5710-52C-PWR-LI
S5710-28C-LI
S5710-52C-LI
S5700-28X-LI-24S-DC
S5700-28X-LI-24S-AC
S5700-28P-LI-BAT
S5700-28P-LI-4AH
S5700-28P-LI-24S-BAT
S5700-28P-LI-24S-4AH
S5700-28X-LI-24CS-AC
S5700-28X-LI-24CS-DC
S5700S-28P-LI-AC
S5700S-52P-LI-AC
S5700S-28P-LI-AC
S5700S-52P-LI-AC
S5700S-52P-LI-AC
Huawei-S5700-8P-G
S5720-12TP-LI-AC
S5720S-12TP-LI-AC
S5720-12TP-PWR-LI-AC
S5720S-12TP-PWR-LI-AC
S5720-28P-LI-AC
S5720S-28P-LI-AC
S5720-28X-LI-AC
S5720-28X-LI-DC
S5720S-28X-LI-AC
S5720-28P-PWR-LI-AC
S5720-28X-PWR-LI-AC
S5720S-28X-PWR-LI-AC
S5720-52P-LI-AC
S5720S-52P-LI-AC
S5720S-52X-LI-AC
S5720-52X-LI-AC
S5720-52X-LI-DC
S5720-52P-PWR-LI-AC
S5720S-52P-PWR-LI-AC
S5720S-52X-PWR-LI-AC
S5720-52X-PWR-LI-AC
S5720-28X-SI-24S-AC
S5720-28X-SI-24S-DC
S5720-28X-LI-24S-AC
S5720S-28X-LI-24S-AC
S5720-28X-LI-24S-DC
S5720-28TP-PWR-LI-ACL
S5720S-28TP-PWR-LI-
ACL S5720-28TP-PWR-LI-
AC S5720-28X-SI-24S-AC
S5720-28X-SI-24S-DC
S5720-28X-LI-24S-AC
S5720S-28X-LI-24S-AC
S5720-28X-LI-24S-DC
S5720-28TP-PWR-LI-ACL
S5720S-28TP-PWR-LI-
ACL S5720-28TP-PWR-LI-
AC S5720-28TP-LI-AC
S5720-16X-PWH-LI-AC
S5700-28P-LI-BAT
S5700-28P-LI-4AH
S5700-28P-LI-24S-BAT
S5700-28P-LI-24S-4AH
S5700-28X-LI-24CS-AC
S5700-28X-LI-24CS-DC
S5700-52X-LI-DC
S5700-28X-PWR-LI-AC
S5700-52X-PWR-LI-AC
S5700-28P-LI-BAT
S5700-28P-LI-4AH
S5700-28P-LI-24S-BAT
S5700-28P-LI-24S-4AH
S5700-52X-LI-48CS-AC
S5700-28TP-LI-AC
S5700-28TP-PWR-LI-AC
S5701-28TP-PWR-LI-AC
S5700S-28P-LI-AC
S5700S-52P-LI-AC
VG10 N/A V1
VG20 N/A V1
VG80 N/A V1
XE Series N/A V1
A Appendix
Standard/Protocol Name
Standard/Protocol Name
ITU-T G.774 (01, 02, 03, Synchronous digital hierarchy (SDH) - Management
04) information model for the network element view
Standard/Protocol Name
Standard/Protocol Name
Standard/Protocol Name
Standard/Protocol Name
Standard/Protocol Name
Standard/Protocol Name
A.2 Glossary
Numerics
3G See Third Generation.
802.1Q in 802.1Q A VLAN feature that allows the equipment to add a VLAN tag to a tagged
(QinQ) frame. The implementation of QinQ is to add a public VLAN tag to a frame
with a private VLAN tag to allow the frame with double VLAN tags to be
transmitted over the service provider's backbone network based on the
public VLAN tag. This provides a layer 2 VPN tunnel for customers and
enables transparent transmission of packets over private VLANs.
A
ACL See Access Control List.
ADMC automatically detected and manually cleared
ADSL See asymmetric digital subscriber line.
ADSL2+ asymmetric digital subscriber line 2 plus
ANCP See Access Node Control Protocol.
API See application programming interface.
APS automatic protection switching
AS See autonomous system.
ASBR See autonomous system boundary router.
ASN.1 See Abstract Syntax Notation One.
ASON automatically switched optical network
Abstract Syntax A syntax notation type employed to specify protocols. Many protocols
Notation One (ASN. defined by the ITU-T use this syntax format. Other alternatives are standard
1) text or Augmented Backus-Naur Form (ABNF).
Access Control List A list of entities, together with their access rights, which are authorized to
(ACL) access a resource.
Access Node Control An IP-based protocol that operates between the access node (AN) and the
Protocol (ANCP) network access server (NAS), over a DSL access and aggregation network.
application An application programming interface is a particular set of rules and
programming specifications that are used for communication between software programs.
interface (API)
asymmetric digital A technology for transmitting digital information at a high bandwidth on
subscriber line existing phone lines to homes and businesses. Unlike regular dialup phone
(ADSL) service, ADSL provides continuously-available, "always on" connection.
ADSL is asymmetric in that it uses most of the channel to transmit
downstream to the user and only a small part to receive information from
the user. ADSL simultaneously accommodates analog (voice) information
on the same line. ADSL is generally offered at downstream data rates from
512 kbit/s to about 6 Mbit/s.
autonomous system A network set that uses the same routing policy and is managed by the
(AS) same technology administration department. Each AS has a unique
identifier that is an integer ranging from 1 to 65535. The identifier is
assigned by IANA. An AS can be divided into areas.
autonomous system A router that exchanges routing information with other autonomous system
boundary router boundary routers.
(ASBR)
B
B/S Browser/Server
BFD See Bidirectional Forwarding Detection.
BGP Border Gateway Protocol
C
CAS See Central Authentication Service.
CBU See cellular backhaul unit.
CC See continuity check.
CCC circuit cross connect
CES See circuit emulation service.
CIR committed information rate
continuity check An Ethernet connectivity fault management (CFM) method used to detect
(CC) the connectivity between MEPs by having each MEP periodically transmit a
Continuity Check Message (CCM).
customer-premises Customer-premises equipment or customer-provided equipment (CPE) is
equipment (CPE) any terminal and associated equipment located at a subscriber's premises
and connected with a carrier's telecommunication channel at the
demarcation point ("demarc"). The demarc is a point established in a
building or complex to separate customer equipment from the equipment
located in either the distribution infrastructure or central office of the
communications service provider. CPE generally refers to devices such as
telephones, routers, network switches, residential gateways (RG), set-top
boxes, fixed mobile convergence products, home networking adapters and
Internet access gateways that enable consumers to access communications
service providers' services and distribute them around their house via a local
area network (LAN).
D
DB database
DC data center
DCC data communication channel
DCI See Data Center Interconnect.
DCM See dispersion compensation module.
DCN See data communication network.
DDoS See distributed denial of service.
DSLAM See digital subscriber line access multiplexer.
DWDM See dense wavelength division multiplexing.
Data Center DCI refers to network interconnection between two data centers for cross-
Interconnect (DCI) DC service transmission and migration.
DoS See denial of service.
data communication A communication network used in a TMN or between TMNs to support the
network (DCN) data communication function.
denial of service DoS attack is used to attack a system by sending a large number of data
(DoS) packets. As a result, the system cannot receive requests from the valid users
or the host is suspended and cannot work normally. DoS attack includes
SYN flood, Fraggle, and others. The DoS attacker only stops the valid user
from accessing resources or devices instead of searching for the ingresses of
the intranet.
dense wavelength The technology that utilizes the characteristics of broad bandwidth and low
division attenuation of single mode optical fiber, employs multiple wavelengths
multiplexing with specific frequency spacing as carriers, and allows multiple channels to
(DWDM) transmit simultaneously in the same fiber.
digital subscriber A network device, usually situated in the main office of a telephone
line access company, that receives signals from multiple customer Digital Subscriber
multiplexer Line (DSL) connections and uses multiplexing techniques to put these
(DSLAM) signals on a high-speed backbone line.
dispersion A type of module that contains dispersion compensation fibers to
compensation compensate for the dispersion of the transmitting fiber.
module (DCM)
distributed denial of Distributed Denial of Service attack is one in which a multitude of
service (DDoS) compromised systems attack a single target, therefore causing denial of
service for users of the targeted system. The flood of incoming messages to
the target system essentially and occupies the resources of it, therefore
denying services to legitimate users.
E
E-LAN See Ethernet local area network.
E-Line See Ethernet line.
E2E end to end
ECC See embedded control channel.
EDFA See erbium-doped fiber amplifier.
EPL See Ethernet private line.
EPON See Ethernet passive optical network.
EVPL See Ethernet virtual private line.
EoO Ethernet over OTN
EoW Ethernet over WDM
Ethernet line (E- A type of Ethernet service that is based on a point-to-point EVC (Ethernet
Line) virtual connection).
Ethernet local area A type of Ethernet service that is based on a multipoint-to-multipoint EVC
network (E-LAN) (Ethernet virtual connection).
Ethernet passive An Ethernet Passive Optical Network (EPON) is a passive optical network
optical network based on Ethernet. It is a new generation broadband access technology that
(EPON) uses a point-to-multipoint structure and passive fiber transmission. It
supports upstream/downstream symmetrical rates of 1.25 Gbit/s and a
reach distance of up to 20 km. In the downstream direction, the bandwidth
is shared based on encrypted broadcast transmission for different users. In
the upstream direction, the bandwidth is shared based on TDM. EPON
meets the requirements for high bandwidth.
Ethernet private line A type of Ethernet service provided by SDH, PDH, ATM, or MPLS server
(EPL) layer networks. This service is carried over dedicated bandwidth between
point-to-point connections.
Ethernet virtual A type of Ethernet service provided by SDH, PDH, ATM, or MPLS server
private line (EVPL) layer networks. This service is carried over shared bandwidth between
point-to-point connections.
embedded control A logical channel that uses a data communications channel (DCC) as its
channel (ECC) physical layer to enable the transmission of operation, administration, and
maintenance (OAM) information between NEs.
erbium-doped fiber An optical device that amplifies optical signals. This device uses a short
amplifier (EDFA) optical fiber doped with the rare-earth element, Erbium. The signal to be
amplified and a pump laser are multiplexed into the doped fiber, and the
signal is amplified by interacting with doping ions. When the amplifier
passes an external light source pump, it amplifies the optical signals in a
specific wavelength range.
F
FCAPS fault, configuration, accounting, performance, security
FDN fixed dialing number
FIB See forwarding information base.
FPGA See field programmable gate array.
FRR See fast reroute.
FTP See File Transfer Protocol.
FTTB See fiber to the building.
FTTC See fiber to the curb.
FTTH See fiber to the home.
File Transfer A member of the TCP/IP suite of protocols, used to copy files between two
Protocol (FTP) computers on the Internet. Both computers must support their respective
FTP roles: one must be an FTP client and the other an FTP server.
fast reroute (FRR) A technology which provides a temporary protection of link availability
when part of a network fails. The protocol enables the creation of a
standby route or path for an active route or path. When the active route is
unavailable, the traffic on the active route can be switched to the standby
route. When the active route is recovered, the traffic can be switched back
to the active route. FRR is categorized into IP FRR, VPN FRR, and TE FRR.
fiber to the building A fiber-based networking scenario. There are two types of FTTB scenarios:
(FTTB) multi-dwelling unit (MDU) and business buildings. Each scenario includes
the following service types: FTTB to the MDU and FTTB to the business
buildings.
fiber to the curb A fiber-based networking scenario. The FTTC scenario provides the
(FTTC) following services: asymmetric broadband services (such as digital
broadcast service, VOD, file download, and online gaming), symmetric
broadband services (such as content broadcast, email, file exchange,
distance education, and distance medical care), POTS, ISDN, and xDSL
backhaul services.
fiber to the home A fiber-based networking scenario. The FTTH scenario provides the
(FTTH) following services: asymmetric broadband services (digital broadcast
service, VoD, file download, and online gaming), symmetric broadband
services (content broadcast, email, file exchange, distance education, and
distance medical care), POTS, and ISDN services.
field programmable A semi-customized circuit that is used in the Application Specific Integrated
gate array (FPGA) Circuit (ASIC) field and developed based on programmable components.
FPGA remedies many of the deficiencies of customized circuits, and allows
the use of many more gate arrays.
forwarding A table that provides information for network hardware (bridges and
information base routers) for them to forward data packets to other networks. The
(FIB) information contained in a routing table differs according to whether it is
used by a bridge or a router. A bridge relies on both the source (originating)
and destination addresses to determine where and how to forward a
packet.
G
GNE See gateway network element.
GRE See Generic Routing Encapsulation.
GUI See graphical user interface.
Generic Routing A mechanism for encapsulating any network layer protocol over any other
Encapsulation (GRE) network. GRE is used for encapsulating IP datagrams tunneled through the
Internet. GRE serves as a Layer 3 tunneling protocol and provides a tunnel
for transparently transmitting data packets.
gateway network An NE that serves as a gateway for other NEs to communicate with a
element (GNE) network management system.
graphical user A visual computer environment that represents programs, files, and options
interface (GUI) with graphical images, such as icons, menus, and dialog boxes, on the
screen.
H
HA See high availability.
HFC See high-level foundation classes.
HMAC See hash-based message authentication code.
HQoS See hierarchical quality of service.
HSL See high-level script language.
HTTP Hypertext Transfer Protocol
HTTPS See Hypertext Transfer Protocol Secure.
HVPLS hierarchical virtual private LAN service
Hypertext Transfer An HTTP protocol that runs on top of transport layer security (TLS) and
Protocol Secure Secure Sockets Layer (SSL) for secured transactions. It is used to establish a
(HTTPS) reliable channel for encrypted communication and secure identification of a
network web server. HTTPS consists of communication over Hypertext
Transfer Protocol (HTTP) within a connection encrypted by Transport Layer
Security, or its predecessor, Secure Sockets Layer. The main motivation for
HTTPS is authentication of the visited website and protection of the privacy
and integrity of the exchanged data.
I
IANA See Internet Assigned Numbers Authority.
ICMP See Internet Control Message Protocol.
IDC See Internet Data Center.
IDN See integrated digital network.
IETF Internet Engineering Task Force
IGP See Interior Gateway Protocol.
IOPS input/output operations per second
IP See Internet Protocol.
IP RAN See IP radio access network.
IP radio access A network that uses IP technology to achieve data backhaul on a radio
network (IP RAN) access network.
IPTV See Internet Protocol television.
IPv4 See Internet Protocol version 4.
IPv6 See Internet Protocol version 6.
ISDN Integrated Services Digital Network
ISP See Internet service provider.
integrated digital A set of digital nodes and digital links that uses integrated digital
network (IDN) transmission and switches to provide digital connections between two or
more defined points.
K
KPI key performance indicator
L
L2VPN Layer 2 virtual private network
L3VPN Layer 3 virtual private network
LAG See link aggregation group.
LAN See local area network.
LB See loopback.
LLDP See Link Layer Discovery Protocol.
LSA link-state advertisement
LSR See label switching router.
LTE See Long Term Evolution.
Link Layer Discovery The Link Layer Discovery Protocol (LLDP) is an L2D protocol defined in IEEE
Protocol (LLDP) 802.1ab. Using the LLDP, the NMS can rapidly obtain the Layer 2 network
topology and changes in topology when the network scales expand.
Long Term Evolution LTE, an abbreviation for Long-Term Evolution, commonly marketed as 4G
(LTE) LTE, is a standard for wireless communication of high-speed data for mobile
phones and data terminals. It is based on the GSM/EDGE and UMTS/HSPA
network technologies, increasing the capacity and speed using a different
radio interface together with core network improvements.[1][2] The
standard is developed by the 3GPP (3rd Generation Partnership Project) and
is specified in its Release 8 document series, with minor enhancements
described in Release 9.
label switching Basic element of an MPLS network. All LSRs support the MPLS protocol.
router (LSR) The LSR is composed of two parts: control unit and forwarding unit. The
former is responsible for allocating the label, selecting the route, creating
the label forwarding table, creating and removing the label switch path; the
latter forwards the labels according to groups received in the label
forwarding table.
link aggregation An aggregation that allows one or more links to be aggregated together to
group (LAG) form a link aggregation group so that a MAC client can treat the link
aggregation group as if it were a single link.
local area network A network formed by the computers and workstations within the coverage
(LAN) of a few square kilometers or within a single building, featuring high speed
and low error rate. Current LANs are generally based on switched Ethernet
or Wi-Fi technology and run at 1,000 Mbit/s (that is, 1 Gbit/s).
loopback (LB) A troubleshooting technique that returns a transmitted signal to its source
so that the signal or message can be analyzed for errors. The loopback can
be a inloop or outloop.
M
MA maintenance association
MAC See Media Access Control.
MBB mobile broadband
MD See maintenance domain.
MDF See main distribution frame.
MDU See multi-dwelling unit.
ME See managed element.
MEP maintenance association end point
MIB See management information base.
MIP maintenance association intermediate point
MO managed object
MOS mean opinion score
MPLS See Multiprotocol Label Switching.
MPLS VPN See multiprotocol label switching virtual private network.
MS-PW See multi-segment pseudo wire.
MSAN multiservice access node
MSTP See multi-service transmission platform.
MTOSI Multi-Technology Operations System Interface
MTTR See Mean Time to Repair.
Mean Time to The average time that a device will take to recover from a failure.
Repair (MTTR)
Media Access A protocol at the media access control sublayer. The protocol is at the lower
Control (MAC) part of the data link layer in the OSI model and is mainly responsible for
controlling and connecting the physical media at the physical layer. When
transmitting data, the MAC protocol checks whether to be able to transmit
data. If the data can be transmitted, certain control information is added to
the data, and then the data and the control information are transmitted in
a specified format to the physical layer. When receiving data, the MAC
protocol checks whether the information is correct and whether the data is
transmitted correctly. If the information is correct and the data is
transmitted correctly, the control information is removed from the data and
then the data is transmitted to the LLC layer.
Multiprotocol Label A technology that uses short tags of fixed length to encapsulate packets in
Switching (MPLS) different link layers, and provides connection-oriented switching for the
network layer on the basis of IP routing and control protocols.
main distribution A device at a central office, on which all local loops are terminated.
frame (MDF)
maintenance The network or the part of the network for which connectivity is managed
domain (MD) by connectivity fault management (CFM). The devices in a maintenance
domain are managed by a single Internet service provider (ISP).
managed element A particular entity or resource in a networked system environment. It can
(ME) also represent a physical piece of equipment on the network, the
components of the device on the network, or parts of the network itself.
management A type of database used for managing the devices in a communications
information base network. It comprises a collection of objects in a (virtual) database used to
(MIB) manage entities (such as routers and switches) in a network.
multi-dwelling unit A network access unit used for multi-dwelling units. It provides Ethernet
(MDU) and IP services and optionally VoIP or CATV services; has multiple
broadband interfaces on the user side and optionally POTS ports or CATV
RF ports. It is mainly applicable to FTTB, FTTC, or FTTCab networks.
multi-segment A collection of multiple adjacent PW segments. Each PW segment is a
pseudo wire (MS- point-to-point PW. The use of MS-PWs to bear services saves tunnel
PW) resources and can transport services over different networks.
multi-service A platform based on the SDH platform, capable of accessing, processing
transmission and transmitting TDM services, ATM services, and Ethernet services, and
platform (MSTP) providing unified management of these services.
multiprotocol label An Internet Protocol (IP) virtual private network (VPN) based on the
switching virtual multiprotocol label switching (MPLS) technology. It applies the MPLS
private network technology for network routers and switches, simplifies the routing mode of
(MPLS VPN) core routers, and combines traditional routing technology and label
switching technology. It can be used to construct the broadband Intranet
and Extranet to meet various service requirements.
N
NBI See northbound interface.
NE See network element.
NETCONF See Network Configuration Protocol.
NGFW See Next-Generation Firewall.
NML See network management layer.
NMS See network management system.
NNI network node interface
NSAP See network service access point.
NT1 See network termination 1.
NTP See Network Time Protocol.
Network NETCONF is the communication management protocol. It uses XML-based
Configuration data encoding for the configuration data and protocol messages, and
Protocol (NETCONF) provides a mechanism for installing, operating, and deleting NEs.
Network Time The Network Time Protocol (NTP) defines the time synchronization
Protocol (NTP) mechanism. It synchronizes the time between the distributed time server
and the client.
O
OAM See operation, administration and maintenance.
OCS optical core switching
OCh optical channel with full functionality
ODN optical distribution network
ODU Optical channel Data Unit
ODUk optical channel data unit - k
OLA optical line amplifier
OLT optical line terminal
OMS optical multiplex section
ONT See optical network terminal.
ONU See optical network unit.
OPEX See operating expense.
OPS See optical physical section.
OSI open systems interconnection
OSN optical switch node
P
P2MP point-to-multipoint
PE See provider edge.
PER packed encoding rules
PKI See public key infrastructure.
PMS performance management system
PON passive optical network
Q
QinQ See 802.1Q in 802.1Q.
R
RAID redundant array of independent disks
RAN See radio access network.
REG See regenerator.
REST See Representational State Transfer.
S
SAML See Security Assertion Markup Language.
SAN See storage area network.
SBU See single business unit.
SDH See synchronous digital hierarchy.
SDN See software-defined networking.
SFTP See Secure File Transfer Protocol.
SHDSL See single-pair high-speed digital subscriber line.
SLA See Service Level Agreement.
SMTP See Simple Mail Transfer Protocol.
SN service node
SNCP subnetwork connection protection
SNMP See Simple Network Management Protocol.
SOAP See Simple Object Access Protocol.
SPE See superstratum provider edge.
SR See strict routing.
SRG See shared risk group.
SRLG shared risk link group
SSH See Secure Shell.
SSO single sign-on
STM synchronous transfer mode
STM-1 See Synchronous Transport Module level 1.
Secure File Transfer A network protocol designed to provide secure file transfer over SSH.
Protocol (SFTP)
Secure Shell (SSH) SSH is a set of network protocols for securing connections between
computers, as well as the utility suite that implements these protocols.
Security Assertion An XML-based open standard for exchanging authentication and
Markup Language authorization data between security domains.
(SAML)
Service Level A service contract between a customer and a (SLA) service provider that
Agreement (SLA) specifies the forwarding service a customer should receive. A customer may
be a user organization (source domain) or another DS domain (upstream
domain). A SLA may include traffic conditioning rules which constitute a
TCA in whole or in part.
Simple Mail Transfer The TCP/IP protocol which facilitates the transfer of electronic-mail
Protocol (SMTP) messages, specifies how two systems are to interact, and the format of
messages used to control the transfer of electronic mail.
Simple Network An IETF protocol for monitoring and managing systems and devices in a
Management network. The data being monitored and managed is defined by a MIB. The
Protocol (SNMP) functions supported by the protocol are the request and retrieval of data,
the setting or writing of data, and traps that signal the occurrence of
events.
Simple Object A type of protocol that is lightweight, simple, and XML-based. It is designed
Access Protocol to exchange structured information at web.
(SOAP)
Synchronous Synchronous transfer mode at 155 Mbit/s.
Transport Module
level 1 (STM-1)
shared risk group A group of resources that share a common risk component whose failure
(SRG) can cause the failure of all the resources in the group.
single business unit A network access unit used for individual enterprise users or individual
(SBU) offices. It functions as a broadband access terminal, provides Ethernet, IP,
and TDM services and optionally VoIP services; has Ethernet and E1
interfaces and optionally POTS ports. It is mainly applicable to FTTO
networks.
single-pair high- A symmetric digital subscriber line technology developed from HDSL, SDSL,
speed digital and HDSL2, which is defined in ITU-T G.991.2. The SHDSL port is connected
subscriber line to the user terminal through the plain telephone subscriber line and uses
(SHDSL) trellis coded pulse amplitude modulation (TC-PAM) technology to transmit
high-speed data and provide the broadband access service.
software-defined Software-defined networking (SDN) is an approach to networking in which
networking (SDN) control is decoupled from hardware and given to a software application
called a controller.
storage area A storage area network (SAN) is a dedicated network that provides access
network (SAN) to consolidated, block level data storage. SANs are primarily used to make
storage devices, such as disk arrays, tape libraries, and optical jukeboxes,
accessible to servers so that the devices appear like locally attached devices
to the operating system. A SAN does not provide file abstraction, only
block-level operations. However, file systems built on top of SANs do
provide file-level access, and are known as SAN filesystems or shared disk
file systems. An architecture to attach remote computer storage devices
such as disk array controllers, tape libraries and CD arrays to servers in such
a way that to the operating system the devices appear as locally attached
devices.
strict routing (SR) A routing mode in which the Request-URI specifies the next destination
address of a short message. Before delivering a short message, each SIP
Proxy replaces the Request-URI of the short message with the address
specified by the first route header field, which ensures that the short
message passes by all required SIP Proxies.
superstratum Core devices that are located within a VPLS full-meshed network. The UPE
provider edge (SPE) devices that are connected with the SPE devices are similar to the CE
devices. The PWs set up between the UPE devices and the SPE devices serve
as the ACs of the SPE devices. The SPE devices must learn the MAC
addresses of all the sites on UPE side and those of the UPE interfaces that
are connected with the SPE. SPE is sometimes called NPE.
synchronous digital A transmission scheme that follows ITU-T G.707, G.708, and G.709. SDH
hierarchy (SDH) defines the transmission features of digital signals, such as frame structure,
multiplexing mode, transmission rate level, and interface code. SDH is an
important part of ISDN and B-ISDN.
T
TCA threshold crossing alert
TCO See total cost of ownership.
TCP See Transmission Control Protocol.
TCP/IP Transmission Control Protocol/Internet Protocol
TDM See time division multiplexing.
TE Tunnel See Traffic Engineered Tunnel.
TL1 Transaction Language 1
TLS Transport Layer Security
TMN See telecommunications management network.
TSDN Transport Software Defined Networking
TTM See time to market.
Third Generation The third generation of digital wireless technology, as defined by the
(3G) International Telecommunications Union (ITU). Third generation technology
is expected to deliver data transmission speeds between 144 kbit/s and 2
Mbit/s, compared to the 9.6 kbit/s to 19.2 kbit/s offered by second
generation technology.
Traffic Engineered A combination of LSPs that is associated with a virtual tunnel interface.
Tunnel (TE Tunnel)
Transmission The protocol within TCP/IP that governs the breakup of data messages into
Control Protocol packets to be sent using Internet Protocol (IP), and the reassembly and
(TCP) verification of the complete messages from packets received by IP. A
connection-oriented, reliable protocol (reliable in the sense of ensuring
error-free delivery), TCP corresponds to the transport layer in the ISO/OSI
reference model.
telecommunications A protocol model defined by ITU-T for managing open systems in a
management communications network. TMN manages the planning, provisioning,
network (TMN) installation, and OAM of equipment, networks, and services.
time division A multiplexing technology. TDM divides the sampling cycle of a channel
multiplexing (TDM) into time slots (TSn, n is equal to 0, 1, 2, 3...), and the sampling value codes
of multiple signals engross time slots in a certain order, forming multiple
multiplexing digital signals to be transmitted over one channel.
time to market The length of time it takes from a product being conceived until its being
(TTM) available for sale.
total cost of Total cost of ownership (TCO) is a financial estimate whose purpose is to
ownership (TCO) help consumers and enterprise managers determine direct and indirect
costs of a product or system. It is a management accounting concept that
can be used in full cost accounting or even ecological economics where it
includes social costs.
U
UNI See User-to-Network Interface.
UPE user-end provider edge
URL See Uniform Resource Locator.
USM user-based security model
UTC See Coordinated Universal Time.
Uniform Resource A uniform resource locator (URL) is a reference to a resource that specifies
Locator (URL) the location of the resource on a computer network and acts as a
mechanism for retrieving it. Each file on the Internet has a unique URL.
User-to-Network The interface between user equipment and private or public network
Interface (UNI) equipment (for example, ATM switches).
V
VDSL2 See very-high-speed digital subscriber line 2.
VE virtual Ethernet interface
VLAN See virtual local area network.
VLL virtual leased line
VP See virtual path.
VPLS virtual private LAN segment
VPN virtual private network
VRF VPN routing and forwarding
VRRP See Virtual Router Redundancy Protocol.
VXLAN Virtual Extensible LAN
Virtual Router A protocol designed for multicast or broadcast LANs such as an Ethernet. A
Redundancy group of routers (including an active router and several backup routers) in
Protocol (VRRP) a LAN is regarded as a virtual router, which is called a backup group. The
virtual router has its own IP address. The host in the network communicates
with other networks through this virtual router. If the active router in the
backup group fails, one of the backup routers in this backup group becomes
active and provides routing service for the host in the network.
VoIP voice over IP
very-high-speed An extension of the VDSL technology, which complies with ITU G.993.2,
digital subscriber supports multiple spectrum profiles and encapsulation modes, and provides
line 2 (VDSL2) short-distance and high-speed access solutions to the next-generation FTTx
access service.
virtual local area A logical grouping of two or more nodes which are not necessarily on the
network (VLAN) same physical network segment but which share the same IP network
number. This is often associated with switched Ethernet.
virtual path (VP) A bundle of virtual channels, all of which are switched transparently across
an ATM network based on a common VPI.
W
WAN wide area network
X
xDSL x digital subscriber line