Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
AVVERTENZA – WARNING
IL MANUALE COMPLETO È COSTITUITO DA DUE VOLUMI – QUESTO È IL VOL.1/2
THE COMPLETE HANDBOOK IS COMPOSED BY TWO VOLUMES – THIS IS VOL.1/2
No pagine numerate
fase
(facciate) numbered
step
No pages da from a to
1 TARGHETTE - LABELS
2 FRONTESPIZIO - FRONT 2
CONTINUA – continues
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED 01 VOL.1/2 RELEASED
6
QUESTA PAGINA NON VA INSERITA NEL MANUALE
THIS PAGE MUST NOT BE INCLUDED IN THE HANDBOOK
No pagine numerate
fase
(facciate) numbered
step
No pages da from a to
ED 01 VOL.1/2 RELEASED
6
QUESTA PAGINA NON VA INSERITA NEL MANUALE
THIS PAGE MUST NOT BE INCLUDED IN THE HANDBOOK
not permitted without written authorization from Alcatel.
All rights reserved. Passing on and copying of this
document, use and communication of its contents
Site
VIMERCATE ALCATEL OPTICS GROUP – TND
Approvals
Name
App.
INFORMAZIONI EDITORIALI
957.130.872 H
3AL 61259 AAAA
Ed.01
1300NM
1354RM Rel.5.2B
ED 01 VOL.1/2 RELEASED
6
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED
01
957.130.872 TQZZA
VOL.1/2 RELEASED
6
3AL 61259 AAAA TQZZA
Y
QUESTA PAGINA NON VA INSERITA NEL MANUALE
THIS PAGE MUST NOT BE INCLUDED IN THE HANDBOOK
4/ 6
All rights reserved. Passing on and copying of this
document, use and communication of its contents
not permitted without written authorization from Alcatel.
1300NM
1354RM Rel.5.2B
not permitted without written authorization from Alcatel.
All rights reserved. Passing on and copying of this
document, use and communication of its contents
OPERATOR’S HANDBOOK
VOL.1/2
1300NM
1354RM Rel.5.2B
Regional Network Manager for SDH and Optical Networks
OPERATOR’S HANDBOOK
VOL.1/2
1300NM
1354RM Rel.5.2B
Regional Network Manager for SDH and Optical Networks
1300NM
1354RM Rel.5.2B
Regional Network Manager for SDH and Optical Networks
957.130.872 H Ed.01 3AL 61259 AAAA Ed.01 OPERATOR’S HANDBOOK VOL.1/2
1300NM
1354RM Rel.5.2B
Regional Network Manager for SDH and Optical Networks
ED 01 VOL.1/2 RELEASED
6
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED
01
957.130.872 TQZZA
VOL.1/2 RELEASED
6
3AL 61259 AAAA TQZZA
Y
FINE DEL DOCUMENTO INTERNO – END OF INTERNAL DOCUMENT
6/ 6
All rights reserved. Passing on and copying of this
document, use and communication of its contents
not permitted without written authorization from Alcatel.
Operator’s Handbook
Alcatel 1300NM
Network Management
1354RM Rel.5.2B
Regional Network Manager for SDH and Optical Networks
Volume 1/2:
sections 1–5
TABLE OF CONTENTS
2 PRODUCT-RELEASE HANDBOOKS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
2.1 Handbooks related to the product’s software . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
2.2 Handbooks related to the product’s hardware . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6
4 LIST OF ABBREVIATIONS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
1354RM REL.5.2B
OPERATOR’S HANDBOOK
ED 01 SC.1:HANDBOOK GUIDE
20
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED
01
957.130.872 H
SC.1:HANDBOOK GUIDE
20
3AL 61259 AA AA
2 / 20
All rights reserved. Passing on and copying of this
document, use and communication of its contents
not permitted without written authorization from Alcatel.
1 HANDBOOK STRUCTURE AND CONFIGURATION CHECK
WARNING
ALCATEL makes no warranty of any kind with regards to this manual, and specifically disclaims the
implied warranties of merchantability and fitness for a particular purpose. ALCATEL will not be liable
for errors contained herein or for damages, whether direct, indirect, consequential, incidental, or
special, in connection with the furnishing, performance, or use of this material.
NOTICE
The product specification and/or performance levels contained in this document are for information
purposes only and are subject to change without notice. They do not represent any obligation on the
part of ALCATEL.
COPYRIGHT NOTIFICATION
The technical information of this manual is the property of ALCATEL and must not be copied,
reproduced or disclosed to a third party without written consent.
ED 01 SC.1:HANDBOOK GUIDE
20
1.3 History
Ed.01A Creation on May 15, 2000 (proposal for version 5.2B) not archived
This handbook is a collection of documents (each contained in a specific section) that can have
editions different from one another.
The Edition of the whole handbook is that of section 1 (HANDBOOK GUIDE).
The edition of the enclosed documents indicated in the following table is that of the
corresponding original internal document.
ED 01 SC.1:HANDBOOK GUIDE
20
2 PRODUCT-RELEASE HANDBOOKS
The list of handbooks given here below is valid on the issue date of this Handbook and
can be changed without any obligation for ALCATEL to update it in this Handbook.
not permitted without written authorization from Alcatel.
All rights reserved. Passing on and copying of this
document, use and communication of its contents
Some of the handbooks listed here below may not be available on the issue date of this
Handbook.
The standard Customer Documentation in the English language for the equipment whose
product-release-version is stated in para.1.2 on page 3 consists of the following handbooks:
FACTORY THIS
REF HANDBOOK ANV Part No.
Part No. HANDBOOK
1354RM Rel.5.2B
[1] 3AL 61261 AAAA 957.130.892 W
Installation Guide
1354RM Rel.5.2B
[2] 3AL 61259 AAAA 957.130.872 H
Operator’s Handbook
1354RM Rel.5.2B
[3] 3AL 61260 AAAA 957.130.882 U
Administration Guide
THIS
FACTORY
REF HANDBOOK ANV Part No. HANDBOOK
Part No.
or note
1330AS Rel.5.1
[4] 3AL 71109 AAAA 957.130.722 A
Operator’s Handbook
ED 01 SC.1:HANDBOOK GUIDE
20
2.2 Handbooks related to the product’s hardware
– SAFETY RULES
• General rules
• Risk of explosion
– ELECTROMAGNETIC COMPATIBILITY
– EQUIPMENT LABELS
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED 01 SC.1:HANDBOOK GUIDE
20
3 1354RM REL.5.2B OPERATOR’S HANDBOOK DESCRIPTION
The Handbook Guide gives general information on the application and use of the Handbook. The
Handbook Guide includes the following chapters:
• Chapter 1: Handbook structure and configuration check. This chapter gives information on the
whole handbook application, composition and evolution.
• Chapter 2: Product-release handbooks. This chapter lists the handbooks the Operator should
have in order to carry out the tasks allowed by the specific product–release this handbook refers
to.
• Chapter 3: 1354RM Rel.5.2B Operator’s Handbook description
• Chapter 4: List of abbreviations
• Chapter 5: General on Alcatel Customer Documentation
SECTION 2. DESCRIPTIONS
This section describes the main features of the product and provides a general overview of the
system architecture, the managed equipments and the different functionalities provided by the
Regional Manager.
This document is divided into the following chapters:
• Chapter 1: Introduction
• Chapter 2: Functionalities
• Chapter 3: Object names
• Chapter 4: Acronyms and abbreviations
SECTION 3. NPE
The aim of this document is to describe the operations related to the operation and maintenance of
the 4–F Transoceanic MS–Spring controlled by the 1354RM.
This document is divided into the following chapters:
ED 01 SC.1:HANDBOOK GUIDE
20
SECTION 4. GETTING STARTED
This document aims at introducing the 1354RM working environment, to the users of the system, in
terms of getting access to the system, the environment utilities, the existing 1354RM functionalities
• Chapter 1: Introduction
Chapter 2: Regional Manager graphical user interface principles
• Chapter 3: Glossary of terms
• Chapter 4: Preliminary Operations
• Chapter 5: Access to the main functionalities
• Chapter 6: Views Description
• Chapter 7: SDH Netview : map navigation
• Chapter 8: Navigation
• Chapter 9: On–Line Documentation
SECTION 5. OPERATION
This document is intended for people who are in charge of the construction of the network.
This document is divided into the following chapters:
• Chapter 1: Introduction
• Chapter 2: Network Configuration
• Chapter 3: Transport Management
• Chapter 4: Protection Management
• Chapter 5: Network Modifications
• Chapter 6: Special Network Views
• Chapter 7: Performance Monitoring
• Chapter 8: Operator Administration
• Chapter 9: Restricted Operators
• Chapter 10: Export of resources
SECTION 6. MAINTENANCE
The aim of this document is to describe the operations related to the maintenance of the protection
network controlled by the 1354RM.
This document is divided into the following chapters:
• Chapter 1: Introduction
• Chapter 2: Fault management
• Chapter 3: Integration of 1354RM with SEC Security Subsystem
• Chapter 4: Introduction to maintenance
• Chapter 5: Path/Trail Allocation Failures
• Chapter 6: Diagnostic of the NPE Ring
• Chapter 7: Logger
• Chapter 8: NML–EML consistency checks
• Chapter 9: 1354RM process control
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED 01 SC.1:HANDBOOK GUIDE
20
SECTION 7. GRAPHICAL INTERFACE
This document is a reference handbook describing in detail the graphical interface used by the
1354RM.
not permitted without written authorization from Alcatel.
• Chapter 1: Introduction
• Chapter 2: Access to the main functionalities
• Chapter 3: SDH netview
• Chapter 4: SDH netview : map submenu
• Chapter 5: SDH netview: edit submenu
• Chapter 6: SDH netview: locate submenu
• Chapter 7: SDH netview: view submenu
• Chapter 8: SDH netview: construction submenu
• Chapter 9: SDH netview: supervision submenu
• Chapter 10: SDH netview: browse submenu
• Chapter 11: SDH netview: tools submenu
• Chapter 12: SDH netview: help submenu
• Chapter 13: Browser
• Chapter 14: Browser: drawing windows
• Chapter 15: Browser multicolumn windows
• Chapter 16: Browser: locate items in SDH netview
• Chapter 17: Payload configuration
• Chapter 18: Trail setup
• Chapter 19: Path create
• Chapter 20: Path/Trail constraints
• Chapter 21: Add legs
• Chapter 22: Connectivity inventory
• Chapter 23: Event logger
• Chapter 24: RM Java Browser
Purpose of this document is to describe to the users the services supplied by the System Management
Features in the 1354RM environment.
• Chapter 1: Introduction
• Chapter 2: System Management Features
• Chapter 3: User Interface
• Chapter 4: Operator Administration
• Chapter 5: Console Administration
• Chapter 6: System Log
• Chapter 7: Periodic Actions Management
• Chapter 8: Backup / Restore
• Chapter 9: System Start / Stop
• Chapter 10: Trace Administration
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED 01 SC.1:HANDBOOK GUIDE
20
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED
01
957.130.872 H
SC.1:HANDBOOK GUIDE
20
3AL 61259 AA AA
10 / 20
All rights reserved. Passing on and copying of this
document, use and communication of its contents
not permitted without written authorization from Alcatel.
4 LIST OF ABBREVIATIONS
AP Access Point
AU Administrative Unit
BN Backbone Network
CAP Client Access Point. It represents a point where a client layer can access a server layer
( i.e. a VC–4 that is configured to carry lower order signals is a HO–CAP)
CI Communication Infrastructure
DB Data Base
EM Element Manager
EML domain A set of NEs that are maintained by the same EML–OS.
FM Fault Management
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED 01 SC.1:HANDBOOK GUIDE
20
HOP–LN High Order Path Layer Network
LSP ”Link single fault protection” index (LSP). The LSP index is determined (in a way similar
to NSP for nodes) taking into account of both the number (C) of archs belonging to the
main route and the number (D) of archs belonging to the main and spare routes.
Map Set of related objects , backgrounds,symbols and submaps that provides a graphical
and hierarchical representation of the network.
Map–Image Dump of the map and of the related OVwDB information in a proprietary ASCII format
NetView Application based on OVW, used to display, create, keep updated view of the SDH
Network Through maps.
NM Network Manager
NSP ”Node single fault protection” index (NSP). The NSP index is determined taking into
1AA 00014 0004 (9007) A4 – ALICE 04.10
account of both the number (A) of Nodes belonging to the main route and the number
(B) of Nodes belonging to the main and spare routes, except the end nodes.
OS Operations System
ED 01 SC.1:HANDBOOK GUIDE
20
PCMAP Payload Configuration Management Application
Physical A Physical Connection connects two SDH ports in the network. These two ports belong
document, use and communication of its contents
Connection to different NEs and must have the same transmission rate.
PM Performance Monitoring
TM Terminal Mode
TN Transport Network
TP Termination Point
Trail A transport entity in a server layer responsible for the integrity of transfer of
characteristic information from one or more client network layers between server layer
access points.It defines the association between access points in the same transport
network layer. It is formed by combining a near–end trail termination function, a
netwrwork connection and a far–end trail–termination function.
Trail A transport processing function which generates the characteristic information of a layer
termination network and ensures integrity of that characteristic information. The trail termination
defines the association between the access point and termination connection point and
these points thereofore delimit the trail termination.
TU Transport Unit
VC Virtual Container
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED 01 SC.1:HANDBOOK GUIDE
20
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED
01
957.130.872 H
SC.1:HANDBOOK GUIDE
20
3AL 61259 AA AA
14 / 20
All rights reserved. Passing on and copying of this
document, use and communication of its contents
not permitted without written authorization from Alcatel.
5 GENERAL ON ALCATEL CUSTOMER DOCUMENTATION
A ”product” is defined by the network hierarchical level where it can be inserted and by the whole of
performance and services for which it is meant.
A ”product” evolves through successive ”product-releases” which are the real products marketed for
their delivery at a certain ”product-release” availability date.
So, a ”product–release” defines a set of hardware components and a software package which, as a whole,
identify the possible network applications and the equipment performance which the specific
”product-release” has been designed, engineered and marketed for.
In some cases a ”product-release” has further development steps, named ”versions”, that are born to
improve or add some performance (mainly software) with respect to the previous version, or for bug fixing
purposes.
A ”product-release” has its own standard Customer Documentation, composed by one or more
handbooks.
A new ”version” of a ”product-release” may or may not produce a change in the status of the Customer
Documentation set, as described in para.5.4 on page 16.
Handbooks are not automatically delivered together with the equipment they refer to.
The number of handbooks per type to be supplied must be decided at contract level.
Standard hardware and software documentation is meant to give the Customer personnel the possibility
and the information necessary for installing, commissioning, operating and maintaining the equipment
according to Alcatel–Telecom Laboratory design choices.
In particular the contents of the handbooks associated to the software applications focus on the
explanation of the man-machine interface and of the operating procedures allowed by it.
Consequently, no supply to the Customers of design documentation (like software source programs,
programming tools, etc.) is envisaged.
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED 01 SC.1:HANDBOOK GUIDE
20
5.4 Handbook Updating
The edition and date of issue might change on future handbook versions for the following reasons:
– only the date changes (pointed out in the Table of Contents) when modifications are made to the
editorial system not changing the technical contents of the handbook.
– the edition, hence the date, is changed because modifications made concern technical contents. In
this case:
Changes concerning the technical contents of the handbook cause the edition number increase (e.g. from
Ed.01 to Ed.02). Slight changes (e.g. for corrections) maintain the same edition but with the addition of
a version character (e.g. from Ed.02 to Ed.02A).
Handbooks relevant to software applications (typically the Operator’s Handbooks) are not
modified unless the new software ”version” distributed to Customers implies man–machine
interface changes or in case of slight modifications not affecting the understanding of the
explained procedures.
Moreover, should the screen prints included in the handbook contain the product-release’s
”version” marking, they are not replaced in the handbooks related to a subsequent version, if
the screen contents are unchanged.
Supplying updated handbooks to Customers who have already received previous issues is submitted to
commercial criteria.
By updated handbook delivery it is meant the supply of a complete copy of the handbook new issue
(supplying errata–corrige sheets is not envisaged).
1AA 00014 0004 (9007) A4 – ALICE 04.10
A new product-release changes the handbook P/N and the edition starts from 01.
In this case the modified parts of the handbook are not listed.
ED 01 SC.1:HANDBOOK GUIDE
20
5.5 Customer documentation supply on CD–ROM
In most cases, a CD–ROM contains the documentation of one product–release(–version) and for a certain
language.
In some other cases, the same CD–ROM can contain the documentation of different
product–release(–version)s for a certain language.
As a general rule:
• the documentation of system optional features that Customers could not buy from Alcatel
together with the main applicative SW.
– CD–ROMs for Network Elements products do not contain the documentation of system optional
features (e.g. System Installation Handbooks related to racks that Customers could not buy from
Alcatel together with the main equipment).
The files processed in this way are then transferred on a PC where the viewer (Interleaf–World–View) is
added and a master CD–ROM is recorded.
After a complete functional check, the CD–ROM image is electronically transferred to the archive of the
Production Department, so that the CD–ROM can be produced and delivered to Customers.
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED 01 SC.1:HANDBOOK GUIDE
20
5.5.2 Use of the CD–ROM
The set–up procedure is present in the booklet included in the CD–ROM box.
After the set–up procedure, which installs the viewer in the PC or Unix WS environment, the Customer
is allowed to read the handbooks on the PC/WS screen, using the navigation and zooming tools included
in the viewer, and to print selected parts of the documentation through a local printer.
1) by the following external identifiers, that are printed both on the booklet and the CD–ROM upper
surface:
– the name of the ”product–release(s)” (and ”version” when the CD–ROM is applicable to
the versions starting from it, but not to the previous ones),
– a writing indicating the language(s),
– the CD–ROM P/N (Factory P/N 417.xxx.xxx x and ANV P/N),
– the CD–ROM edition (usually first edition=01)
2) and, internally, by the list of the source handbooks and documents (P/Ns and editions) by whose
collection and processing the CD–ROM itself has been created.
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED 01 SC.1:HANDBOOK GUIDE
20
5.5.4 CD–ROM updating
structured list.
All rights reserved. Passing on and copying of this
document, use and communication of its contents
Whenever a new edition of any of such handbooks/documents is released in the Alcatel archive system,
the Alcatel–Information–System automatically rises a warning toward the Customer Documentation
department, indicating the list of CD–ROMs that must be updated to include the new editions of these
handbooks/documents.
This causes the planning and creation of a new edition of the CD–ROM.
Updating of CD–ROMs always follows, with a certain delay, the updating of the single handbooks
composing the collection.
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED 01 SC.1:HANDBOOK GUIDE
20
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED
01
957.130.872 H
SC.1:HANDBOOK GUIDE
END OF DOCUMENT
20
3AL 61259 AA AA
20 / 20
All rights reserved. Passing on and copying of this
document, use and communication of its contents
not permitted without written authorization from Alcatel.
1354RM REL.5.2B OPERATOR’S HANDBOOK
not permitted without written authorization from Alcatel.
All rights reserved. Passing on and copying of this
document, use and communication of its contents
TABLE OF CONTENTS
1 INTRODUCTION . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
1.1 Purpose of the document . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
1.2 Target audience . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
1.3 Document structure . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
2 FUNCTIONALITIES . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
2.1 Introduction to Functionalities . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
2.1.1 Supported EMLs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
2.1.2 Support of SEN–IM NEs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
2.1.3 Support of TSD–IM NEs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15
2.1.4 Support for Qnn 1.1 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16
2.2 EML Data Management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17
2.2.1 EML Physical Data Management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17
2.2.2 Support of TSD–IM based NE’s . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19
2.2.3 Consistency audit management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21
2.2.4 Reporting during consistency . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28
2.2.5 Linear MS – Protection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29
2.3 Topology Management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31
2.3.2 2–Fibre MS Spring . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32
2.3.3 4–Fibre Transoceanic MS Spring . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33
2.3.4 SDH Network Layer Map Management (NETVIEW) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34
2.3.5 Map Management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36
2.3.6 Network Construction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37
2.3.7 Network Access Point Management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38
2.3.8 Payload Configuration Management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39
2.4 Transport Management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42
2.4.1 Path Management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42
2.4.2 Path Create . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43
2.4.3 Path Constraints . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43
2.4.4 Path allocation and protection index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44
2.4.5 OS driven restoration for HO paths & trails . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 57
2.4.6 Joint / Split HO–Trails . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 63
2.5 Contiguous Concatenated AU4’s . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 68
1354RM REL.5.2B
OPERATOR’S HANDBOOK
ED 01 SC.2: DESCRIPTIONS
146
2.5.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 68
2.5.2 AU4 C attributes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 69
2.6 D & C Interconnection with 1664SX . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 73
2.6.1 SNCP Dual Node Interconnection with D&C in 1664SX . . . . . . . . . . . . . . . . . . . . . . . . . . 73
ED 01 SC.2: DESCRIPTIONS
146
LIST OF FIGURES AND TABLES
FIGURES
not permitted without written authorization from Alcatel.
ED 01 SC.2: DESCRIPTIONS
146
TABLES
Table 1. Starting and final Consistency status given the consistency results for consistency audit
in Mark Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23
Table 2. Initial and final Consistency status given the consistency results for consistency audit
ED 01 SC.2: DESCRIPTIONS
146
1 INTRODUCTION
This section describes the main features of the product and provides a general overview of the system
architecture, the managed equipments and the different functionalities provided by the Regional Manager.
• Topology Management
• Transport Management
• Concatenated AU4s
• D&C in 1664SX
• Fault Management
• Performance Monitoring
• FAD / NAD
• RM objects
• Trail Monitor
• Object names
ED 01 SC.2: DESCRIPTIONS
146
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED
01
957.130.872 H
SC.2: DESCRIPTIONS
146
3AL 61259 AA AA
6 / 146
All rights reserved. Passing on and copying of this
document, use and communication of its contents
not permitted without written authorization from Alcatel.
2 FUNCTIONALITIES
The 1354RM is a network management system that has been designed to handle SDH regional networks.
The aim of this chapter is to give an overview of the 1354RM. (See Figure 1. ). The 1354RM covers the
1st NML level ( Network Management Layer). Figure 1. shows all the functional layers and the
communication protocols.
The following subjects are covered in the paragraphs which follow:
1) Supported EMLs
2) Supported NEs
4) Topology management
8) Transport Management
It includes the management of transport objects: path and trail
9) Fault Management
it handles the error occurrences in the network and signals it to the operator, providing also the
mapping on paths.
14 ) RM objects
ED 01 SC.2: DESCRIPTIONS
146
NML
http RMI M
NML
A
M 1354RM
SEN–IM + TSD–IM
EML
A
QB3* + TSD–IM
NE
A
M: MANAGER
A: AGENT
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED 01 SC.2: DESCRIPTIONS
146
2.1.1 Supported EMLs
The EML supported versions make use of SEN–IM V4.0 and TSD–IM They are:
not permitted without written authorization from Alcatel.
– 1353SH R5.1 and R5.2 and R5.3 SEN–IM V4.0 and TSD–IM
All rights reserved. Passing on and copying of this
document, use and communication of its contents
These equipment are managed through their related Element Management Systems.
• DXC: 1641SX
• 1631FOX, Line Systems 1654SL & 1664SL, Microwave Eqmt. 96LUMT & 96LUHT
• DXC: 1641SX
The covered TMN functional areas are the Configuration, Fault & Performance Management ones.
The system is based on a Manager–Agent philosophy, adopted not only at the RM and EMLs (SH, WX)
interface but also between RM User Presentations and RM Information Management functions.
The communication among RM User Presentation, RM Information Management and Element
Management functions is performed through CMISE services.
– 1641 SMC
The equipment is only able to manage 2 AU4’s for each aggregate. The 1651SMC is derived from
the 1641SM full matrix.
– 1651 SM
– 1661 SMC
See also the chapter related to path management for enhanced connectivity support and the chapter
related to network topologies for MS–SPRING support.
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED 01 SC.2: DESCRIPTIONS
146
– 1641 SX 5.3.2 CL1 with STM–16 ports
This is the tributary extension for 1651SM and 1661 SMC. The management of this equipment is
transparent to RM. Through the PDH port name, the user can acknowledge whether the port is
related to a Drop Shelf unit or not.
– 1631 FOX
This is a tributary feature of 1641SM, 1641SMC. The Fox is presented as a NE by SH. The Fox is
connected to one or two NEs using STM–0 physical connections (see Network Topologies chapter).
The FOX ports and the 1641SM ports connected to FOX have the attributes physical port type equal
to STM0 and SDH Port Type set to Master or Slave.
After creating and implementing the objects (Nodes and physical connections), the configuration at
HO is started thus creating the AU3 HO–CTPs and AU3 HO–Link Connections.
The Physical Connection configuration can be performed. The possible values of the LO
configuration is only 21*TU12. The AU3 LC and AU3 Trail configuration cannot be achieved.
It is possible to set up the AU3 trail by specifying the end CTPs. If the Nodes are specified and one
of the two is a Fox, the operation is refused because of not managed impacts on TDL.
The setup of the Trail is available through the TDL. The Trail cannot have pass–through in the ADM
1641SM.
During the allocation activity the constraint related to the fixed mapping between a given PDH 2 Mbits
port and the time slot of the TU12 on the STM–0 Physical connection is taken into account.
Because of NE limitations is not possible to set–up SNCP at CO board level. This constraint is taken
into account by RM during the path allocation phase.
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED 01 SC.2: DESCRIPTIONS
146
– 3*45 Mb Tributary board
The routing algorithm is able to use TU3 resources in order to route 45 Mbits paths. A check is
performed to avoid path setup between 34 and 45 Mbits PDH ports.
not permitted without written authorization from Alcatel.
All rights reserved. Passing on and copying of this
document, use and communication of its contents
RM does not manage all PDH TPs related to this board but only the 16 TU12’s.
At the user interface, the RM user is able to work on 16 * 2 MBits ”equivalent” PDH ports and related
naps.
Alarms on transmux PDH port and on TPS not shown by RM (e.g. 8 Mbit tp’s) are related to the
impacted ”equivalent” PDH ports (see SEN–IM specification). These ”equivalent” alarms produce
on the path an ”alarm in PDH” correlated alarm.
In addition RM is able to ask the 1353WX the conversion between 16 * 2 Mbits PDH port and 1 * 34
Mbit port.
The operation is available in the Browser by selecting one of the appropriate 2 Mbit equivalent ports
(or the 34 Mbit port that can be configured in the reverse operation). It it is accepted by WX, all the
”equivalent” 2Mbit/s ports (or the 34Mbit port in the reverse operation) will be deleted and the new
34Mbit/s port will be created.
Note that no NAP should be defined for the ports to be removed (i.e. the ports must be observed).
RM only checks the port selected by the user and not all the impacted ports. The complete check
is performed at WX level.
ED 01 SC.2: DESCRIPTIONS
146
2.1.2.1 SDH Microwave equipment
Microwave Equipments (9600LUH, 9600LUM) are only visible at the level of ports and MS–tp’s. The
equipment are mainly managed by the EML (1353SH) via SEN–IM.
2.1.2.1.1 Procedure
In order to manage SDH Microwave equipment, the RM operator should apply the procedure described
in the following.
The procedure is based on the simple case of a physical connection (in the example PHYS_A) ”supported”
by 2 Radio Systems (in the example RL_A and RL_B) but more complex configurations are possible (e.g.
4 STM1 connections used in 4 SNCP rings based on 2 Line Systems interconnected at STM4 level
eventually in a1+1 protection configuration).
– Create, activate and implement the connection (in this case PHYS_A) according to the usual rules
and without taking into account of the Radio Systems.
This does not allow to include Radio Systems (or Line Systems) in the normal topologies used
for path management (e.g. SNCP–Rings).
– create at least one ”dedicated” subnetwork to contain only Radio Systems (or Line Systems).
This is not stricly required but it is suggested for keeping clean the network representation.
– create in the ”dedicated” subnetwork, a meshed ET devoted to contain the (2) Radio Systems
involved in the Physical Connection (in this case RL_A and RL_B)
The name of the ETs, for documentation purposes, should be related to the name of the physical
connection supported by the Radio Systems (in this case for example PHYS_A_TOP).
The Radio Systems are connected together in the ET using the Radio ports. In order to
represent optical connections between Radio Systems and NEs at the end of the physical
connection (NEs at the end of PHYS_A), the user should add the appropriate number of Virtual
Nes (in this case 2). This permits, when the meshed ET is activated, to assign at SEN–IM level
the optical ports of the Radio Systems thus enabling the collection of the related alarms.
Furthermore, the names of the physical connections in this special ET (PHYS_A_TOP in the
example) should be related to the physical connection supported by the Radio Systems
described in this topology (see Figure 2. ).
These ”special” meshed ETs should be normally not involved in any external connection.
RM prevents the HO configuration of the physical connections included in this special ET both
after the implementation and following a manual operator command. The check is performed
on the NE type at the end of the connections; the configuration of the original physical
connection (PHYS_A) is of course allowed because is terminated on normal NEs.
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED 01 SC.2: DESCRIPTIONS
146
1 1
1641SM 1641SM
not permitted without written authorization from Alcatel.
All rights reserved. Passing on and copying of this
document, use and communication of its contents
STM1
STM–1 STM–1
PHYS_A
PHYS_A_TOP
ÉÉÉ ÉÉÉ
RL_A RL_B
ÉÉÉ
Virtual
STM1
9600luM
STM1
9600luM ÉÉÉ
Virtual
STM1
– ”link” the physical connection based on Radio Systems (in this case PHYS_A) with the just
implemented ET (in this case PHYS_A_TOP)
The ”link” is represented in the submap by a dedicated symbol displayed on the physical
connection. This symbol allows the navigation to the ET (double click) and receives its color
from the synthesis (worst case) of the alarms affecting the involved Radio Systems (in this case
RL_A and RL_B).
The link information is saved in the MIB as an attribute of the physical connection. This allows
to display the relationship on all the maps.
When the layout of the Radio based physical connection (PHYS_A) is modified (e.g. following
the moving of one of the Nodes at the ends of the physical connection), all the ”link” symbols
eventually present in the submap (not just the one involved in the move operation) are deleted
and placed again in the new correct positions.
If the ”link” symbol is deleted by the user by means of a special command available in ovw, the
symbol is deleted from the map and the attribute on the Physical Connection (RM MIB) is set
to NULL. In the current implementation if more links are present in the same submap pointing
1AA 00014 0004 (9007) A4 – ALICE 04.10
to the same dedicated meshed ET (in this case PHYS_A_TOP), all the ”link” symbols will be
deleted.
ED 01 SC.2: DESCRIPTIONS
146
If the special meshed ET (in this case PHYS_A_TOP) is deleted before cancelling the pointing
”link” symbols (i.e. one or more ”link” symbols are still present on the maps), a synchronization
activity is required.
Same considerations done for microwave equipments are applicable for line systems (1654SL, 1664SL);
the main difference is that more Physical Connections can be based on the same meshed ET containing
Line Systems.
ED 01 SC.2: DESCRIPTIONS
146
2.1.3 Support of TSD–IM NEs
This equipment introduces a new model in terms of matrix limitations: it is only able to work at HO level
and has no limitations in terms of time–slots for SNCP connections. It supports 4–F transoceanic
MS–SPRING. STM4 tributaries are supported without linear protection management.
The dual–node SNCP ring interconnection with D&C in stacked rings (also called “2 Nodes coupling”) is
supported only if NE’s are properly isolated in meshed ET’s as depicted in Figure 25.
– the support of SDH section ( STM–1 or STM–4 ports ). Narrow Band ssction is managed by 1353DN
and Broad Band section is managed by AWS.
– AU4–4C
ED 01 SC.2: DESCRIPTIONS
146
2.1.4 Support for Qnn 1.1
Thru the Qnn interface the AU4 creation/deletion is notified as a consequence of concatenation /
de–concatenation activities performed by RM on boundary CTP’s
AU4–nC paths can be managed through the Qnn interface in a similar way of paths with other rate.
It has to be possible to set constraints for path allocation also on CTP’s not visible at the Qnn interface.
The set constraint operation is performed identifying the CTP’s (internal to the RM domain) through its user
label. The user label is obtained by the user through the browser after having applied a zoom–in operation
into the relevant RM.
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED 01 SC.2: DESCRIPTIONS
146
2.2 EML Data Management
This functional area manages, at SNML level, data for which the EML is master (i.e. NEs, ports and the
EML itself) and sends to the EML requested operations on them.
not permitted without written authorization from Alcatel.
All rights reserved. Passing on and copying of this
document, use and communication of its contents
a) upload EML data (EML attributes, NEs and ports) from EML and keep them inside the SNML–DB
consistent with data inside the EML–DB;
b) Manually force, on EML basis, a procedure of re–alignment between EML and NEs (audit);
c) Manually enable/disable the configuration download from the EML to a specific NE.
– EML management:
• EML data alignment. This function allows to upload the EML data from the EMLs, . The uploaded
data are stored in the SNML DB and kept consistent with the corresponding data stored in the
EML DB by means of messages (Notifications).
Managed EMLs can be defined in two ways:
– off–line in the SNML DB (see EML data off–line definition) or
– dynamically created when SNML receives a start–up notification from an unknown EML.
• EML polling. A polling mechanism surveys if EMLs are reachable or not. If an unreachable EML
is found, it generates an alarm and defines the EML as ”unreachable”. Should be found a
reachable EML that was defines as ”unreachable”, it marks the EML ”reachable”, removes the
previous alarm and starts the EML data alignment service.
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED 01 SC.2: DESCRIPTIONS
146
• EML data off–line definition. This functionality provides the user with the possibility to define the
following data:
– EML domain: defines a new EML domain as real or as virtual. A virtual EML domain must
be defined to collect virtual NE defined for routing reasons.
• EML Start Audit of a specific NE. This functionality allows to force the EML to perform the audit
activity on the specified NE in order to check if the EML DB is aligned with the NE one.
The operation is accepted if:
– the Configuration Download towards the involved NE is disabled (by means of the NE
Configuration Download Enabled/Disabled command)
– no other audit activity is already running for the EML
– the NE is not a virtual NE
• EML Configuration Download Enabled/Disabled. The operator can change the Configuration
Download mode of each NE belonging to the EML. To this purpose, the service uses the NE
Configuration Download Enabled/Disabled service.
– NE management:
If the operation is accepted, a command is sent to the EML in order to set the Configuration
Download attribute of the NE to the proper value (enabled/disabled).
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED 01 SC.2: DESCRIPTIONS
146
2.2.2 Support of TSD–IM based NE’s
With TSD–IM, RM interacts directly with the NEs and directly manages alignment, consistency, isolation
and download enable / disable.
not permitted without written authorization from Alcatel.
All rights reserved. Passing on and copying of this
document, use and communication of its contents
The operator is able to specify for TSD–IM NEs the download disabled / enabled mode (download enabled
mode is the default condition)
Objects in the RM MIB that, as a consequence of the download disable mode, are not aligned with the NE,
are “marked” with the value of the consistency status attribute (“not aligned”).
Nodes that have at least one “not aligned” object are put in a “not aligned” state.
When the download disabled mode is removed and the NE is reachable, RM data are downloaded to NEs.
If the download disabled mode is removed and the NE is not reachable, the operation is rejected.
If problems are detected during the download, the NE is put in “isolation” mode.
During the “downloading” activity on a given NE, all concurrent operations requested by RM operator and
involving the same NE, will wait for download completion.
RM is able to detect not reachable NEs as a consequence both of problems in the EML, in the DCN or
in the NE.
When a NE is in “download enabled” mode and is not reachable, RM behavior is similar to the one
described for the download disable mode.
Elementary alarms are correlated to the impacted transport entity allowing a better identification of the
transport entity impacted by the isolation problem.
The recovery from the isolation is detected by means of a slow polling performed by RM on the “isolated”
NE.
During downloading activity, the same considerations made for download disable to download enable
transition are applicable.
The OS isolation alarm received by SH and the SH isolation alarm detected by mean of a slow polling
performed by RM are reported as alarms at the RM user interface.
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED 01 SC.2: DESCRIPTIONS
146
Const.
Downloading Auditing
Download completed
Download enable
Comm problems Downloading
Ne reachable
Isolated Wait for stable state
(Download enable, isolated)
Cfg Changes
(not aligned objects) Download Disable
The objective of this feature is to align the NE with RM Mib being RM the reference.
The operation is available for TSD–IM NEs while1354RM is in normal “online” run–level.
For QB3* NE’s (SEN–IM managed) the consistency download policy remains unchanged.
The operation is available when the NE is not isolated and in download enabled mode. If the
communication is lost during the download, the operator is informed at user interface and the NE is left
in the download enabled mode; when the communication is resumed no automatic re–start of the
consistency download is performed.
When a Ne is in the consistency download phase, all the configuration changes on the specific NE are
refused if impacting on the real NE configuration (i.e. the implementation of a subnetwork connection is
refused but not the creation since an allocated connection doesn’t have any image in the NE).
As a consequence of this limitation, an activity on a transport entity (e.g. the path implementation) or on
a topology that has impact on a NE where the consistency download phase is ongoing, will fail (e.g. the
path implementation will fail but the path allocation will not).
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED 01 SC.2: DESCRIPTIONS
146
2.2.3 Consistency audit management
The objective of this feature is to verify the alignment between NE and RM Mib.
not permitted without written authorization from Alcatel.
The operation is available for TSD–IM NEs while the RM system is in normal online run–level.
All rights reserved. Passing on and copying of this
document, use and communication of its contents
This is an improvement respect to previous versions where the operation was only possible with RM set
to “consistency“ run level (i.e. read/only mode).
– Mark :
differencies are “marked” permanently in a way that cannot be distinguished from the marking
performed in case of changes driven by configuration changes at RM level. These differencies are
taken into account automatically and downloaded during the operation of enabling the download and
isolation recovery.
– Notify:
differences are “marked” in a special way not taken into account during the operation like enabling
download or isolation recovery.
– Node
– NE
The consistency audit on a Node is available when the NE is not isolated and is in download disabled
mode. The consistency audit type is “Mark” and download disabled is required in order to avoid automatic
download at the end of the audit activity. The download disabled must be set manually by the operator
before audit start.
Objects in RM MIB not found in NE MIB are marked with “not aligned” consistency status. Please note that
“not aligned” objects are automatically downloaded when the NE is put in “download enabled” mode.
If the communication is lost during download, the operator is informed at user interface. When the
communication is resumed no automatic re–start of the consistency audit is performed.
When a Ne is in consistency audit phase, all configuration changes on the NE are refused if impacting on
the real NE configuration (i.e. the implementation of a subnetwork connection is refused but not the
creation since an allocated connection does not have any image in the NE).
As a consequence of this limitation, an activity on a transport entity (e.g. the path implementation) or on
a topology that has impact on a NE where the consistency download phase is ongoing, will fail.
The consistency audit on transport entities is available not only in download disabled but also in download
enabled. This is required to avoid the stop of activities while performing the consistency on a single
transport entity (e.g. a path).
The consistency audit on transport entities is executed in the “notify” mode because in download enable
1AA 00014 0004 (9007) A4 – ALICE 04.10
mode is not possible to put the consistency status equal to “not aligned” for all the misaligned objects. This
is because “not aligned” objects are automatically downloaded, for example, during an “isolation” recovery
and, for this reason, the audit becomes automatically a download.
ED 01 SC.2: DESCRIPTIONS
146
The not aligned objects are marked with a particular value of the consistency status :Config. mismatch.
Objects with this value of the attribute are not automatically downloaded when the NE becomes reachable
or when the download state becomes enabled.
ED 01 SC.2: DESCRIPTIONS
146
2.2.3.1 Consistency audit on objects
The consistency audit can be executed on single TPs, subnetwork connections, NE / Node.
not permitted without written authorization from Alcatel.
The consistency on the Node can only be performed if the Node is in download disabled state and it is
All rights reserved. Passing on and copying of this
document, use and communication of its contents
reachable.
During the audit, all the incoming requests on the same Node are rejected.
In the following table the releationship between the initial value of the consistency Status and the result
of the consistency is reported both for “Mark” and “Notify” mode.
Table 1. Starting and final Consistency status given the consistency results for consistency
audit in Mark Mode
Mark Mode :
Initial Object Found and consistent Object not found or not consistent
Consistency
Status
Table 2. Initial and final Consistency status given the consistency results for consistency audit
in Notify Mode
Notify Mode :
Initial Object Found and consistent Object not found or not consistent
Consistency
Status
normal Normal Config Mismatch
not aligned Normal not aligned
failed to align Normal failed to align
config mismatch Normal Config Mismatch
aligning Not valid as initial state
planned Not to be taken into account
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED 01 SC.2: DESCRIPTIONS
146
2.2.3.2 Consistency download on objects
planned none
ED 01 SC.2: DESCRIPTIONS
146
2.2.3.4 Startup / Restart scenario
The following table reports the activities to be performed on RM elementary objects related to the
Consistency Status.
not permitted without written authorization from Alcatel.
All rights reserved. Passing on and copying of this
document, use and communication of its contents
RM elementary objects are taken into account by layers in a server to client order: physical ports, NAPs,
MS–TPs, HO–CTPs, HO connections, HO–TTPs, LO–CTPs, LO connections.
It has to be noted that the alignment of a physical port may start internally the alignment on MS–TP, the
HO–CTPs etc. .
Table 5. Activity to be performed at the FEP/CFG startup according to the initial Consistency
Status
All the current operations on the NE must be completed considering the NE unreachable even if the state
change again before the end of the current operations.
All the current operations on the NE must be completed before serving the transition. For these operations
the NE has to be considered as still in download enabled.
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED 01 SC.2: DESCRIPTIONS
146
2.2.3.7 Consistency attributes
The following table gives an overall mapping of the values of consistency status and consistency activity.
N.B. The NE comes out of the isolation state and during the isolation the object
has been modified inside the NE. RM using the NE event logger detects
the problem and “marks” the objects in order to avoid a global consistency
audit.
Failed to align The object in the RM MIB is not aligned with the equivalent objects in the NE MIB
as a result of a failure in the downloading performed from the “Not aligned” state.
Objects in this state are not automatically downloaded unless a new change is per-
formed on the object or during a consistency download.
Planned The object exists only in the RM MIB in a planned state.
This is the case for example of allocated subnetwork connections, virtual CAP’s etc.
Aligning This is a temporary value that is present only when forcing of attributes on NE is exe-
cuted.
Config Mismatch The object has been found not consistent during a consistency audit performed on
transport entities while in download enabled.
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED 01 SC.2: DESCRIPTIONS
146
2.2.3.7.1 Functional Agents triggering
– following requests started by the functional Agents on TPs or connections (e.g. the implementation
All rights reserved. Passing on and copying of this
document, use and communication of its contents
of a path that is the result of a set of connection implementations). This is the case of the normal
activities supported by the FEP.
2.2.3.7.2 Reporting
A specific alignment information table is used to improve reporting during alignment phase.
Contained information
This table contains the following Information for each object with a consistency status
different from normal:
• phase where the problem was detected: Consistency audit (Mark or Notify),
Consistency download, Change attribute, Isolation recovery, download enabling.....
• [ time stamp ]
• problem or info
• problem parameter (i.e. the RM attribute qualifying the problem or information).
Example :
• Change attribute: (Info–code) The attribute <xy> has not been update in the NE due
to consistency download disabled (or Ne isolation .....)
ED 01 SC.2: DESCRIPTIONS
146
2.2.4 Reporting during consistency
This feature allows to present the list of RM objects not consistent with the NE one’s.
– object class
– user label
– attribute: attribute of the object that causes the not consistency
– error type: reason of the in–consistency
– date
The user label field contains the user label of the object with the following exceptions:
The user can choose, using two different commands, to display a global or a restricted list of the objects.
– ne
– port (sdh)
– msCtpCap
– msProtBlock4f
– ctp–ho
– port (pdh)
– nap
– au4RTM
– cap
– ctp–lo
– connInTopol
– pmTp
The allAttributes value is used when it is not possible to determinate the attribute that caused the in–
consistency.
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED 01 SC.2: DESCRIPTIONS
146
2.2.5 Linear MS – Protection
The protection can only be defined off–line on the NE (i.e. not through the TSD–IM interface) and only
All rights reserved. Passing on and copying of this
document, use and communication of its contents
if the involved ports (main and spare) are not carrying traffic.
For this reason, it is recommended to define the protection before assigning the port to RM.
If the port is already assigned, it has to be released (all paths must be removed).
RM presents only the main port and the related MS–TP. The MS protection block is not uploaded in RM
and therefore it cannot be managed at NML: the user should use the EML or the craft terminal.
Alarm management
Alarms on physical ports and MS–TPs are correlated to physical links and MS–Trails without taking into
account the protection at MS level.
The propagation to the HO–LCs is always performed even if the protection exists. This is because at RM
level is not possible to correlate together alarms and MS protection switch position.
The underlying protection degraded alarm is not generated neither on MS–Trails nor on physical
connections because the “low reliability alarm” is received only on SEN–IM equipments and the equivalent
alarm (SSF on protected ttp) is not available.
When the main physical connection is created, the ports at both ends are assigned to RM. Considering
for semplicity only one port, this produces the creation of the MS–TP, of the HO–CTP, of the MS protection
block and of the protected TTP in the RM MIB. The MS protection block points to two MS–TTP’s: the one
related to the spare port usually is not present in the RM MIB.
The functional agent has to remove the HO–LC’s on the spare MS–Trail and has to create the MS
Protection block in a virtual state. This block is related to the involved MS–TP’s and is created in a second
step in the NE through the FEP. The FEP creates also the protected MS–TP. The functional agent creates
the protected MS–Trail
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED 01 SC.2: DESCRIPTIONS
146
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED
01
957.130.872 H
SC.2: DESCRIPTIONS
146
3AL 61259 AA AA
30 / 146
All rights reserved. Passing on and copying of this
document, use and communication of its contents
not permitted without written authorization from Alcatel.
2.3 Topology Management
The network is composed of the following topological objects in compliance with the partioning concept
(see ITU–T G.803):
not permitted without written authorization from Alcatel.
All rights reserved. Passing on and copying of this
document, use and communication of its contents
– Subnetworks
– Elementary topologies
• SNCP ring
– Nodes
The node is the lower partitioning level and corresponds to a Network Element.
The topologies contains SDH connections and are connected by means of SDH connections (Physical
connections) as defined in the following.
2.3.1 Subnetwork
It only contains nodes in a ring configuration. A ring can be managed as a whole for payload operation
purposes.
2.3.1.2 Meshed ET
ED 01 SC.2: DESCRIPTIONS
146
2.3.2 2–Fibre MS Spring
MS–SPRINGs can be created on maps. A special ET type and symbol are available. Checks are
performed during the validation and the activation phase in order to allow only 1661SMC and 1664SM in
The protection block and the related ports, physical connections, MS–Trails, MS–TPs can be displayed
from the Browser in graphical form.
The payload configuration activity after ring implementation creates only 8 AU4s.
Any change performed on the payload configuration of the ring requires the specification of 8 AU4s.
– synchronize
– release
– force east, west
– lockout east, west
– manual east, west
– Switch position (displayed on main view) : unknown, idle, bridge east or west, bridge & switch east
or west, pass through
– Switch cause (displayed on main view) : Failure, Restoration, Operator Request, None, Unknown.
– Active Operator Command : Release, Lockout, Force, Manual, None.
– Pending Operator Command : Release, Lockout, Force, Manual, None, Synchronize. It is the
command under execution. It is set to ”none” when the answer (OK or KO) is received from the EML.
At the beginning all the switch positions and switch causes are set to unknown, the pending is set to none.
After a parametric time T1, the managing process performs a synchronization for a parametric number
N of switches with the position set to unknown (i.e. not yet synchronized manually or through an event).
After another parametric time T2, the operation is repeated with another set of N ”unknown” switches.
During this automatic synchronization, the pending command of the switches under operation is set to
Synchronize.
A view of all the MS Protection Blocks in a MS–SPRing is available in the browser. The view allows a better
understanding of the global functionality of the ring.
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED 01 SC.2: DESCRIPTIONS
146
2.3.2.1 Squelching Info
All the HO SbnConn’s belonging to HO–Paths and HO–Trails in MS–SPRING topologies include
squelching Information (4 values : West – Src / West Dst / East Src / East Dst end Nodes Identifiers).
not permitted without written authorization from Alcatel.
Squelching Info are also set for the connections between HO–TTP and HO–CTP.
All rights reserved. Passing on and copying of this
document, use and communication of its contents
For broadcast paths, the squelching information related to legs is evaluated run time during the
implementation (when multiple legs and pass–through are merged into a single broadcast connection).
The management of the protection is done by the EMLs. On RM side, only the presence of the protection
is displayed to the operator.
In addition to the alarm already foreseen in case of failure on both the fibers involved in the linear MS
protection, a new alarm is emitted at SEN–IM level also when a failure on a single fiber will occur. This will
warn the operator on the reduced degree of protection.
The detailed description of the functionalities provided by 4–Fibre Transoceanic MS Spring can be found
in Section 3 . NPE ( Network Protection Equipment ) of this Handbook.
The detailed description of the procedures related to the above mentioned functionalities can be found
in Section 5 ( Operation ) and Section 6 ( Maintenance )
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED 01 SC.2: DESCRIPTIONS
146
2.3.4 SDH Network Layer Map Management (NETVIEW)
This functional area manages the Network maps and their contents.
• Select a map application. A map application is an application interacting with HP–OVW in order
to modify the behaviour of OVW. Just one map application is currently selectable by the user
of the 1354RM;
• Describe/Modify map. Allows to show and modify the current map parameters;
• List maps. Displays a list of maps available in the local Map DB;
– Submap navigation. A map will probably contain several submaps. An operator has the following
possibilities to navigate through the submaps and to perform submap maintenance:
• Open submap. Opens a submap ”clicking” on the associated symbol in its parent submap (see
Create submap functionality);
• Move to parent submap. The parent submap will be placed at the top of the desktop;
• Move to root. The root submap of the current submap will be placed at the top of the desktop;
• Create submap. Creates a submap and connects it to a symbol in the parent submap;
• Delete submap. Deletes an existing submap while maintaining the symbol to which the submap
is connected.
– Object management. The following functionalities allow the operator to manage the topological
entities.
• Create object. An object instance (with associated attributes) is added in the OVW DB and in
RM–MIB.
• Delete object. Removes an object from the current submap, from the associated submap and
from RM–MIB.
• Show hidden objects. Permits to display again the objects hidden in the map;
ED 01 SC.2: DESCRIPTIONS
146
– Display operations. The following functions are available:
• Move symbol. Moves a symbol to another position on the submap. Connections between the
symbol with other symbols will be maintained. Thus moving a symbol (e.g. representing an NE)
not permitted without written authorization from Alcatel.
might cause other symbols to be changed (e.g. link connected to the NE);
All rights reserved. Passing on and copying of this
document, use and communication of its contents
ED 01 SC.2: DESCRIPTIONS
146
2.3.5 Map Management
– Map: Redo: Store. This command allows to store the commands required to create all topological
objects contained in the map, on both ovwdb and mibdb.
– Map: Redo: Execute. This command allows to execute all the commands previously stored by issuing
the menu Map: Redo: Store.
– Supervision: Placement: Store. This command allows to store in MIB data base the coordinates of
the topological objects, for the entire map, for the current submap or for the current submap including
the related child submaps.
– Supervision: Placement: Retrieve: Map This command allows to retrieve from MIB data base the
coordinates of all topological objects, for the entire map.
– Supervision: Placement: Retrieve: Not Placed This command allows to retrieve from MIB data base
the coordinates of all topological objects actually displayed in the New Object Holding Area. This
could apply for a user working in Read–Only modality.
• Store map image. Stores the current map in the central DB as a map–image. When a map is
being stored, the administrator can specify the list of users (user name list) who are enabled
to load the map. It is also possible to send a mail to the users of the list.
• List map images. Lists all the map–image saved in the central Map DB;
• Remove map image. Removes a map–image from the central Map DB. It is also possible to
send a mail to the users of the list.
• Get map images. Retrieves all objects from an existing map–image in order to populate the
current map.
• Lock map image. Locks a map–image in order to prevent other users from accessing it while
the administrator is working on it. This operation also permits to send a mail to the users of the
list.
• Unlock map. Release a map–image that has been previously locked. This operation also
permits to send a mail to the users of the list.
For more detailed information refer to Section 5, Graphical Interface. In particular see paragraph 3.6.
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED 01 SC.2: DESCRIPTIONS
146
2.3.6 Network Construction
The following functions are provided in order to create the logical representation of the network.
not permitted without written authorization from Alcatel.
• Upload EMLs. Uploads all the EMLs displayed in the ”Available EMLs” window and places them
in an orphan submap;
• Upload NEs. Uploads all NEs belonging to the selected EML and not yet used in any network
submap. The uploaded NEs are presented in the ”Available NEs” window.
• Upload SDH ports. Uploads all the SDH ports belonging to the selected NE (it can be selected
from the uploaded NEs submap or directly form the network map). Another submap will appear
if the Operator double clicks on the relevant NE icon. It contains the uploaded SDH ports.
– Network management. A network comprises sub–networks, ETs and nodes which are
interconnected. The network is the top topological object. As regards the network, the following
operations can be performed:
• Create/Delete/Modify network object. When a network is being modified, part of the objects may
be already present inside the MIB, if the network has been previously activated through the
command Activate network, other objects can be added additionally.
• Remove network. Removes the network and all its contained topological objects from the SNML
DB. This operation is enabled only for not implemented networks.
• Implement network. This command resets the involved NEs and only creates HO connectivity
objects.
• Deimplement network. This operation is possible only if no path crosses the involved network.
It marks the network as ”activated”.
Generally, the commands that can be utilized for the topological object are the same of those cited
above: they are used for the network object.
• Operators can group together the objects created. Possibilities are NEs into ETs, NEs and ETs
into sub–networks and sub–networks into networks. The operator will be able to create all
objects (ETs, Physical Connections) required for this grouping;
• An operator is able to add not managed symbols (e.g. site, room, software...) in a map ;
• When a submap is displayed, all physical connections to other submaps in the same level
(visible in higher order submaps) will be shown as external connections with a label referencing
the destination;
• An operator can organize objects according to either logic or geographic criteria (logical or
geographical maps)
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED 01 SC.2: DESCRIPTIONS
146
2.3.7 Network Access Point Management
Network Access Point (NAP) management is used to manage SDH network access. A NAP is the union
between an access point and a trail termination function associated with a PDH port.
2.3.7.1 Functions
• Upload NAPs. RM assumes the NAP management, these NAPs are marked as ”NML assigned”
at EML level.
• Remove NAP. The NAP is deleted by RM DB and is marked as ”observed” at EML level.
• List NAPs. It presents a list of NAPs belonging to the selected topological entity.
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED 01 SC.2: DESCRIPTIONS
146
2.3.8 Payload Configuration Management
When implementing a network (or a part of it), the MSL entities and a default HO path layer configuration
are created. Payload configuration enables the operator to further modify the contents of HO and LO
layers.
2.3.8.1 Functions
– Trail constraint management. The user can specify the constraints to use by the allocation algorithm
for either the allocation or the protection activity.
– Deallocate HO trail.
1AA 00014 0004 (9007) A4 – ALICE 04.10
– Implement HO trail. The HO trail is implemented using the same procedure used for a path.
– Deimplement HO trail.
ED 01 SC.2: DESCRIPTIONS
146
– Configure HO trail. It configures, modifies or removes the LO path layer of the specified HO trail. The
payload structure must be indicated in the same way of HO link connections.
– Display Physical Connection Configuration. Displays the payload structure of the selected physical
• Protect HO trail. The procedure is the same of that described for the path. Refer to the Protect
Path function inside the PPMAP area.
• Un–protect HO trail keeping main. The procedure is the same of that described for the path.
Please refer to the Un–protect Path keeping main function inside the PPMAP area.
• Un–protect HO trail keeping spare. The procedure is the same of that described for the path.
Please refer to the Un–protect Path keeping spare function inside the PPMAP area.
– Examine ET Configuration. Displays the payload structure of all the physical connections contained
in an ET.
– Examine HO Trail Route. Displays the connections (both link connections and subnetwork
connections) composing the trail.
– Display HO Trail Configuration. Displays the lower order payload structure of a specific HO Trail.
When a HO link connection is configured to carry VC–3s or VC–12s, the corresponding HO–TTP (VC–4),
LO–CTPs (TU–3 and TU–12), HO trail and LO link connection will be created .
– Display HO Trail path usage. Displays the lower order paths using a specific HO Trail.
On a 1661SMC it is possible to define protected HO–Trails in which the payloaded HO–TTP is connected
via an SNCP with 2 HO–CTPs.
For all the other equipments it is still not possible to have the payloadable TTP and the HO–Trail SNCP
in the same NE.
The usage of enhanced connectivity in NEs where the feature is available is automatically selected both
during the complete allocation and during the adding of protections.
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED 01 SC.2: DESCRIPTIONS
146
HO–Trail protected with enhanced connectivity
not permitted without written authorization from Alcatel.
All rights reserved. Passing on and copying of this
document, use and communication of its contents
SPARE
LO–LCs
LO–CTPs
LO–CTPs
MAIN
SPARE
LO–LCs
LO–CTPs LO–CTPs
MAIN
ED 01 SC.2: DESCRIPTIONS
146
2.4 Transport Management
• Unidirectional
• Bidirectional
• Broadcast
• None
• SNCP
• D&C SNCP
• 2 Mb/s (VC–12).
• 34 Mb/s (VC–3);
• 45 Mb/s (VC–3).
• AU4–4C concatenated
SDH routing will be performed on a cost basis. This means that a route having the least cost will be used
when setting up a path.
The user can specify some constraints to be used by the allocation algorithm either during the path
allocation or the path add protection activities. These constraints are used to:
• specify if the constraint has to be applied to the path main route or to the spare one or both;
ED 01 SC.2: DESCRIPTIONS
146
2.4.2 Path Create
– Path type
All rights reserved. Passing on and copying of this
document, use and communication of its contents
– Protection type
Specifying ”SNCP,” the user requests to find the best protection by minimizing the number
of overlapping NEs and physical connections.
– Rate
– Allocation Rule: it specifies if the path has to be allocated automatically after its definition
or subsequently upon user’s command.
• Delete path definition. Remove a defined path. This function is not available for an allocated or
implemented or commissioned path;
– Path constraints allows the user to specify the constraints to be used by the allocation algorithm
during either the allocation or the protection activity or the addition of a leg in a broadcast path (i.e.
Allocate path and Protect path services broadcast path end point add). The user specified constraints
overrides the cost based allocation policy.
• Involved resources : they can be sub–networks, ETs, nodes, link connections, physical
connections, CTPs, server trails and routing links.
• Constraint type : it specifies whether the path must use the specified resources or not
• Route Type : it specifies if the constraint is applied for the main route only, for the spare route
only or for both routes.
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED 01 SC.2: DESCRIPTIONS
146
2.4.4 Path allocation and protection index
• Allocate path. It allocates a defined path and locks the resources involved.
SDH routing is performed on a cost basis (eventually respecting the constraints on path route
In order to provide the user with the allocation result, some indexes are calculated and
presented in a text field to be shown in the ”path list” application:
a) ”Node single fault protection” index (NSP). The NSP index is determined taking into
account of both the number (A) of Nodes belonging to the main route and the number (B)
of Nodes belonging to the main and spare routes, except the end nodes.
NSP=(A–B)/A.
NSP is 100% if no node is used for both main and spare routes.
b) ”Link single fault protection” index (LSP). The LSP index is determined (in a way similar
to NSP for nodes) taking into account of both the number (C) of archs belonging to the main
route and the number (D) of archs belonging to the main and spare routes.
LSP=(C–D)/C
LSP is 100% if no crossed arch is used for both main and spare routes.
M M=main; S=spare
NSP=4/6
LSP=3/5
S
M
NSP=5/6
LSP=5/5
If the achieved result does not satisfy the user, he can examine in details the allocated path retry
to allocate the path after having added the proper ”constraints” (”use main”, ”use spare”, ”not
use main”,.... ).
Anyway, note that the result is the best one that can be achieved (according to the user request)
with the current capability of the routing algorithm. The above described indexes give a ”fast
information” to the user in terms of allocation acceptable/not acceptable.
• Deallocate path. Reset the status of the path thus unlocking the resources.
– Path implementation management. An implemented path can carry traffic. The following actions are
provided:
1AA 00014 0004 (9007) A4 – ALICE 04.10
• Implement path
• Deimplement path
ED 01 SC.2: DESCRIPTIONS
146
– Path Protection/Unprotection management. The following actions are provided:
• Protect path. The user can protect an unprotected path along the whole route (by selecting the
path) or he can protect a path inside a topology.
not permitted without written authorization from Alcatel.
All rights reserved. Passing on and copying of this
document, use and communication of its contents
• Un–protect path keeping main. The user can unprotect a protected path, keeping the main
route, either along the whole route (by selecting the path) or inside a topology.
• Un–protect (main/spare) with check. This option includes a check of the actual switch positions
before unprotecting the path thus avoiding the active connections removal.
– Scheduled path operation. The operations that can be performed on a path (allocation/deallocation,
implementation/deimplementation) can be booked for a specific time and their execution is deferred
to the indicated time.
LO paths using LO pass–throughs are available in MS–SPRINGs. The drawback of this feature is that,
being the ring administered at HO, a LO path can be lost not only when the end Nodes are lost but also
when intermediate Nodes crossed at LO are lost.
For protected HO paths or Trails not fully contained in an MS–SPRING, a dual ended–connection is used
to cross the MS–SPRING.
During the HO routing, the same payload position is used in all the sections as required by the MS–Spring
protection algorithm.
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED 01 SC.2: DESCRIPTIONS
146
2.4.4.1 Allocation algorithm
Different algorithms are used to choose link connections in allocating paths and HO trails.
b) for each link of the path, it chooses the first free link connection, i.e. the one with the lowest time slot
no. (e.g. 01/1/1.1), with the following exceptions:
• inside a MSSPRING, the time slot interchange is not possible: the algorithm chooses the first
free time slot ( the same ) for all the links used by the HO path. See Figure 5. herebelow.
1/1/1/1
• in case of NE constraint (the protected connections in all AMDs except 1664SM must have the
same time slot at west and east aggregate ports), the algorithm chooses the first time slot that
is free in both the links adjacent to that NE.
1/1/1/1
1/1/1/1
NE–1 NE–2
The algorithm used for the choice of the link connections in the Higher Order trails is the following.
b) in each ring crossed by the HO trail, the algorithm chooses the first free time slot ( the same ) in all
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED 01 SC.2: DESCRIPTIONS
146
2.4.4.1.3 Link Cost
Dynamic cost
not permitted without written authorization from Alcatel.
The cost of the link depends on the no. of available resources (link connections) inside the link itself:
All rights reserved. Passing on and copying of this
document, use and communication of its contents
C C 0(1 kn)
where: n = number of available resources, Co= reference cost (see below) and k is a parameter that can
be changed by the user;default values are k=2 for 2 Mbps paths, k=1 for 34 Mb, 45Mb and 140 Mb paths.
For more detailed information see Chapter Environmental Variables of the Administrator Reference
Guide.
If k is set equal to 0, the cost used by the routing algorithm does not depend on the number of free
resources.
Higher values of k mean that the cost used by the routing algorithm strongly depends on the number of
free resources.
It is possible to use k=–1, in order to force the routing algorithm to prefer links with few free resources.
Reference cost
To determine the reference cost C0 of a link, a default reference cost is assigned to each physical
connection in the network (Co = 5).
The user is able to modify this value, by means of the Set Attribute operation from the user interface.
The reference cost Ct of a LO link mapped on more than one physical connection (i.e. using a HO trail
longer than 1 hop) is:
max (C i) Ci
C t _______________
2
where Ci are the costs of the physical connections composing the HO trail.
So this cost is lower then the summation of the single link costs along the HO trail; at the same time is
greater then most costly single link.
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED 01 SC.2: DESCRIPTIONS
146
2.4.4.2 Path configuration main statuses
Implement
IMPLEMENTED
Commission
Uncommision
COMMISSIONED
As shown in the above flow–chart, the main statuses of path configuration are:
– Defined
– Allocated
– Implemented
– Commissioned
A path assumes the ”defined” status after having been created. Then the Operator has to allocate it. The
path status goes to ”Allocated” . Next step is its implementation on user’s command.
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED 01 SC.2: DESCRIPTIONS
146
Now the path status becomes ”Commissioned” following the appropriate command.
– Decommissioning
All rights reserved. Passing on and copying of this
document, use and communication of its contents
– Deimplementation
– Deallocation
All the HO–Trails and paths created by RM will use not revertive switches except for drop & continue.
Ability to change SNCP switches from revertive to not revertive and vice–versa is available on :
– subnetwork connections at all the level of topologies (i.e. including the node level)
The manual control of SNCP (e.g. using the forced command) is available on :
– subnetwork connections at all the level of topologies (i.e. including the node level).
– synchronization
– release
– lockout
– force main, spare
– manual east, west
– set revertive / not revertive
– SNCP Position (displayed on main view) : main, spare, unknown, RM main – NE spare, RM spare
– NE main, RM service – NE main, RM service – NE spare.
– SNCP Switch cause (displayed on main view) : Failure, Operator Request, None, Unknown.
– SNCP Active Command : Release, Lockout, Forced Main or Spare, Manual Main or Spare, None.
– SNCP Pending Command : Release, Lockout, Force Main or Spare, Manual Main or Spare, None,
unknown, Synchronize, Set Revertive, Set Not Revertive. It is the command under execution. It is
set to ”none” when the answer (OK or KO) is received from the EML.
If on a path or a HO–trail at least one SNCP is forced, a related attribute is set in order to inform the operator
on the reduced protection capability. This attribute takes also into account of the pending operations or
unknown states. The used attribute is ”SNCP status” and the values are: unknown, idle SNCP, Forced
SNCP, Manual SNCP, not Meaningful (see Note 1)
Upon starting up the managing processes, all the ”SNCP statuses” of protected paths or HO–Trails
implemented are set to unknown, the SNCP positions are not updated. After a parametric time T1, the
managing process performs a synchronization for a parametric number N of protected paths and
HO–Trails with the ”SNCP status” attribute set to unknown (i.e. not yet synchronized manually or through
1AA 00014 0004 (9007) A4 – ALICE 04.10
an event). After another parametric time T2, the operation is repeated with another set of N ”unknown”
paths or HO–Trails. During this automatic synchronization, the pending command of the switches under
operation is set to Synchronize.
ED 01 SC.2: DESCRIPTIONS
146
2.4.4.4 PATH & HO–TRAIL DROP & CONTINUE protection
A D&C protection is achieved by adding one or more Service routes ”cross–connecting” Main and Spare
(see figure below).
During allocation phase, RM first finds the main and the spare routes as in the case of SNCP protection
and then tries to add service connections in all the rings crossed by both main end spare routes.
A Z
Service connections can also be added/removed for an allocated or implemented path or HO–Trail.
Service connections can be added not only for the complete path/trail but also specifying a given topology.
The topology is specified referring to a subnetwork connection already used by the path/trail (e.g. the
subnetwork connection in a SNCP Ring). The subnetwork connections related to the path/trail can be
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED 01 SC.2: DESCRIPTIONS
146
The adding of Service connections doesn’t report any failure if only a limited number of service
connections can be allocated according to network limitations. This behavior applies also in the case of
single topology protection i.e. only a single direction / side can be protected if no resources are found.
not permitted without written authorization from Alcatel.
It is not possible to add service connections across the topological boundaries i.e. a service
connection cannot originate in a subnetwork and end in another one.
3 4 5 16 17 18 19 32
12 13 MAIN 28 29
2 33
6 34
SERVICE 20 26 SERVICE 39
1 38
Z 7 21 27 40
35 A
8 37
14 15 SPARE 30 31
9 10 11 22 23 24 25 36
Figure 10. details the MIB structure for the path of Figure 9.
%!&'
! " ! ! "
$#
()%!&' "*!+,&) "*!+,&) ()%!&' ()%!&' "*!+,&)
"
#
!
MIB structure
ED 01 SC.2: DESCRIPTIONS
146
Figure 11. shows in detail the service connections.
32 xmitRecMain A 32xmit A
34xmitServRecServ AZ 34xmitServRecServ AZ
xmitRec AZ 39 xmitRec AZ 39
xmitRec AZ 40 xmitRec AZ 40
35xmitServRecServ AZ 35xmitServRecServ AZ
36 xmitRecSpare A 36 xmit A
A Add protection
unprotected R Remove protection
AE Add D&C
A
protection
RE Remove D&C SNCP
R protection
R
R
ring A R SNCP
protected A
RE
AE
AE D&C
SNCP
ED 01 SC.2: DESCRIPTIONS
146
2.4.4.5 Broadcast Path end points add & remove
The add/remove operation is performed acting on the single NAP the operator wants to add/remove.
All rights reserved. Passing on and copying of this
document, use and communication of its contents
As end points of a broadcast path, the user can specify not only a Nap but also a Node (real or virtual)
After adding a Nap, it is possible to define constraints and then allocate and implement the path.
The added ”leg” of the broadcast can be unprotected or protected. A specific option is present in the Add
Nap form of the Browser.
An attribute describing the global connectivity status of a path is defined (values none, full, partial). This
attribute is set to partial when at least one Nap is not connected as when a new NAP is added and a new
allocation has not yet been performed or has failed.
From the MIB point of view, a broadcast path is represented in this RM release by means of separate legs
mapped in subnetwork connections.
SINK 1
SOURCE
unprotected unprotected SINK 2
broadcast point–to–point
SINK 3
MAIN
ED 01 SC.2: DESCRIPTIONS
146
2.4.4.6 Broadcast path protection
– on single leg(s) both at definition time (add leg) or later when the leg is already allocated or
implemented.
SINK 1
SOURCE
protected unprotected SINK 2
broadcast switch
SINK 3
MAIN
ED 01 SC.2: DESCRIPTIONS
146
8
not permitted without written authorization from Alcatel.
6 7
All rights reserved. Passing on and copying of this
document, use and communication of its contents
5
9
2
18 19 10 11
1 3
12
4
3
16
13 14 15
17
-
#
DataBase structure
ED 01 SC.2: DESCRIPTIONS
146
2.4.4.7 Path / HO trail route disjunction and overlap
A path (or a HO trail) can be used as a constraint of another path (or another HO trail); the constraint type
can be either completely disjointed (not use same route) or overlapped. The overlap can be on the same
The constraint to overlap a given path can be the only one specified for a given path.
The constraint to be disjointed from a given path can coexist with other constraints (e.g. don’t use another
physical connection).
A constraining path must be at least allocated, otherwise allocation of the constrained one fails.
The constraint to overlap a given path (or HO trail) is allowed only at allocation time; if this constraint is
present during an add protection or add leg, the operation will fail.
The following restriction applies: the constraint to overlap a given path (or HO–Trail) is accepted only if
the 2 paths (or Trails) have the same characteristics in term of end Nodes, type (i.e. bidirectional or
broadcast or ...), rate, protection type ( SNCP or none or ....)
The loopback can be performed either on PDH ports or on NAPs (the operation is executed on the relevant
PDH ports). The loopback is not supported on SDH ports and their related TPs (i.e. CTP).
If a loopbacked PDH port is involved in a path, the loopback status is propagated to the path using a
specific attribute. The same propagation method is applied when a path is created involving loopbacked
PDH ports.
While a path has a loopback on its PDH ports it is not possible to put it into Commissioned state. On the
other hand the loopback request will be rejected for PDH ports or NAPs involved in a commissioned path.
When an event of this type is received, a specific icon in the Browser tool bar is ”animated” and the user
can display additional information by clicking on the icon itself. The list of additional info and the icon are
reset when the displayed list of information is closed by the User
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED 01 SC.2: DESCRIPTIONS
146
2.4.5 OS driven restoration for HO paths & trails
not permitted without written authorization from Alcatel.
Transport Manager
All rights reserved. Passing on and copying of this
document, use and communication of its contents
Allocation Implementation
Manager Manager
Transport Alarms
Alarm Manager
The feature allows the automatic restoration of HO transport entities (path or trails) in case of network
failures.
The restoration activity has the target to provide the operation in a time interval ranging from 10 minutes
to 20 minutes.
Restoration is performed using ”add protection” mechanism and it is basically only possible on networks
composed by 1664SM and 1641SX because of the restrictions on the other NE’s about SNCP time slot
usage. It is available both on not protected and on protected transport entities.
Restoration does not use resources allocated for other paths or trails.
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED 01 SC.2: DESCRIPTIONS
146
2.4.5.1 Architecture
– Transport manager
The Alarm processor & correlator performs collection of elementary alarms and propagates them to a
transport alarm. The functionality of this block is not suspended during the restoration activity.
– it receives the alarms on transport entities. Only “SDH failure” alarm is taken into account.
– If the related transport is involved in a restoration rule, it waits the Hold Off Time time before starting;
if the alarm is still pending at the end of the “wait” time, it performs the analysis on restorable alarms.
– If the alarm is restorable, the Transport Manager is triggered by sending an appropriate action.
The Transport Manager (TrsMng) performs the tasks of definition, allocation, de–allocation, protection,
un–protection, implementation and de–implementation of the transport entities.
TrsMng is triggered by the Restoration Manager when restoration is needed and performs the restoration
making use of the add / remove protection, implementation / de–implementation functions.
The user can select if the constraints associated to the transport entity are to be taken into account during
restoration; as default they are ignored.
The user can choose if restoration will use only not alarmed resources (default) or all resources.
TrsMng uses a specific algorithm to restore not terminated paths because only boundary CTP’s must be
used. ( See paragraph 2.4.5.1.3.1)
TrsMng uses a priority mechanism, i.e. a restoration request has greater priority than an allocation or
implementation request.
During the “wait” time, the user can manually start operations on the transport entity (e.g. add protection).
If the status of the transport to be restored is not idle i.e., if some operations are in progress, retries are
automatically performed.
For broadcast paths the restoration is performed on all legs and not only on the faulty ones; only
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED 01 SC.2: DESCRIPTIONS
146
2.4.5.1.3.1 Analysis on restorable alarms
The analysis has the target to evaluate if the alarm condition can be recovered or not within the RM domain.
The following conditions are possible:
not permitted without written authorization from Alcatel.
All rights reserved. Passing on and copying of this
document, use and communication of its contents
The algorithm considers the fault as internal if, along the path route, at least one disabled LC
is present on all path routes (the link connections out of boundary nodes are not taken into
account, i.e the boundary ctp is re–used by the restoration).
• if an SDH failure is present because of an URU ( underlying resource unavailable) alarm on one
of the PDH end ports, no restoration is possible.
When a transport is protected and a switch has been forced by the user, no restoration is
possible.
For not terminated paths the boundary CTP’s existing on the route of the original path are used as
constraint for the allocation of the restoration rule.
In other words, if the original path is not protected the boundary CTP’s are set as “use main and spare”.
If the original path is protected and the restoration strategy is “remove protection + add protection”, then
the boundary CTPs of the spare route are temporary saved in the RM database when removing protection
and used again in the new spare.
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED 01 SC.2: DESCRIPTIONS
146
2.4.5.2 Information Model
Network
Rule
Domain
Topology
In order to put a HO–Trail or a HO–Path under automatic restoration, the user selects the transport and
issues the ”Create Restoration Rule” command. See Handbook OPERATION, paragr. 2.5.
As a consequence of this command, the Restoration Rule creation dialog box is displayed. The user must
fill–in the requested attributes and confirm the creation.
– Restoration hold Off time : time the system waits before starting the restoration after receiving a
transport alarm (default 5 minutes). This time is required in order to avoid un–needed restoration
commands (e.g. at path setup time).
– Restoration strategy :
• end–to–end add protection;
• optimized add protection (available only for point–to–point transport entities):
RM adds the protection at the lowest topology level common to all the disabled link connections;
• remove protection + add protection (available only for point–to–point transport entities)
RM removes all the protections from the transport entity (drop and continue, end–to–end spare,
internal spares, ...) and adds an end–to–end protection (only spare).
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED 01 SC.2: DESCRIPTIONS
146
– Last restoration result: none, successful, failed (when the restoration failed because of allocation
problems), not performed (when other reasons blocked the restoration process before the allocation
step e.g.: no disabled LC has been found on the path route, wrong configuration state..)
not permitted without written authorization from Alcatel.
– Last restoration date: date of the last restoration (see Last restoration result to see the result of the
All rights reserved. Passing on and copying of this
document, use and communication of its contents
operation)
– constraint rule: The user can select if the constraints associated to the transport entity are to be
taken into account during restoration; as default they are ignored.
– used resources: The user can choose if restoration will use only not alarmed resources (default)
or all resources.
normal
path/trail alarm
clear alarm REST
REST
path/trail alarm
holdOffActive REST
(timer is restarted)
In addition the path/trail Restoration State attribute can assume the following values :
– none: a path/trail is not under restoration: no Restoration Rule is associated to the path/trail;
– supervised: a path/trail is under restoration (there is an associated Restoration Rule) but the
transport is not restored;
– restored: a path/trail is under restoration (there is an associated Restoration Rule) and has been
restored. The information for the operator is that the route has been modified by the restoration
activity; the operator must take the appropriate actions.
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED 01 SC.2: DESCRIPTIONS
146
The relationship between external activities and the value of the attribute is displayed in Figure 20.
remove restorationRule
none
supervised
The protection added by the re–routing activity is not removed automatically when the original fault is
repaired. The user’s intervention can be summarized as follows:
a) manually remove the protection or, in general, modify the route of transport in order to revert to the
normal route
In order to find out when the fault (the one causing the restoration) on the path or trail has been solved,
the operator can use the navigation command that shows the alarmed objects on the route (see Handbook
Maintenance).
If, after the restoration, the alarm on the transport rises again, a new restoration is started not taking into
account the value of the Restoration State.
For commissioned paths, a successful restoration leaves the path in the commissioned state, even if the
route of the path has been modified. In case of unsuccessful restoration, the final state of the path can be
different (e.g. partially implemented): a manual operator activity is required to revert to commissioned.
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED 01 SC.2: DESCRIPTIONS
146
2.4.6 Joint / Split HO–Trails
The Split / Joint Physical Connections and HO–Trails are part of a suit of tools for Network Modification.
not permitted without written authorization from Alcatel.
A given HO–Trail crossing at HO a Node can be split in order to perform crossing at LO. This enables the
usage of LO resources in the splitting Node.
The operation reproduces in the splitting node the same payload structure of the starting trail.
From the user point of view, the split trail operation consists of 2 phases:
a) the user specifies the trail to split: RM checks in which nodes of the trail the split can be performed
(i.e. nodes where LO capability is available, nodes not belonging to protected parts of the trail ...) and
prompts to the user the list of these nodes; no other action is accomplished by RM neither in RM MIB
nor in the NEs;
b) the user selects the splitting node and the operation can be executed.
The payload structure and the LO connections of the 2 nodes at the end of the involved HO trails are not
modified during the operations: modifications to connections and payload structure are applied only to the
splitting node.
The operation reduces the impacts on the existing traffic: the LO–Paths client of the involved HO trails are
disconnected only for the time necessary to perform the operation: only the segment of network between
the end nodes of the involved HO trails is affected.
Two HO–Trails entering in a given NE can be joined in order to reduce the LO usage of resources.
– the LO–Paths ”crossing” the original HO–Trails are modified by removing the pass–through
connections in the intermediate NE. The related protection indexes are updated.
ED 01 SC.2: DESCRIPTIONS
146
The payload structure and the LO connections of the 2 nodes at the end of the involved HO trails are not
modified during the operations: modifications to connections and payload structure are applied only to the
intermediate node.
Both split and join HO Trails are complex operations: they are composed of elementary operations
(payload configuration, trail implementation,...), as described in the following state diagram.
A
disconnect client paths connect client paths
from 1W to 4 E from 1W to 4E
B
deconfigure trail A configure trail A
deconfigure trail B configure trail B
C
deimplement conn 2 of trail A implement trail A
deimplement conn 2 of trail B implement trail B
D
JOIN join trails A,B into C split trail C into A,B SPLIT
E
implement trail C deimplement conn 2 of trail A
F
configure trail C deconfigure trail C
G
connect client paths disconnect client paths
from 1W to 4 E from 1W to 4E
H
The join trails is an operation that changes the state from A to H, passing through intermediate states.
The split trails is an operation that changes the state from H to A, passing through intermediate states.
– state A (see below): HO trails A and B are implemented and LO configured; some LO LCs (e.g. LC
A and B) and their CTPs are busy because they belong to a path; LO CTPs in the transit node 2 are
connected with point–to–point connections in topology without time–slot interchange; these
connections can be allocated or implemented;
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED 01 SC.2: DESCRIPTIONS
146
NAP LO CTP LO CTP LO CTP B1 LO CTP B2 NAP
A1 LO LC A A2 LO LC B
HO trail A HO trail B
HO LC A HO LC B1 HO LC B2
not permitted without written authorization from Alcatel.
1 2 3 4
All rights reserved. Passing on and copying of this
document, use and communication of its contents
W E W E W E
– state B: HO trails A and B are implemented and LO configured; for all the LO paths that before used
LO LCs A and B:
• the objects between 1W and 4E are freed:
– the connections in topology in node 2 are removed, both on EML and on RM database;
– the LO CTPs in node 2 are idle; in nodes 1 and 4 are still busy;
– all the LO LCs are idle;
• the path is set to partiallyConnected;
for HO objects, no differences compared with state A;
– state C: HO trails A and B are implemented and ”partially configured” at LO: the ports 1W and 4E are
still LO configured (with LO CTPs busy), but all the LO link connections have been removed; in node
2 HO CAPs are virtual and LO CTPs are deleted;
– state D: HO trails A and B are partially implemented and ”partially configured” at LO: the HO
connections in topology are all implemented except the 2 CTP–CAP in node 2;
– state E: HO trail C between nodes 1 and 4 is partially implemented and ”partially configured” at LO:
the HO connections in topology are all implemented except the one in node 2; no LO LC exists;
– state F: HO trail C is implemented and ”partially configured” at LO: all the HO connections in topology
are implemented; no LO LC exists;
– state G: HO trail C is implemented and LO configured; LO LC C is client of HO trail C; it is idle even
if it is terminated by the old LO CTPs that are still busy; LO path is still partiallyConnected;
– state H (see below): HO trail C is implemented and LO configured; LO LC C and its CTPs are busy
because they belong to a path, which is fullyConnected;
NAP NAP
LO CTP A1 LO LC C LO CTP B2
HO trail C
HO LC A HO LC B1 HO LC B2
1 2 3 4
W E W E W E
– in a single step: a new action is defined in order to perform automatically all the activities that join or
split trails (i.e. that move, if successful, from A to H or viceversa);
Join and split trails are completely reversible: if a ”join trails” is interrupted after an action, e.g. in the state
1AA 00014 0004 (9007) A4 – ALICE 04.10
B after the first action, it is possible to go back to previous state, applying the action ”connect client paths
from 1W to 4E”. It is also possible to continue the ”join trails”, applying the same action (i.e. join trails) or
the remaining actions (deconfigure trail A, B, deimplement connections ...).
ED 01 SC.2: DESCRIPTIONS
146
Also when an action is not completed (e.g. it fails, an agent crash occurs, ...), it is always possible to
continue or to go back. For example, if during the ”split trail” the implementation of trail B fails leaving this
trail partially implemented, while the trail A has been successfully implemented and configured, it is
possible:
1) implement trail B;
2) configure trail B;
3) connect client paths from 1W to 4E;
b) to go back, executing the join trails (A, B) or performing the following steps:
The state transitions C – D and E – F are not symmetrical: the deimplementation is applied to a single
connection in topology for each trail (the one in the common node), while the implementation is applied
to the whole trail: this is due to the fact that, in MSSPRING, the implementation could modify the squelching
tables in the connections in topology contained in the other nodes of the same MSSPRING, while the
deimplementation of a single connection leaves those squelching tables to the old values.
A report is presented to the user indicating in real time which phase of the operation is in progress and
its result when completed. All the LO–Paths impacted by the operation (supported by the involved
HO–Trails) are reported too.
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED 01 SC.2: DESCRIPTIONS
146
2.4.6.4 Path connectivity
The path management activities are impacted by the introduction of join and split operations because,
during a join / split HO Trail, the client paths are temporary disconnected between 2 CTPs.
not permitted without written authorization from Alcatel.
All rights reserved. Passing on and copying of this
document, use and communication of its contents
The “connectivity” attribute of paths is used to keep into account the interruption.
connect, connect,
disconnect disconnect
remove leg remove leg
keep interrupted NAP keep interrupted NAP
disconnected
NAPS and interrupted
interrupted
ED 01 SC.2: DESCRIPTIONS
146
2.5 Contiguous Concatenated AU4’s
In this chapter it will be used the AU4–nC notation (n=4, 16, 64), even if only the n=4 value
is managed in 1354RM5.2 release.
2.5.1 Introduction
– The user constructs the network inserting Virtual NEs or reusing the existing Virtual NEs in order to
describe the Physical Connections leaving the network managed by RM and supporting the AU4–nC.
– The user configures the network link by link in order to move resources from the HO layer to the
AU4–nC layer.
The HO/AU4–nC Link Connections are visible from the Payload configuration view of the physical
links/MS trails.
– The user can create paths terminated on virtual NEs. The equivalent virtual NA’s and PDH ports are
created.
During the allocation only AU4–nC LC’s are taken into account. If no AU4–nC LC is available, the
allocation fails.
ED 01 SC.2: DESCRIPTIONS
146
2.5.2 AU4 C attributes
The following classes are modified in order to manage the Contiguous Concatenated AU4’s feature.
not permitted without written authorization from Alcatel.
– Path
All rights reserved. Passing on and copying of this
document, use and communication of its contents
– MS Trail
New attributes:
– “au4Structure”: it is a string that describes the structure of the MS trail in terms of AU4 and AU4–nC.
The attribute is stored in the RM MIB as a string;
– The working state. “AU4 configuring”, “failed to AU4 structuring” and “synchronizing” values are
added.
New actions:
• “au4Structure”.
– Link Connection
– Routing Link
– MS–TP
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED 01 SC.2: DESCRIPTIONS
146
New attributes are added:
– CTP
– Connections
– The physical port type. c4–4C, c4–16C, c4–64C values are added.
– The “supportedConcatenatedAU4” attribute of the MS–trail has to be set in according to the values
of the two MS–TP’s ending the MS–trail. In particular, if the value of one (or both) the MS–TP’s ending
the MS–trail is “unknown”, the “supportedConcatenatedAU4” attribute of the MS–trail has to be set
to the “unknow” value.
– If one of the two ports ending the physical connection to implement is a “virtual” one, the related
MS–TP has to be created with the following attribute values:
N.B. The creation of the MS–TP, and the related HO–CTS’s, is performed in the Implementation
activity as the EML–IM that manages the virtual NEs is a QB3* one.
• for physical connection: the physical connection contains one or more AU4–nC link
connections;
• for ring and physical connection: the Working State of the related MS–trail has to be “normal”.
1AA 00014 0004 (9007) A4 – ALICE 04.10
– creation of the HO/AU4–nC link connections according to the situation described by the array;
ED 01 SC.2: DESCRIPTIONS
146
N.B. A positive response is sent by the TSD–IM Front End Processor in one of the following cases:
– NE in download disabled state (Consistency State of the MS–TP’s equal to “not aligned”).
– remove the problem and then perform the “AU4 configuration” activity again confirming the
previous request;
N.B. Take into account that, in case of “virtual NE”, no request is sent to the TSD–IM Front End
Processor. So the deletion/creation of the HO–CTP’s/AU4–nC CTP’s and the related
HO–LC’s/AU4–nC LC’s is in charge to the Topology Management process.
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED 01 SC.2: DESCRIPTIONS
146
2.5.2.1 MS–trail synchronization Activity
The user, on the User Interface, has to select the MS–trail to be synchronized.
The “MS–trail synchronization” action on the MS–trail with the “supportedConcatenatedAU4” is sent to the
Topology Management.
Receiving the two TSD–IM Front End Processor responses (positive or negative), the following steps have
to be performed by the Topology Management process:
– updating of the “supportedConcatenatedAU4“ attribute of the MS–trail according to the values of the
“supportedConcatenatedAU4” attributes retrieved with the “synchro”’s;
N.B. A positive response is sent by the TSD–IM Front End Processor in one of the following cases:
– NE in download disabled state (Consistency State of the MS–TP’s equal to “not aligned”).
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED 01 SC.2: DESCRIPTIONS
146
2.6 D & C Interconnection with 1664SX
This feature allows to support D&C in network configuration where two Cross–Connects are closing two
(or more) SNCP rings.
The two nodes interconnecting the SNCP rings are grouped in a meshed ET’s the remaining nodes
of the ring meshed ET’s).
tpZ
tpA
tpA tpZ
tpAZ tpZA
tpA tpZ tpZA tpAZ
tpA tpZ
ET1
ET4
ENHANCED SNCP ET3
ET5
Payload configuration activity cannot be applied on the rings as a whole (it is applicable to the single
physical connection) and path / trail protection (or add protection) at ring level is not available (only the
SNCP end to end protection with or without the D&C can be applied).
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED 01 SC.2: DESCRIPTIONS
146
2.6.3 Protection at path / trail level
As in the case of the normal D&C, it is not possible from the User Interface to select the tp’s involved in
the D&C but they are automatically selected by the algorithm. The tp’s can be selected from the command
mode because this is needed to support the “redo–log” functionality.
It is also possible to add or to remove the D&C protection to path without or with D&C protection by either
pointing to the topology where the interconnection NE’s are included (e.g. the ET2 of the figure) or to the
whole path.
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED 01 SC.2: DESCRIPTIONS
146
2.6.4 Connections in a 2 N–D&C Node
The implementation of the SNCP Dual Node Interconnection with D&C includes the creation of 2
unidirectional SNCP connections and two unidirectional connections.
not permitted without written authorization from Alcatel.
All rights reserved. Passing on and copying of this
document, use and communication of its contents
For ET 2 in Figure 25. the resulting connections are: ( see Figure 26. ):
– tp A: comprises a switch for the connections coming from tp Z and tp ZA, one point to point from tp
A to tp Z, one point to point from tp A to tp AZ
– tp Z: comprises a switch for the connections coming from tp A and tp AZ, one point to point from tp
Z to tp A, one point to point from tp Z to tp ZA
– tp ZA: comprises one point to point from tp ZA to tp A, one point to point from tp Z to tp ZA
– tp AZ: comprises one point to point from tp AZ to tp Z, one point to point from tp A to tp AZ
N.B. Figure 26. shows the involved connections only for one route (conventionally the main one ).
The connections for the spare route are mirrored respect to the ones shown in Figure 26.
The representation of the path/trail routing view includes also an additional level view to display the actual
position of the switches.
The new navigation is available only for this type of connections and is performed by clicking on a icon
displayed in place of the SNCP status.
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED 01 SC.2: DESCRIPTIONS
146
2.6.5 Enhanced SNCP protection in 1664SX
This connection is usefull to increase the protection level when a single NE is interconnecting multiple
rings.
A Z
tpZ
tpA
tpA tpZ
tpAZ tpZA
tpA tpZ tpZA tpAZ
tpA tpZ
ET1
ET4
ENHANCED SNCP ET3
ET5
By using an enhanced SNCP in the NE common to rings ET1 and ET 3, the protection level of the path
1AA 00014 0004 (9007) A4 – ALICE 04.10
increases.
ED 01 SC.2: DESCRIPTIONS
146
The RM behavior is as follows:
– the enhanced SNCP is automatically inserted at path/trail allocation time for protected paths/trails
when the main and the spare are crossing the same NE and the equipment supports this type of
not permitted without written authorization from Alcatel.
protection.
All rights reserved. Passing on and copying of this
document, use and communication of its contents
– The user can add / remove the enhanced SNCP protection in two different ways:
• applying the add/remove service to the whole path/trail: the enhanced SNCP protection is also
removed
• applying the add/remove service to the connection in topology at NE level: the enhanced SNCP
protection is modified only at NE level.
• No limitation should be present on the NE support of the connection since the result in this case
is the failure in implementing the protected path
The implementation of the enhanced SNCP causes the creation of 4 unidirectional SNCP in the NE. See
Figure 29.
The handling of the macro–connection has impacts on the path/tail implementation process, on the T–FEP
(this includes the algorithm to compare the connection at RM level and at NE level during the
consistencies), on the routing display etc.
The representation of the path/trail routing view includes also an additional level view to display the actual
position of the switches.
The new navigation is available only for this type of connections and is performed by clicking on a icon
displayed in place of the SNCP status.
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED 01 SC.2: DESCRIPTIONS
146
2.7 Fault Management
The details on probable cause, modified behavior, inventories etc. is given in the following.
N.B. If the RM Probable Cause is MediaEqFail, for a non–protected MS–Trail the supported
HO–LCs are put disabled.
2.7.1.1.2 Processing
Disabled objects
When the alarms ”Media or Equipment failure” is generated, the Physical Connection, the supported
MS–Trail are put disabled.
Unlike paths, the alarms on Physical Connections are managed independently from the configuration
state (defined, implemented, de–implemented).
When the Physical Connection is created (activation phase), the alarm propagation function is started in
order to propagate the already existing alarms on ports.
When the Physical Connection is removed, the alarm propagation function is started in order to invalidate
the existing alarms.
From an alarmed physical connection it is possible to visualize the correlated elementary alarms.
On OVW the color of the Physical Connection is related to the alarm status of the object (and not to the
worst severity of the connected ports.
1AA 00014 0004 (9007) A4 – ALICE 04.10
The list of all the physical connections can be displayed by means of the browser. This list is refreshed
upon object creations.
ED 01 SC.2: DESCRIPTIONS
146
2.7.1.2 MS–trail
N.B. If the RM Probable Causes are MediaEqFail, ExBer, RS Failure for a non–protected
MS–Trail, the supported HO–LCs are put disabled.
2.7.1.2.2 Processing
Disabled objects
The MS–Trail is set disabled when Media Equipment failure, RS failure and EX–BER alarms are received.
Unlike paths, the alarms on MS–Trails are managed independently from the state of the related topological
objects / physical connection (i.e. implemented or de–implemented).
When the MS–Trail is created (implementation phase), the alarm propagation function is started in order
to propagate the already existing alarms on MS–Tp’s and on physical connections (disable the MS–Trail).
When the MS–Trail is removed, the alarm propagation function is started in order to invalidate the existing
alarms.
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED 01 SC.2: DESCRIPTIONS
146
2.7.1.2.3 User Interface
In the browser, the list of all the MS–Trails in the network is available. This list is not refreshed upon object
creation.
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED 01 SC.2: DESCRIPTIONS
146
2.7.1.3 HO–trail
UNEQ_In
FERF_In RDI
2.7.1.3.2 Processing
Disabled objects
When the alarm SDH failure is generated, the operational state is set disabled on the HO–Trail and is also
propagated to LO–LC’s.
The alarms on HO–Trails are managed only when the object is implemented
When the HO–Trail is implemented the alarm propagation function is started in order to propagate the
already existing alarms on end HO–TTPs.
When the HO–Trail is de–implemented, the alarm propagation function is started in order to invalidate the
existing alarms.
1AA 00014 0004 (9007) A4 – ALICE 04.10
When the HO–Trail changes the payload configuration, the propagation to LO–Lc’s is performed in order
to update the operational State.
ED 01 SC.2: DESCRIPTIONS
146
2.7.1.3.3 User Interface
In the browser, the list of all the HO–Trails in the network is available. This list is not refreshed upon object
creations .(as a particular condition, HO–Trails between non adjacent Nodes are automatically inserted
in the list).
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED 01 SC.2: DESCRIPTIONS
146
2.7.1.4 HO Link Connections
Note: for a non–protected MS–Trail the supported HO–LCs are put disabled.
ED 01 SC.2: DESCRIPTIONS
146
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED
01
2.7.1.6 Path
957.130.872 H
2.7.1.6.1 Generated Alarms
SC.2: DESCRIPTIONS
The alarms with the listed probable causes are generated :
146
3AL 61259 AA AA
84 / 146
All rights reserved. Passing on and copying of this
document, use and communication of its contents
not permitted without written authorization from Alcatel.
UNEQ_IN
FERF_In RDI
not permitted without written authorization from Alcatel.
All rights reserved. Passing on and copying of this
document, use and communication of its contents
Alarm in route
The ”Alarm in Route” alarm was generated in the previous RM versions when at least one alarm was
received on a used resource at path or server layer.
This alarm was very heavy to be produced because of the amount of DB accesses and because of the
number of events produced.
For fault location, this alarm is totally replaced by the new alarms on Physical Connections and Trails.
It has to be noted that, with the ”alarm in route” alarm, it was possible to know when a protected path has
lost (partially or completely) its protection. The operator can now retrieve the same information by mean
of the navigation from the alarmed physical connection or trail.
2.7.1.6.3 Processing
Disabled objects
When SDH failure or Ex–Ber alarm is generated, the path operational state is set to disabled.
On paths, the alarm propagation function can be configured to start according to the path configuration
state. By default, the path correlation function is started when the path is implemented.
In the browser, the list of all the paths in the network is available.
In the Sink ports only URU and Low Reliability alarms are taken into account. The remaining alarms are
1AA 00014 0004 (9007) A4 – ALICE 04.10
not propagated since they are not significant for the unidirectional path.
ED 01 SC.2: DESCRIPTIONS
146
2.7.1.7 MS– Spring
2.7.1.8 Node
ED 01 SC.2: DESCRIPTIONS
146
2.7.2 Alarm processing according to priorities
Elementary alarms are processed according to a priority in order to give more emphasis on root problems
and less priority to effects (inclusing problems on LO paths).
not permitted without written authorization from Alcatel.
All rights reserved. Passing on and copying of this
document, use and communication of its contents
The Elementary Alarms are processed according to the following different priorities:
– High Priority : HO–TTP, HO–CTP, MS–TP, PDH Ports and SDH Ports.
– two threshold alarm rates are defined in order to have different values for priority 1 alarms and priority
2 alarms.
If the rate of incoming alarms from a given EML exceeds these values (number of alarms in a time period),
the alarm processing function stops accepting new alarms from the EML, declares the EML ”out of
synchronization” (as in the case of counter mismatch), sets a specific EML attribute and rises an alarm
on the EML (probable cause ”Alarm Flooding”).
When the rate of received alarms becomes again lower than the predefined value, the EML is still “alarm
misaligned” and the user has to perform a manual synchronization.
If the user, when creating the path, selects Alarm Enabling Rule: Manual, for this Path it will be
possible to enable / disable the involved alarms ( from the Path List: menu Actions: SDH/PDH
Alarms enable/disable.
– After path creation, from the Path List the user can modify the PDH/SDH alarm enabling rule by
selecting the menu Actions: SDH/PDH Alarms: Set enabling rule, as in the case of path creation.
A dialog box is presented, which allows the enabling rule selection by means of a dictionary.
Alarms on PDH ports, NAPs, boundary CTPs are enabled if Q3 Alarm Enabling rule= on Implementation.
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED 01 SC.2: DESCRIPTIONS
146
2.7.3 QB3* Enabling UPA on specific CTP/CAP
This includes the ability of RM to setup alarm propagation rules other than the default ones defined for
physical connections related to virtual elements or based on Line Systems / Radio Links. By default AIS
To enable the UPA alarm you can enter the ”Alarm enabling: LOP,EXBER,UPA command on the selected
CAP.
This feature allows enabling and disabling frame supervision on bulk or structured PDH flows.
The operator can select a PDH port and execute the command to enable or disable the frame supervision.
The command is available on 1641SX (managed by WX 1.7.1) on configurable 140, 34, 2 Mbit/s PDH
ports.
By default the frame supervision alarm and the consequent action (AIS) are disabled.
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED 01 SC.2: DESCRIPTIONS
146
2.7.5 System Management Features
A tool is provided in order to manage the RM processes (included the ones related to the relational DB)
and all the OS processes on RM (Alarm Surveillance and proxy agents of managed EMLs). All these
processes are automatically started; in case of down f crashed they can also be manually started by the
user.
The trace files are deleted when they overflow a given size.
– System back–up/restore.
It is possible to perform the back–up and subsequently the restore of the whole system (RM plus
EMLs)
– Add/Remove Users.
A user administrator is allowed to add/remove users.
2.7.5.3 Recovery from system crashes and migration between NML systems services
The aim of this utility is to allow the operator to execute operations in ”batch” mode. The batch utility
permits to read commands to execute from a command file. Commands are written in a command
mode language able to cover all the operations on both paths (create, allocate, de–allocate,
implement, de–implement, define constraints, change values, change protection...) and trails (same
operations as for path plus define and modify payload configuration) and based on the user labels
of the involved objects (paths, trails, ctps, naps).
The service, together with Redo Log File Management and Dump DB Utility Management service
is utilized to:
• recover the system after a crash. The following steps must be executed:
b) perform the DB restore for both EML and RM at the aligned mibs
ED 01 SC.2: DESCRIPTIONS
146
• allow migration from generic NML systems to RM. The following steps must be executed:
– Global Audit. Through this function the user can start an audit activity towards a specific EML in order
to check the consistency between SNML and EML network layer data. Functionalities are:
• check consistency for MSTPs (EML DB should be consistent with SNML DB according to the
applied network implementation activity) (Audit of MSTPs)
• check consistency for PDH NAP PORTs (EML DB should be consistent with SNML DB
according to the applied network implementation activity) (Audit of PDH PORTs)
• check consistency for Subnetwork Connections (EML DB should be consistent with SNML DB
according to the applied path/trail implementation activity) (Audit of Subnetwork Connections)
• check consistency for HO CTPs, HO TTPs, LO CTPs (EML DB should be consistent with SNML
DB according to the applied payload configuration) (Audit of Payload Configuration)
– Global Download. The user can start a download activity towards a specific EML in order to force the
alignment of EML network layer data to the SNML ones.
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED 01 SC.2: DESCRIPTIONS
146
2.7.5.5 RM 2.2 to 2.4 DB conversion
This feature allows the conversion of a RM 2.2 MIB into an RM 2.4 MIB
not permitted without written authorization from Alcatel.
This feature allows the conversion of a RM 2.3 MIB into an RM 2.4 MIB
All the commands received by the IMs are logged together with the operation time, the user name and the
workstation. The result of the operation is not logged.
All the successful and failed login operations can be retrieved from the relevant Unix files on all the
work–stations belonging to RM.
RM 2.4 has been designed to be installed on HP systems using the operating system version 10.20 and
OV 5.03. This enables the usage of more powerful hardware and the availability of the symmetric
multi–processor option.
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED 01 SC.2: DESCRIPTIONS
146
2.7.6 RM to RM navigation, Multi server support
ÉÉÉÉÉÉ
ÉÉÉÉÉÉ
RM
ÉÉÉÉÉÉ
One RM client workstation can now be connected to more than one RM server.
The configuration is MULTI–Master: each work–station does not share the Communication Infrastructure
MIB but is only remotely registered for Manager–Agent messages and events.
– in OVW RM applications, starting from an empty map (before synchronizing), it is possible to select
the RM network domain and proceed as usual with the selection of the network.
– in OVW RM applications, working with a pre–populated map, the RM Network Domain is already
defined according to the associated / displayed network
– in OVW RM applications, loading a new map saved with DSM, the Network Domain is automatically
defined as in the previous point
– in the Browser, working from OVW, the Network Domain is retrieved from the objects displayed on
the map.
– in a stand–alone Browser it is possible to visualize all the Network Domains and work in parallel (e.g.
listing the paths on the different RM servers).
Among the RM servers, one is considered as Master. The other ones are not allowed to access the AS
and to navigate towards SH.
In a Multi–master network configuration it is possible to display the alarm list of a certain Network Domain
by activating the Alarm Surveillance icon from the vertical palette and subsequently selecting the involved
Network Domain from the AS dialogue box.
The OS–OS interface, resident on RM–IM, allows to transfer information relevant to alarms to a generic
workstation which has the task of collecting and displaying alarms.
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED 01 SC.2: DESCRIPTIONS
146
2.8 Quality Domain and Performance Activity
2.8.1 General
not permitted without written authorization from Alcatel.
All rights reserved. Passing on and copying of this
document, use and communication of its contents
One of the main functional areas of a TMN is the one providing the Performance Monitoring service on
the managed network; this functional domain will be referred as the Quality Domain (or Performance
Domain).
In order to provide a good network performance monitoring service, RM uses the measurement concept:
i.e. objects, whose performance level has to be controlled, are put under measurement.
The Performance Monitoring activity works on the basis of performance data coming from the
equipments via EML; data concern some standardized performance events, as the errored seconds (ES
and the far end one, FEES), the background block errors (BBE and the far end one, FEBBE), the severely
errored seconds (SES and the far end one, FESES), the unavailability seconds (unidirectional: UASuni
and bidirectional: UASbidi), the pointer justification counters (PJC) and the pointer justification counters
high (PJChigh) and low (PJClow).
The monitored objects are the transports (paths and HO trails), which are monitored in one or more
termination points, belonging to the specified network elements; these are the main network objects
involved in the performance activity. Some new specific objects have been introduced just for the Quality
Domain.
Figure 31. shows the main items in the Quality Domain Object Containment Tree.
1354RM
Network Management
System
Q
Quality Domain Domain
Q Q
Q 15m Q 24h
Measure Counter Archiviation
Q Report Profile Session
Q VCn Q 15m Q
Q
24h Pm Network
Pm Transport
Element
Threshold
Report Profile
Q Threshold
Q Q Q
15m
Crossing
Q Alarm
Pm Tp 24h Profile
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED 01 SC.2: DESCRIPTIONS
146
2.8.2 Quality Domain objects at the graphical interface
2.8.2.1 Pm Domain
2.8.2.1.1 Definition
The Pm Domain is the root of the performance monitoring containment subtree. It is automatically created
by RM.
2.8.2.1.2 Functionalities
From the quality domain it is possible to run the RMP (Regional Manager Performance) application,
in order to display all the possible collected data for all the measures under the quality domain.
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED 01 SC.2: DESCRIPTIONS
146
2.8.3 Measure
2.8.3.1 Definition
not permitted without written authorization from Alcatel.
A measure is the elementary working session for PM inside the 1354RM. It groups together a set of
All rights reserved. Passing on and copying of this
document, use and communication of its contents
The monitored points can be termination points at the end of the transport entities (NAPs and CAPs). In
order to provide the end to end monitoring; the operator can also enable the measuring on a set of
termination points belonging to the route of Transport entities (CTPs).
2.8.3.1.2 Functionalities
• Creation
• Attribute Setting
• Correlation to Transport Entities (paths or HO–Trails)
• Uncorrelation from correlated Transport Entities
• Correlation to Termination points (NAPs, CAPs and CTPs)
• Uncorrelation from correlated Termination points
• Correlation to Report Profiles
• Uncorrelation from Report Profiles
• Activation (Start and Restart)
• Consistency
• Stop
• Merging of several Measures
• Deletion
• Display collected data
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED 01 SC.2: DESCRIPTIONS
146
2.8.3.1.3 Creation
By means of the creation operation, a new instance of the Measure class is inserted in the PM Domain.
For the creation of a Measure, the user has to specify the following attributes:
• granularity (pmGranularity): it is the granularity of the service provided by the measure, i.e. the
period the collected data will be retrieved from the monitored network elements; allowed values
are: 15 minutes and 24 hours
• monitored layer (pmLayer): it indicates which network layer must belong to the monitored
objects (transports and termination points); it can be lower order, higher order or both.
• start time (pmStartTime): it is the desired date on which the measure should be activated; not
specified means that the measure will start upon manual intervention.
• end time (pmEndTime): it is the desired date for the measure to be stopped; not specified
means that the measure will stop upon manual intervention.
• collect counters: if true, the collection of the performance counters is required for all the
monitored termination points; if false, measure won’t collect counters: it will be useful only for
threshold crossing alarm generation.
• default tps (defaultEnd): if it is set to true, some termination points of the monitored transports
will be automatically chosen as monitored points (they will be naps or caps); for paths some
NAPs, for HO trails some CAPs and, in any case, all the possible boundary CTPs
At the end of a successful creation, the measure is present in the RM Domain having the Measure State
(pmMeasureState) equal to planned. Anyway no transport neither termination point is related to the
created measure.
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED 01 SC.2: DESCRIPTIONS
146
2.8.3.1.4 Attribute
Some measure attributes can be set (updated) by the user, under certain conditions.
not permitted without written authorization from Alcatel.
• granularity (pmGranularity): can be set only if no transport has already been correlated to the
measure
• monitored layer: (pmLayer), can be set only if no transport has already been correlated to the
measure
• default tps (defaultEnd): can be set only if no transport has already been correlated to the
measure
• desired start and end times (pmStartTime & pmEndTime): can be set only if the new values
do not cause a conflict with another measure, with the same granularity, trying to monitor the
same tp at the same time.
When the measure is activated, the modifiable attribute is only the desired end time (pmEndTime), if the
new value doesn’t cause a conflict with another measure, with the same granularity, trying to monitor the
same tp at the same time.
ED 01 SC.2: DESCRIPTIONS
146
2.8.3.1.5 Correlation between Measures and Transports (Paths and Trail)
It is possible to correlate several transports (i.e. paths and/or trails) to a measure; being a transport
correlated to a measure means that, when the measure will be activated, that transport will be monitored
– for paths:
• for unidirectional paths, the sink NAP, if non virtual, will be monitored
• for bidirectional paths, only one NAP, if non virtual, will be monitored
• for broadcast paths, all the non virtual sink NAPs will be monitored
– for HO trails:
By means of the correlation between termination points and measure action, it will be then possible to add
more monitored termination points for the transport.
When a transport has been correlated to a measure, a new object, child of the measure, is created: the
pmTransport, image of the transport in the Quality Domain.
For the possible automatically chosen monitored points of the transport, some new objects, child of the
pmTransport, are generated: the pmTps, image of the termination points in the Quality Domain.
The first time a termination point belonging to a network element has an image in the Quality Domain, the
network element too has an image in the Quality Domain: the pmNe.
It is also possible to uncorrelate transports from a measure they were correlated to; when a transport is
uncorrelated from a measure, the pmTransport is removed and the contained pmTps are removed too.
ED 01 SC.2: DESCRIPTIONS
146
2.8.3.1.7 Correlation between Measures and Terminal Points (Naps/Caps and Ctps)
It is possible to correlate a termination point to a measure, so that the termination point will be monitored
by that measure. When a termination point is correlated to a measure, an instance of the pmTp class is
not permitted without written authorization from Alcatel.
created, to show that the termination point has an image in the Quality Domain.
All rights reserved. Passing on and copying of this
document, use and communication of its contents
• the termination point is not already monitored by an other measure, having the same granularity
and going to be activated for at least one instant together with the measure the tp is going to
be correlated; in this case the correlation will fail because of ’time overlap’
• planned measure: the created pmTp and the measure are consistent
• activated measure: the newly created pmTp and the measure are not consistent and the
measure will require a manual consistency action
• stopped measure: the just created pmTp and the measure are not consistent and the
measure will require a manual consistency action
It is also possible to uncorrelate termination points from a measure they were correlated to; when a
termination point is uncorrelated from a measure, the pmTp is removed.
By means of this action, it is possible to correlate one or more report to a measure. Required conditions
are:
• the report window is compliant with the measure granularity (the smallest window values
match with a 15 minute granularity, the greatest ones with a 24 hour granularity)
When a report is correlated to an activated measure, reports will be generated with a frequency
corresponding to the report window.
By means of this action, it is possible to uncorrelate one or more reports from a measure they were
correlated to. This operation can be executed for both planned and activated measures. When a report
is no more correlated to an activated measure, reports will not be generated.
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED 01 SC.2: DESCRIPTIONS
146
2.8.3.1.11 Activation (start and restar)
• the measure is populated, i.e. contains at least one tp correlated for an implemented
transport
• not time overlapped on the monitored tps, i.e. no conflicts with other measures trying to
monitor the same tp at the same time, while having the same granularity
If the activation succeeds, the state of the measure and the state of the pmTps become activated.
PmTps and measure can be not consistent or consistent according to EML response.
When the measure is activated, the performance activity must be on (it depends on the consistency
attribute), so that:
• threshold crossing alarms (if pmTps are correlated to threshold crossing alarm profiles) will
be generated
• counter values (if the measure has the collect counter attribute set to true) will be collected
from the EML
• reports (counters and thresholds, if correlated to the measure) will be sent to their destination
at each window period
The activation of a measure can be also automatically run by the performance monitoring agent when
the desired start time of a measure is specified, upon reaching that instant (scheduled activation
activity).
A transport monitored by an activated measure will have the pm15 or pm24 attribute set to true (according
to the measure granularity).
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED 01 SC.2: DESCRIPTIONS
146
2.8.3.1.12 Consistency
By means of the measure consistency, it is possible to check, if the situation presented by RM for the
monitored object is the same at EML side. This means to ask the equipments for:
not permitted without written authorization from Alcatel.
All rights reserved. Passing on and copying of this
document, use and communication of its contents
Generally this action will be run on measures which have some pmTp not consistent and, so, are not
consistent, but it could be run also on consistent measures. After running the consistency action, the
measure and the pmTps could become:
• consistent
Having to interact with EML, the consistency action works on the network elements which have at least
a termination point monitored by the measure; for each network element the following steps are
performed:
2.8.3.1.13 Stop
If the stop action succeeds, the measure pmMeasure State and the pmTpState of the pmTps become
stopped.
PmTps and measure will be not consistent or consistent according to EML response.
When the measure is stopped, the performance activity is off (it depends on the consistency attribute), so
that:
• threshold crossing alarms (if pmTps had been correlated to threshold crossing alarm profiles)
are no longer generated
• counter values (if the measure has the collect counter attribute set to true) are no longer
collected from the EML
• reports (counters and thresholds, if correlated to the measure) are no longer sent to their
destination at each window period
The stopping of a measure can be also automatically run by the performance monitoring agent when the
desired end time is reached (scheduled stop activity).
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED 01 SC.2: DESCRIPTIONS
146
2.8.3.1.14 Merging of several Measures
The merging of more measures (input measures) into another one (target measure) is a complex action
which allows to put together more monitored objects (paths, trails and their termination points) into one
Only homogeneous measures can be merged; measures are homogeneous when they have the same
state (pmMeasureState) and the same granularity (pmGranularity) values.
• consistency (pmConsistency): it will be equal to consistent if and only if all the involved
measures are consistent
• default ends (defaultEnd): it will be equal to true if no involved measure has a false value
• collect counters (pmCollectCounter): it will be equal to true if at least one involved measure
has a true value
• monitored layers (pmLayer): it will be given by the union of the layers monitored by the involved
measures
• start time (pmStartTime): it will be equal to the lowest value between the specified ones of the
merging measures; it will be unspecified only if no input measure has a specified start time
• end time (pmEndTime): it will be set as the greatest value found in the involved measures
• if the new start and end times are too large for some monitored termination points, i.e. any
termination point has already been inserted in another measure which will be activated during
the new activity interval
• if two merging measures (in case of measures which have been already activated) have
monitored the same termination point, but while belonging to two different transports (i.e. there
has been a transport routing redefinition)
• if the merging measures have monitored at different times the same tp, but with different counter
profiles (i.e. bidNePlusFeADM and uniNeADM)
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED 01 SC.2: DESCRIPTIONS
146
2.8.3.1.15 Deletion
This function deletes a measure instance in the RM database. This implies to:
not permitted without written authorization from Alcatel.
• delete all the possible historical data collected for the objects monitored in the measure
All rights reserved. Passing on and copying of this
document, use and communication of its contents
• delete all the objects contained in the sub–tree of the measure (i.e. pmTransports and pmTps)
The operation can be executed only on non active and consistent measures
From a measure it is possible to run the RMP application, in order to display possible collected data for
all the pmTps belonging to the measure.
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED 01 SC.2: DESCRIPTIONS
146
2.8.3.1.17 Measure state transitions
PLANNED
Activation (Start)
Consistency
Activation (Restart)
STOPPED ACTIVATED
Stop
Deletion
Consistency
The above figure shows the measure state transitions graph.. The ellipses represent the measure states:
• planned: a measure is planned when it is created by the user; at that time it can be populated,
by correlating to it transports and termination points, and no performance monitoring activity is
working
• activated: the measure has been activated: the required performance monitoring activities
(counter value collection, Threshold crossing alarm generation, report sending) should be
working
As already explained, for the last two states the measure can be both:
The measure consistency action does not change the pmTp state.
ED 01 SC.2: DESCRIPTIONS
146
In the represented states, the measure working state is normal. On the arcs, the measure has a working
state equal to synchronizing.
State transitions occur on activation (start and restart) and stop, while the consistency action does not
not permitted without written authorization from Alcatel.
The measure can be deleted only when planned or stopped (but consistent).
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED 01 SC.2: DESCRIPTIONS
146
2.8.3.2 Pm Transport
2.8.3.2.1 Definition
2.8.3.2.2 Functionalities
• Attribute Setting
• Deletion
A pmTransport user label (userLabel) can always be set by the user, in order to follow the settings of the
monitored transport user label. No other attribute can be set by the user.
2.8.3.2.4 Deletion
• a planned measure
When a pmTransport is deleted, all its pmTps are deleted too, together with their possible stored
performance data.
Deleting a pm transport in a planned measure is the same of uncorrelating the relevant transport from the
measure.
From a pm transport it is possible to run the RMP application, in order to display possible collected data
for all the pmTps belonging to the pm transport.
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED 01 SC.2: DESCRIPTIONS
146
2.8.3.3 Pm Termination Point
2.8.3.3.1 Definition
not permitted without written authorization from Alcatel.
The pmTermination Point is the image, in the Quality Domain, of a monitored termination point. For a
All rights reserved. Passing on and copying of this
document, use and communication of its contents
certain termination point, it is possible to have more pmTps: in fact, there will be a pmTp for each measure
monitoring the termination point. PmTps are automatically generated by the performance activity agent,
when the termination point is correlated to the measure.
2.8.3.3.2 Functionalities
See threshold crossing alarm profile, uncorrelation from a monitored termination point
2.8.3.3.5 Deletion
• a planned measure
• a stopped but consistent measure
• in any case, if the pmTp has never collected data
From a pm tp it is possible to run the RMP application in order to display all its possible collected data.
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED 01 SC.2: DESCRIPTIONS
146
2.8.3.3.7 PmTp state transitions
• stand by: in an activated measure a pmTp can be stand by if it belongs to a termination point
that, for whatever reason, is no more in the monitored transport or if its transport is no longer
implemented: no performance monitoring activity in progress on that termination point.
• stopped: in a stopped measure all the pmTps are stopped, i.e. they should no longer provide
performance monitoring services
As already explained, for the last three states the pmTp can be both:
The measure consistency action does not change the pmTp state.
In the cited states the pmTp working state is normal. On the transitions, the pmTp working state is
synchronizing.
State transitions occur at measure activation (start and restart), at measure stop, or at transport
configuration state changes.
PmTps are planned or activated at their creation, i.e. at the correlation of the termination point to the
measure (or at the correlation of the transport to the measure, if the pmTp is created as a default monitoring
point for the transport),
PmTps can be explicitly deleted only when planned, unavailable, stand by or stopped, if consistent, by
means of a pmTp deletion or of a termination point uncorrelation from the measure, or implicitly deleted,
as a consequence of a transport uncorrelation (or pmTransport deletion) or of a measure deletion.
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED 01 SC.2: DESCRIPTIONS
146
2.8.3.4 Pm Network Element
2.8.3.4.1 Definition
not permitted without written authorization from Alcatel.
When one or more termination points belonging to a network element are correlated to some measures,
All rights reserved. Passing on and copying of this
document, use and communication of its contents
an image in the Quality Domain of that network element is generated: it is the pm network element. The
pm network element is automatically created by the performance monitoring agent.
2.8.3.4.2 Consistency
This functionality has the objective of aligning EML–MIB to RM–MIB, as far it is concerned about
performance data
• for all pmTps contained in the pmNe, RM retrieves from EML their performance state
• RM compares its information with EML information, in order to fix the misalignment (at level
of PmTp)
• RM tries to align the EML–MIB to RM–MIB, sending to EML start and stop commands, as
stated in RM–MIB.
• when all EML answers are received, pmTps and pmNe can be consistent or not consistent
The consistency operation on the pmNes is strongly recommended after an SH restart, due to
the fact that SH (EML) does not provide PM data persistency at restart.
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED 01 SC.2: DESCRIPTIONS
146
2.8.3.5 Threshold Crossing Alarm Profile
2.8.3.5.1 Definition
For the 24 hours profile the alarm clearing is automatically performed at the end of the alarmed day.
In order to apply a threshold crossing alarm profile to a certain termination point, the termination point
must be monitored by a measure; in this case it is possible to correlate the profile to the pmTp: at this
time the threshold crossing alarm profile is set on the termination point.
If the measure is planned, the alarm generation process does not work till the measure will enter the
activated state. If the measure is activated, the alarm generation process will work as soon as the
measure monitoring the termination point succeeds in the consistency action.
The threshold crossing alarm profile concerns more thanone termination point: in fact, when the profile
is correlated to a given pmTp, it is applied to the network element the termination point belongs to.
Because of restrictions due to ADM equipments, termination points can be correlated to only one
Threshold Crossing Alarm Profile for each tp rate / granularity pair of values
2.8.3.5.2 Functionalities
• Creation
• Deletion
ED 01 SC.2: DESCRIPTIONS
146
2.8.3.5.3 Creation
RM provides a set of default TCA profiles; anyway, the user may want to define a new, different profile.
During the Creation of a Profile, the following attributes can be specified:
not permitted without written authorization from Alcatel.
All rights reserved. Passing on and copying of this
document, use and communication of its contents
• granularity (pmGranularity): it is the granularity of the TCA Profile instance; possible values
are 15 minutes and 24 hours
• threshold values (bBeLow. bBeHigh, eSLow, eSHigh, ...): the values for the alarm generation
and clearing, for each counter type
2.8.3.5.4 Deletion
By means of this action, it is possible to apply a Threshold Crossing Alarm Profile to a pmTp (and, so,
to the pmNe the pmTp belongs to). In order to do this, it is necessary for the pmTp and the profile to have
the same granularity value.
By means of this action, it is possible to clear a Threshold Crossing Alarm Profile on a pmTp.
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED 01 SC.2: DESCRIPTIONS
146
2.8.3.6 Threshold Report Profile
2.8.3.6.1 Definition
Threshold reports hold the information about those counters (Background Block Errors, Errored
Seconds, Severely Error Seconds, UnAvailability Seconds and their Far End versions) which
exceeded some specified threshold values; they will be generated with a period corresponding to the
threshold report profile window attribute, so that, being generally the window longer than the granularity
period, the report will contain information about several granularity periods.
2.8.3.6.2 Functionalities
• Creation
• Attribute Setting
• Deletion
• Uncorrelation from a measure (see the measure action: uncorrelation from reports)
2.8.3.6.3 Creation
• destination type (pmReportDestType): it is the medium for the report generation: printer,
terminal (E–mail), file
• granularity (pmGranularity): the granularity by which are grouped the collected data from the
equipments; data exceeding threshold values are shown per granularity period.
• threshold values (pmThreBBE, pmThreEs, pmThreFEBBE, ...): threshold values for each
counter type
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED 01 SC.2: DESCRIPTIONS
146
2.8.3.6.4 Attribute Setting
The following attributes can be set by the user, provided that the report is not correlated to an activated
measure:
not permitted without written authorization from Alcatel.
All rights reserved. Passing on and copying of this
document, use and communication of its contents
• window (pmReportWindow)
2.8.3.6.5 Deletion
ED 01 SC.2: DESCRIPTIONS
146
2.8.3.7 Counter Report Profile
2.8.3.7.1 Definition
2.8.3.7.2 Functionalities
• Creation
• Attribute Setting
• Deletion
• Correlation to a measure (see the measure action: correlation to reports)
• Uncorrelation from a measure (see the measure action: uncorrelation from reports)
2.8.3.7.3 Creation
• destination type (pmReportDestType): it is the medium for the report generation: printer,
terminal (E–mail), file
• window (pmReportWindow): it is the periodicity for the threshold report generation; when
correlating the profile to a measure, the window must be not smaller neither too bigger than the
measure granularity period
All the following attributes of can be set by the user, provided that the report is not correlated to an activated
measure:
• window (pmReportWindow)
2.8.3.7.5 Deletion
ED 01 SC.2: DESCRIPTIONS
146
2.8.3.8 Archive Session
2.8.3.8.1 Definition
not permitted without written authorization from Alcatel.
The archive session is an object identifying a session of performance data archive on a tape medium.
All rights reserved. Passing on and copying of this
document, use and communication of its contents
• a user label, automatically built on from date and the granularity (e.g.: an archive performed
on 15 min data from the 15/06/1998 will be given the following user label: “15 minutes counters
1998/06/15”)
• the tip dates (from date and to date)of the data period
An instance of archive session, concerning the next archive session, is automatically generated at the
end of each archive operation.
The only attribute which can be set by the user is the attribute to date, in order to anticipate or postpone
the next archive operation.
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED 01 SC.2: DESCRIPTIONS
146
2.8.4 Performance activites on objects out of Pm Domain
There are some objects, not belonging to the Quality Domain, which can undergo some performance
actions:
• nodes
• EML domains
2.8.4.1 Transport
Transports can enter/exit a monitoring activity by means of the correlation/uncorrelation to measures (see
correlation between measures and transports).
Paths can also enter the monitoring activity automatically, if they have the pm automatic
attribute set to true: at their implementation they will be automatically correlated to a measure
which will be automatically activated.
• deimplementation
• reimplementation
• leg remove
• protection remove
if the monitoring measure is activated, the corresponding involved pmTps will change their state in order
to follow the new transport configuration state: their pmTpState attribute will switch between activated
and stand by and the performance activity on the equipments will start/stop.
2.8.4.3 Nodes
Nodes can enter a performance consistency activity as described for pm network elements (consistency).
Consistency can be run on an EML domain; this is the same of running the consistency on the network
elements composing the EML domain
All the operations performed by the user service also are traced in the Redo Log file.
Separate data base backup services are now available for Network Configuration Tables (included
started termination points) and for Performance Tables.
ED 01 SC.2: DESCRIPTIONS
146
All rights reserved. Passing on and copying of this
document, use and communication of its contents
not permitted without written authorization from Alcatel.
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED
01
957.130.872 H
SC.2: DESCRIPTIONS
2.9 FAD / NAD – Functional Access Domain
146
3AL 61259 AA AA
117 / 146
2.10 Backup and Restore
– PM data;
– OS data: Operating System configuration data (i.e. /etc/hosts) – Third party software (HPOV ORS
DB) – Application configuration data (i.e. us_nodes, im_host_conf);
– Operator data.
N.B. The previous data types could be saved all together or in separate way selecting the relevant
data on user interface.
The first three subsystems backup/restore procedure are based on the Oracle import/export features, so
only table data are saved and not the table structure. This imply to recreate the Oracle DB (see the
Administrator Guide Handbook).
ED 01 SC.2: DESCRIPTIONS
146
The detailed procedure is described in the SMF Handbook, in particular Chapter 8.
Prior to execute the backup / restore feature for NR2 EMLs (SH and WX) it is necessary to
execute the following manual workaround procedure:
not permitted without written authorization from Alcatel.
All rights reserved. Passing on and copying of this
document, use and communication of its contents
During the backup the RM system is switched in read only run level, so it is guaranteed the saved data
integrity.
The network backup function is available both as a periodical action and on user request via user interface.
The files originated by a backup are stored onto a disk (other than the one in which resides the Oracle
database) and optionally on a tape (see Figure 32. ).
2.10.1 Procedures
The detailed procedure is described in the handbook System Administrator Reference Guide.
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED 01 SC.2: DESCRIPTIONS
146
2.11 RM objects
The database contains the object classes which are described in the following.
Ntw (Network)
The network comprises all the interconnected SDH equipment. A network comprises sub–networks.
A network object instance has an associated symbol and a submap. The symbol represents the network
in the root submap, and ”clicking” on it the corresponding submap can be opened.
EmlDomain
An EML domain is maintained by a single EML OS. This object is generated in order to inform the Operator
on the OS a certain NE belongs to.
An EML–domain contains the NEs managed by the EML OS.
NE
A node has an associated symbol and a submap. The symbol is used to represent the node in the submap
describing the topology of the sub–network or ET where the node is contained. Clicking” on the node, the
asociated submap will be opened. This submap contains the uploaded ports.
Physical Connection
A physical connection connects two ports in the network. These two ports belong to different NEs and must
have the same transmission rate.
A physical connection has a symbol, that is used to represent the physical connection in the submap
associated.
Site
Port
A port is a physical interface of a node. Two ports with the same interface can be connected by means
of a physical connection.
A port has a graphical symbol, that is used to represent the port in the submap associated to the node.
Path
ET
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED 01 SC.2: DESCRIPTIONS
146
Sbn
The subnetwork is a partitioning of the NML network. It contains Elementary topologies and
interconnected Nodes.
not permitted without written authorization from Alcatel.
ConnInTopol
The connInTopol (connection in topology) describes a generic connection (subnetwork connection,
network connection) between two or more ends (they can be Naps,Caps or Ctps) to realize a path in any
partitioning level.
A connInTopol between Naps corresponds to a path.
Ntw
sbn1 sbn2
connInTopol
Nap1 Nap2
ED 01 SC.2: DESCRIPTIONS
146
not permitted without written authorization from Alcatel.
All rights reserved. Passing on and copying of this
document, use and communication of its contents
sbn
Nap1
Ctp1
connInTopol
ctp ctp
ntw
ctp ctp
Note: If the ring is located on the network boundary, it describes the connection between Nap1 and Ctp1
ED 01 SC.2: DESCRIPTIONS
146
not permitted without written authorization from Alcatel.
All rights reserved. Passing on and copying of this
document, use and communication of its contents
ctp ctp
ntw
ctp ctp
ctp1 ctp2
connInTopol
ctp
ctp ctp
Note: If the ring is located in the inner of the network, it describes the connection between ctp1 and ctp2
Cap
The Cap (Connection access point) is a higher order trail termination. It can be the client access point
towards the network.
Ctp
Ms CtpCap
It represents both the Msctp and the mscap entities related to an SDH physical port at MS layer.
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED 01 SC.2: DESCRIPTIONS
146
NE 1641 SM
ctp ctp
LOPL
VC–4
cap
This is a 1 to 1
connInTopol
ctp
HOPL
MSL
LOPL=low order path layer ; HOPL=high order path layer; MSL=multiplex section layer
ED 01 SC.2: DESCRIPTIONS
146
NE 1651 SM
not permitted without written authorization from Alcatel.
All rights reserved. Passing on and copying of this
document, use and communication of its contents
nap
connInTopol
ctp ctp
time division
multiplexing LOPL
HOPL
cap1 cap4
connInTopol connInTopol
ctp1 ctp4
MSL
msctpcap
STM–4
The connection between cap and ctp at HOPL is a connInTopol inside the NE
ED 01 SC.2: DESCRIPTIONS
146
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED
nap
nap
01
957.130.872 H
connInTopol
SC.2: DESCRIPTIONS
tdm
msctpcap
connInTopol
NE
146
3AL 61259 AA AA
HOPL
MSL
LOPL
126 / 146
All rights reserved. Passing on and copying of this
document, use and communication of its contents
not permitted without written authorization from Alcatel.
Trail
It describes the connectivity between two caps in any partitioning level and in any layer. It defines the
association between client access points in the same transport network layer.
not permitted without written authorization from Alcatel.
All rights reserved. Passing on and copying of this
document, use and communication of its contents
LOlink connection
ctp ctp LO
HOtrail
cap cap
HO
HO link connection
ctp ctp
ms trail
MS
msctpcap msctpcap
The trail corresponds to the logical generation/check of OH/SOH info, in the G803 layer structure (peer
to peer arrangement).
Link Connection
The link connection describes the connectivity between two CTPs in any partitioning level and in any layer.
The figure which follows describes the objects involved in the structure.
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED 01 SC.2: DESCRIPTIONS
146
NE NE
nap nap
connInTopol connInTopol
connInTopol connInTopol
ctp16
HOlc ( AU4#16) ctp1
HOlc ( AU4#1)
HOPL HOPL
MSL MSL
ms trail
mstp mstp
mstp mstp
physConn
nap nap
140cap1
(VC4) 140cap1
HOtrail(VC4S1) (VC4) #1
#1
connInTopol connInTopol
ms trail ms trail
mstp
mstp mstp mstp
physConn physConn
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED 01 SC.2: DESCRIPTIONS
146
2.12 Trail Monitor
The Trail Monitor function allows to monitor, along a path (in an intermediate NE), the HO(LO) Path
Overhead.
not permitted without written authorization from Alcatel.
All rights reserved. Passing on and copying of this
document, use and communication of its contents
It can be inserted to monitor the signal before the matrix or after the matrix. It is used to monitor
unidirectional or bidirectional paths. The Trail Monitor can be used in the following applications:
–SNCP/N with Path Overhead Monitoring ( POM ) at the incoming signal (before matrix)
– Protected Trail Monitoring with POM at the outgoing signal (after matrix)
In the following paragraphs these applications are described by figures: the upper part of the figure shows
the functional view and the lower part represents the Managed Object view.
Figure 43. to Figure 45. show examples of trail monitor application for fault localization.
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED 01 SC.2: DESCRIPTIONS
146
2.12.1 SNCP/N with POM at the incoming signal (before matrix)
TT
POM POM
MCp MCp
SSF SSF
A A Server
layer
vc4TTPSinkR1
dcp rrp
ucp
CP CP
CPG urp
au4CTPSinkR1 au4CTPSinkR1
Signal Flow
Containment/naming relationship
trailMonitor trailMonitor
SNCP/N Information Model (HOP)
The non–intrusive monitoring function is realized by a trailMonitor (high order for HPOM in the example)
associated to the CTP (au4CTPSnkR1) that performs the adaptation to the server layer. Note that in this
figure the vc4TTPSinkR1 can be replaced by an au4CTPSource.
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED 01 SC.2: DESCRIPTIONS
146
2.12.2 SNCP/N with POM at the outgoing signal (after matrix)
POM
not permitted without written authorization from Alcatel.
All rights reserved. Passing on and copying of this
document, use and communication of its contents
Client
MC layer
MCp MCp
Server
layer
A A A
au4CTPSource
rrp
trailMonitor
CP CPG CP
urp
Containment/naming relationship
Signal Flow
In this example the non–intrusive monitoring function realized by the trailMonitor, performs after matrix
(protection) monitoring (The trailMonitor instances at au4CTPsinkR1 points necessary for SNCP/N are
not drawn in this figure).
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED 01 SC.2: DESCRIPTIONS
146
2.12.2.1 Trail monitoring unidirectional
Signal Flow
Trail
MC MC MC
A A A A
au4CTPSinkR1 au4CTPSource
au4CTPSource au4CTPSinkR1
Containment/naming relationship
Signal Flow
dcp
ucp
NOTE .1 The POM duplication has been abstracted to highlight the Information Model view.
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED 01 SC.2: DESCRIPTIONS
146
2.12.2.1.1 Trail monitoring bidirectional
Signal Flow
not permitted without written authorization from Alcatel.
Trail
All rights reserved. Passing on and copying of this
document, use and communication of its contents
TT NOTE.1 POM TT
Signal Flow
MC MC MC
A A A A
Signal Flow
au4CTPBidirectionalR1 au4CTPBidirectionalR1
au4CTPBidirectionalR1
au4CTPBidirectionalR1
D
A Link connection B C Link connection
In this example, at point C, two non–intrusive monitoring functions modelled by trailMonitor have been
instantiated for monitoring of the ingress/egress trails at that point. The afterMatrixSignal attribute permits
to differentiate them.
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED 01 SC.2: DESCRIPTIONS
146
2.12.2.1.2 Trail monitoring bidirectional (view in detail)
au4CTPSinkR1 au4CTPSource
Signal Flow
B1
au4CTPSource au4CTPSinkR1
trailMonitor
Signal Flow
C1 C2
Signal Flow
Bidirectional
dcp Containment/naming relationship
ucp
Figure 42. POM in Trail Monitoring (detailed view of bidirectional before and after)
The trailMonitor at C1, monitoring the outgoing trail, has the afterMatrixSignal attribute set to egress,
whereas the ones at B1 and C2 monitoring the incoming trails have them set to ingress.
The setting of the afterMatrixSignal attribute is done at instantiation time.
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED 01 SC.2: DESCRIPTIONS
146
2.12.2.1.3 TrailMonitor application for fault localization(1/3)
Trail
Distur-
Distur- bance
POM
TT
NOTE.1
bance TT detected
TCP TCP detected TCP
MC MC MC MC
CP CP CP CP CP CP
A A A A A A
Distur-
bance
detected
Link connection Link connection Link connection
trailMonitor
Signal flow
dcp Containment/naming relationship
ucp
The example shows a disturbance detected by the vc4TTPSinkR1 at the terminating end. As may not be
obvious where this disturbance is located, the trail is viewed as a series of link connections. Starting at
the trail sink end (point F) and going towards the source trail end(point A), a trailMonitor is selectively
instantiated, one point at a time, (E in the example). The point E also has the disturbance present.
ED 01 SC.2: DESCRIPTIONS
146
2.12.2.1.4 trailMonitor application for fault localization(2/3)
MC MC MC MC
CP CP CP CP CP CP
A A A A A A
Trail
trailMonitor
trailMonitor
Link connection Link connection
Distur- Distur-
bance bance
detected detected
supervisedUnequippedSi
Signal flow
dcp Containment/naming relationship
ucp
The process continues upstream. The next point (D, a before matrix one) when supervised by means of
an instantiated trailMonitor, is found also with the disturbance present.
ED 01 SC.2: DESCRIPTIONS
146
2.12.2.1.5 trailMonitor for fault localization(3/3)
not permitted without written authorization from Alcatel.
Trail
Distur-
Distur- bance
POM Distur-
TT POM bance TT detected
NOTE.1 bance NOTE.1
TCP TCP free TCPdetected TCP
MC MC MC MC
CP CP CP CP CP CP
A A A A A A
trailMonitor
trailMonitor
trailMonitor
Link connection Distur- Link connection
bance Distur- Distur-
free bance bance
detected detected
Signal flow
dcp Containment/naming relationship
ucp
The next point upstream ( C) is found disturbance free. The fault is so located between those two points
(C–D) in which the trailMonitor reports disturbance free performance for one (C) while the other(D) reports
the disturbance condition.
ED 01 SC.2: DESCRIPTIONS
146
2.13 Path/Trail Allocation Failures
Path/Trail allocation failures are localized in the browser Path/Trail list. Selecting the involved path/trail and
clicking on the Show Failure Information Tool button, the Netscape browser application starts and
Selecting the involved path/trail and clicking on the Show Failure Information Tool button, the Netscape
browser application starts and displays the Netscape Path/Trail allocation failure window.
The Netscape Path/Trail allocation failure window contains the following frames:
– path/trail userlabel
– failure date
– failure time
– no. of failed legs ( for broadcast paths only )
– one row per each failed leg. The relevant leg number is shown in the left–hand column.
• PROBLEM TYPE, reference to the html Problem Detail frame. The following problem
types are possible:
Two columns are displayable: MAIN (problems on the main route) and SPARE (problems
on the spare route, only for protected paths/trail)
Clicking on the reference to the html Problem Detail frame ( named OBSTACLES and CONSTRAINTS
1AA 00014 0004 (9007) A4 – ALICE 04.10
PROBLEMS), the Problem Detail frame view will display the selected leg.
ED 01 SC.2: DESCRIPTIONS
146
• The Problem Detail frame contains:
• Leg no. ,i.e. the selected leg number. This field is not present for point to point paths
All rights reserved. Passing on and copying of this
document, use and communication of its contents
• node icon (green triangle) with node name or link connection icon (yellow icon)
with link connection name: node A name – node B name – AU/TU pointer No.
• Problem Type ( yellow string which is the html reference to the Path/Trail allocation
failure description window
From the Problem Detail frame select the problem type. The Path/Trail allocation failure description
window is displayed.
• Generic Help on Allocation Failure. It contains a generic description of the allocation failure.
A Main wiindow reload button is present in this frame,allowing the operator to display the main
window.
• Problem description. It contains the detailed problem description (Title and Explanation) of
the problem and suggestions ( Hints ) how to solve the problem.
– NE Connection Problems
Explanation: The path/trail could not use a NE because it could not support a connection as
the one required.
Hints: If a constraint to use that NE has been set, try to remove it.
– Infinite Cost
Explanation: The routing algorithm has found a route which uses a routing link with infinite cost
Explanation: The system tried to use a routing link without free link connections
1AA 00014 0004 (9007) A4 – ALICE 04.10
Hints: Deallocate some paths/trails which use the same routing link or change the payload
configuration in order to create new link connections at the proper rate.
ED 01 SC.2: DESCRIPTIONS
146
– Improper Payload Configuration
Explanation: No one hop routing link exists related to a physical connection. This can be due
to an improper payload configuration or to the presence of a user defined HO trail
– Unsatisfied Constraints
Explanation: One or more of the constraints given to the path/trail cannot be satisfied
Hints: The only way to allocate the path/trail is to remove/modify some constraints
The left hand side frame contains the Problem menu list. Each menu item, if selected, will display its
problem explanation and some hints to solve it.
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED 01 SC.2: DESCRIPTIONS
146
3 OBJECT NAMES
– A–Z, a–z, 0–9, all special characters except: tilde (~), backslash (\), pipe (|), double quote (”), TAB
All rights reserved. Passing on and copying of this
document, use and communication of its contents
– path 46
– ne 32
– port 58
– physical Conn 44
– routing link 46
– network 24
– subnetwork 24
– et (ring) 24
– node 32
– link connection 46
– trail 46
– tgTop 24
– network domain 24
– perf. measure 58
– pmTransport 46
– TCA Profile 48
– pmNE 46
– pmTp 68
– pmCountRep 24
– tcRProfile 24
– pmTranStProfile 24
– pmRatioProfile 24
– pmQpgProfile 24
– aSSAProfile 32
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED 01 SC.2: DESCRIPTIONS
146
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED
01
957.130.872 H
SC.2: DESCRIPTIONS
146
3AL 61259 AA AA
142 / 146
All rights reserved. Passing on and copying of this
document, use and communication of its contents
not permitted without written authorization from Alcatel.
4 ACRONYMS AND ABBREVIATIONS
AU Administrative Unit
CT Craft Terminal
DS Degraded Signal
HP Hewlett Packard
ED 01 SC.2: DESCRIPTIONS
146
HP–OVW Hewlett Packard OpenView Windows
IM Information Manager
MS Multiplex Section
NE Network Element
ED 01 SC.2: DESCRIPTIONS
146
OS Operation System
PI Physical Interface
All rights reserved. Passing on and copying of this
document, use and communication of its contents
RS Regenerator Section
SA Section Adaptation
SF Signal Failure
TF Transmit Fail
TN Telecommunications Network
TP Termination Point
TU Tributary Unit
VC Virtual Container
XC Cross–Connect
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED 01 SC.2: DESCRIPTIONS
146
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED
01
957.130.872 H
SC.2: DESCRIPTIONS
END OF DOCUMENT
146
3AL 61259 AA AA
146 / 146
All rights reserved. Passing on and copying of this
document, use and communication of its contents
not permitted without written authorization from Alcatel.
1354RM REL.5.2B OPERATOR’S HANDBOOK
not permitted without written authorization from Alcatel.
All rights reserved. Passing on and copying of this
document, use and communication of its contents
TABLE OF CONTENTS
3 BROADCAST CONNECTIONS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35
3.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35
3.1.1 Fault management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36
3.1.2 Failure affecting all drop points . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36
3.1.3 Failure affecting some drop points . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37
3.1.4 Broadcast connection management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38
1354RM REL.5.2B
OPERATOR’S HANDBOOK
ED 01 SC.3: NPE
188
5.1.3 Secondary circuit on LP channels: fault management . . . . . . . . . . . . . . . . . . . . . . . . . . . . 50
5.1.4 Failure cases . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51
5.1.5 Span failure on span adjacent Service Selector of primary node . . . . . . . . . . . . . . . . . . . 51
5.1.6 Primary node failure . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 52
8 FEATURES . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 123
8.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 124
8.1.1 General description of MS–SPRING protection scheme . . . . . . . . . . . . . . . . . . . . . . . . . . 124
8.1.2 MS shared protection rings – Transoceanic application . . . . . . . . . . . . . . . . . . . . . . . . . . . 125
INDEX . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 188
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED 01 SC.3: NPE
188
LIST OF FIGURES AND TABLES
FIGURES
not permitted without written authorization from Alcatel.
ED 01 SC.3: NPE
188
Figure 51. second SF request long path on node A . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 92
Figure 52. SF request long path on node E . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 93
Figure 53. SF request long path on node F . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 94
Figure 54. SF Ring switching initial condition . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 95
ED 01 SC.3: NPE
188
Figure 97. Transoceanic drop & continue/working: failure of the primary node . . . . . . . . . . . . . . . . . 141
Figure 98. Transoceanic drop & continue/protection: failure of the primary node . . . . . . . . . . . . . . . 142
Figure 99. Transoceanic drop&c/working:failure outside of the termination, primary, or secondary
node . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 143
not permitted without written authorization from Alcatel.
secondary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 144
Figure 101. Transoceanic drop & continue/working: failure between primary and secondary . . . . . 145
Figure 102. Transoceanic drop & continue/working: failure of the secondary node . . . . . . . . . . . . . 146
Figure 103. inside, (a) unidir (b) bidir (c) broadcast, unprotected, no prot. in NPE, HP . . . . . . . . . . 148
Figure 104. inside, (a) unidir (b) bidir (c) broadcast, SNCP, no prot. in NPE, HP . . . . . . . . . . . . . . . 149
Figure 105. boundary (2 NPE rings), bidir, D&C, no prot. in NPE, HP . . . . . . . . . . . . . . . . . . . . . . . . . 150
Figure 106. boundary, bidir, D&C, no prot. in NPE, HP (add/drop node = Primary) . . . . . . . . . . . . . 151
Figure 107. boundary, bidir, D&C, no prot. in NPE, HP (add/drop node between P and S) . . . . . . . 152
Figure 108. boundary, unidir, D&C, no prot. in NPE, HP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 153
Figure 109. crossing, unidir, unprotected, no prot. in NPE, HP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 154
Figure 110. crossing, biidir, unprotected, no prot. in NPE, HP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 155
Figure 111. crossing, broadcast, unprotected, no prot. in NPE, HP . . . . . . . . . . . . . . . . . . . . . . . . . . . 156
Figure 112. crossing, broadcast, SNCP, no prot. in NPE, HP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 157
Figure 113. crossing, unidir, SNCP, no prot. in NPE, HP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 158
Figure 114. crossing, unidir, D&C, no prot. in NPE, HP (1) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 159
Figure 115. crossing, unidir, D&C, no prot. in NPE, HP (2) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 160
Figure 116. crossing, bidir, SNCP, no prot. in NPE, HP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 161
Figure 117. crossing, bidir, D&C, no prot. in NPE, HP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 162
Figure 118. bidirectional protected path . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 166
Figure 119. unidirectional protected path (using working resource between nodes E and D) . . . . . 167
Figure 120. unidirectional protected path (using protection resource between nodes E and D) . . . 167
Figure 121. broadcast protected path . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 168
Figure 122. Selection box. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 185
Figure 123. 4–F Protection blocks. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 186
Figure 124. Manage switch menu. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 187
TABLES
Table 1. Traffic map: initial provisioning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39
Table 2. Traffic map: new HP connections on protection channels . . . . . . . . . . . . . . . . . . . . . . . . . . . 40
Table 3. Traffic map: preempted LP connections . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41
Table 4. Traffic map: mantained LP connections . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41
Table 5. Traffic map: final HP and LP connections . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42
Table 6. Aggregate Alarms + Sync . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 57
Table 7. Encoding of Sync_A and Sync_B bits of Aggregate Alarms + Sync . . . . . . . . . . . . . . . . . . . 57
Table 8. K1 byte . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 57
Table 9. K2 byte . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 58
Table 10. K0 byte + Sync . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 58
Table 11. Commands byte 1 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 59
Table 12. Commands byte 2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 59
Table 13. Fault localization byte . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 61
Table 14. Summary of supported path types . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 147
Table 15. Transition of the three states during MS–Spring implementation (case virtual –> active) 178
Table 16. 0.Transition of the thre states during MS–Spring topology removal . . . . . . . . . . . . . . . . . . 180
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED 01 SC.3: NPE
188
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED
01
957.130.872 H
SC.3: NPE
188
3AL 61259 AA AA
6 / 188
All rights reserved. Passing on and copying of this
document, use and communication of its contents
not permitted without written authorization from Alcatel.
1 TRANSOCEANIC MS–SPRING: MAIN CONCEPTS
1.1 Introduction
not permitted without written authorization from Alcatel.
All rights reserved. Passing on and copying of this
document, use and communication of its contents
The aim of this document is to describe the operations related to the operation and maintenance of the
4–F Transoceanic MS–Spring controlled by the 1354RM.
– Architecture
– Broadcast Connections
– Restoring Algorithm
– NPE Features
– NPE in 1354RM
ED 01 SC.3: NPE
188
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED
01
957.130.872 H
SC.3: NPE
188
3AL 61259 AA AA
8 / 188
All rights reserved. Passing on and copying of this
document, use and communication of its contents
not permitted without written authorization from Alcatel.
1.4 Architectural description
1.4.1 Introduction
not permitted without written authorization from Alcatel.
All rights reserved. Passing on and copying of this
document, use and communication of its contents
Transoceanic MS–SPRing is constituted by a four fibre MS shared protection ring (”4F MS–SPRing”)
managing a different MS–SPRing protocol respect to the standard one.
4F MS–SPRing is a ring of nodes connected with four fibres for each span of the ring.
Working and protection channels are carried over different fibres: two fibres (one per direction) carry the
working channels; the other two (one per direction), carry the protection channels.
The working channels carry the high priority (HP) traffic, while the protection channels normally are used
to carry the low priority (LP) traffic when they are not used to restore HP traffic.
In case of protection switch, HP traffic accesses protection channels causing LP traffic to be removed from
the protection channels.
Since the protection acts on all ring nodes, information are exchanged among the nodes.
For this aim ring APS protocol is used, carried on bytes K1 and K2 (add on K3 for proprietary transoceanic
application) inside MSOH.
The informations carried by the ring APS protocol are:
A node on the ring may insert HP or LP traffic into channels in either direction, drop HP or LP traffic from
either direction, or pass–through channels to allow other nodes to be connected.
Alcatel implementation foresees rings made up by more than 16 nodes (64 maximum).
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED 01 SC.3: NPE
188
not permitted without written authorization from Alcatel.
All rights reserved. Passing on and copying of this
document, use and communication of its contents
ÉÉ
ÉÉ ÀÀ
Node 1
ÀÀ HP Traffic
ÉÉ
ÉÉ À
Node 2
À
ÉÉ
ÉÉ ÀÀ ÉÉ À
ÍÍ
ÍÍ
ÀÀ
ÁÁ
ÁÁ
ÉÉ
ÍÍ
ÍÍ
À
Á
Á
ÍÍ
ÍÍ ÁÁ
ÁÁ LP Traffic ÍÍ
ÍÍ Á
Á
ÁÁ
ÁÁ ÍÍ
ÍÍ LP Traffic ÁÁ
ÁÁ Í
Í
ÁÁ ÍÍ ÁÁ Í
ÀÀ
ÀÀ ÉÉ
ÉÉ ÀÀ
ÀÀ É
É
ÀÀ ÉÉ
Node 3
HP Traffic ÀÀ É
Node 4
É
É ÍÍ
ÍÍ À
À Á
Á
É Agg East Main ÍÍAgg East Spare À Agg West Main Á
ED 01 SC.3: NPE
188
1.4.2 Why Transoceanic MS–SPRing
Transoceanic MS–SPRing is a different type of MS_SPRing protocol in order to avoid triple ocean cross-
ing. The following figures show an example of failure management in a transoceanic link, comparing
not permitted without written authorization from Alcatel.
MS–SPRing ring
Chicago–London link
ED 01 SC.3: NPE
188
not permitted without written authorization from Alcatel.
All rights reserved. Passing on and copying of this
document, use and communication of its contents
MS_SPRing ring
Chicago–London link
ED 01 SC.3: NPE
188
not permitted without written authorization from Alcatel.
All rights reserved. Passing on and copying of this
document, use and communication of its contents
MS_SPRing ring
Chicago–London link
ED 01 SC.3: NPE
188
1.4.3 Acronyms and abbreviations
2F 2 Fibres
CT Craft Terminal
EC Equipment Controller
HW Hardware
NE Network Element
OS Operating System
SD Signal Degrade
ED 01 SC.3: NPE
188
All rights reserved. Passing on and copying of this
document, use and communication of its contents
not permitted without written authorization from Alcatel.
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED
SF
SM
SW
STM
SOH
WTR
01
957.130.872 H
Software
SC.3: NPE
Signal Failure
Section Overhead
188
3AL 61259 AA AA
15 / 188
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED
01
957.130.872 H
SC.3: NPE
188
3AL 61259 AA AA
16 / 188
All rights reserved. Passing on and copying of this
document, use and communication of its contents
not permitted without written authorization from Alcatel.
TSD ITALIA
2.1 Introduction
not permitted without written authorization from Alcatel.
All rights reserved. Passing on and copying of this
document, use and communication of its contents
Transoceanic ring nodes have different behaviour in MS_SPRing protocol respect to non–Transoceanic
application.
Transoceanic 4F MS–SPRing is able to protect HP traffic carried over the working fibres transmitting in
opposite directions.
2.1.1.1 node failures (equipment failure, natural accidents, power loss, software bugs,
procedural incorrectness).
For each type of failures the adjacent node detects one of the following alarms:
a ) LOS
b ) LOF
c ) MS–AIS
d ) MS–EXBER
e ) SD
Alarms from a) to d) are classified as ”Signal Failure” (SF); alarm e) is classified as ”Signal Degrade”
(SD).
SF alarms have higher priority than SD alarm. SF condition reflects traffic affected by defect, while SD
condition reflects traffic with signal degradations due to bit errors.
In 4F MS–SPRing these alarms can be collected from working and protection line separately or the same
time according to failure type.
A fault condition present only on the working link determines a span protection: HP traffic is restored by
switching to the protection channels of the same span.
A fault condition present on both working and protection links determines a ring protection: the HP traffic
travelling the failed span is restored by switching it to the protection channels travelling in the opposite
direction (away from the failure).
ED 01 SC.3: NPE
188
TSD ITALIA
The activated protection mechanism results from the combination of the following conditions:
– SF span protection
• only working link failed on the span;
– SD span protection
In the cases of only protection link failed or only protection link degraded on a span no protection
mechanism is activated and LP traffic carried by the span is lost.
When SF or SD condition disappear, HP traffic is restored on the working channels and the preceding
preempted LP traffic is restored on the protection channels.
WTR time is used to prevent frequent oscillations between protection and working channels due to
intermittent fault.
APS switching sequences follow ITU Rec. G.841 for 4F MS_SPRing protocol for transoceanic
application. (Annex A)
When a node determines that a switch is required (detected alarm or command from OS/CT), it originates
the appropriate bridge request via K bytes in both directions: short path and long path.
The destination request are the adjacent nodes.
In case of unidirectional failure, signalling on the short path permits faster switch execution because
across the failed span the node will typically receive the short path bridge request much sooner than the
long path bridge request.
When a not destination node (intermediate node) receives a bridge request, it goes to Pass–Through state
transmitting the same received K bytes on the other direction. In this way source and destination nodes
can mantain direct K byte communication on the long path.
In case of bidirectional failure, such as a cable cut, the destination node will have detected the similar
failure itself. It then generates a bridge request in the opposite direction around the ring.
In case of SF protection the protocol foresees that on a node these operations may be performed together;
in case of SD protection these operations are always distinct.
ED 01 SC.3: NPE
188
TSD ITALIA
Span switching consists in using the protection fibres of a span to carry the working channels when failures
affect only the working fibres.
not permitted without written authorization from Alcatel.
All rights reserved. Passing on and copying of this
document, use and communication of its contents
An example of span switching is shown in the figure below. In span protection the operation is similar to
1:1 protected linear system: traffic is switched in both transmit and receive direction.
For every connection through the failed span, bridge operation on transmission side are executed before
switch operation on receiving side.
The corresponding LP connections crossing the span are preeempted. LP preemption consists in a
squelching operation, by inserting AU–AIS on protection paths. If the LP channel coming from the failed
span is dropped by the node, AIS is forced to the tributary side; if LP channel is passed–through by the
node, AIS is forced on the opposite aggregate side of the node.
ÍÍ
ÍÍ ÁÁ ÍÍ ÁÁ
ÁÁ
ÁÁ
ÁÁ
ÍÍ
ÍÍ
ÍÍ
ÁÁ
ÁÁ
ÁÁ
ÍÍ
ÍÍ
ÍÍ
ÍÍ ÁÁ ÍÍ ÁÁ
ÁÁ
ÁÁ
ÁÁ
ÍÍ
ÍÍ
ÍÍ
ÁÁ
ÁÁ
ÁÁ
ÍÍ
ÍÍ
Node 1 Node 2
Node 4 Node 3
ÍÍ
ÍÍ ÁÁ ÍÍ ÁÁ
ÁÁ
ÁÁ
ÁÁ
ÍÍ
ÍÍ
ÍÍ
ÁÁ
ÁÁ
ÁÁ
ÍÍ
ÍÍ
ÍÍ
ÍÍ ÁÁ ÍÍ ÁÁ
ÁÁ
ÁÁ
ÁÁ
ÍÍ
ÍÍ
ÍÍ
ÁÁ
ÁÁ
ÁÁ
ÍÍ
ÍÍ
ÍÍ
ÍÍ
ÁÁ
Tx block Working channel
The remaining portion of the protection channels is available for other span protection switches. Since
multiple span switches can coexist on the ring, it is preferable to execute span protection when possible.
ED 01 SC.3: NPE
188
TSD ITALIA
In case of unidirectional failure also the other protection fibre of the same span is used to carry the high
priority traffic on the other direction.
In Transoceanic application the span protection does not involve all channels, but it is performed on a
The sequences of the protection algorythm are the same used for the terrestrial rings.
a) a node (or both nodes if the failure is bidirectional) detects SF or SD condition only from working
fibre.
It enters in Switching state performing the following actions:
• send span bridge request in both directions (SF–S code or SD–S code);
• AIS forcing on all the time slots received from the working failed fibre (only for SF condition);
• individuation of the protection channels to preempt to restore HP traffic.
• AIS forcing on the received low priority traffic channels to preempt (dropped or transmitted in
the opposite direction respect the failure).
b) the other node interfacing the failed span receives a bridge request on the short path from its adjacent
node.
It enters in Switching state performing the following actions:
– If the failure is unidirectional
• send span bridge request on the long path and a Reverse Request with bridge status on the
short path;
• individuation of the protection channels to preempt in order to restore HP traffic.
• AIS forcing on the received LP traffic channels to preempt (dropped or transmitted in the
opposite direction);
– Either in unidirectional and bidirectional case
• span bridge (the node bridges only the working channels carrried on the failed span).
c) the node interfacing the failed span, upon reception of the bridge acknowledgement on the short path
from adjacent node, executes:
• span bridge (if even it is not executed);
• span switch (the node switches only the protection channels carrying the restored high priority
traffic);
• signal bridge & switch status on K bytes.
d) the other node, upon reception of the bridge & switch acknowledgement on the short path from
adjacent node, executes:
• span switch (the node switches only the protection channels carrying the restored high priority
traffic);
• signal bridge & switch status on K bytes.
e) all the other ring intermediate nodes, on the reception of the first long path bridge request received
from one of the node interfacing the failed span, enter in k–byte Pass–Through state.
In this state the node only transmits the k bytes received from the opposite side and does not perform
any action on the own working and protection channels.
1AA 00014 0004 (9007) A4 – ALICE 04.10
So all these nodes know the presence of a span switching, even if they are not directly involved.
ED 01 SC.3: NPE
188
TSD ITALIA
In the unidirectional case the node which detected the failure condition receives a Reverse Request on
the short path; in bidirectional case both nodes which detected the failure receive a bridge request with
not permitted without written authorization from Alcatel.
RDI status.
All rights reserved. Passing on and copying of this
document, use and communication of its contents
a) the adjacent node, upon reception of the WTR bridge request on the short path:
• sends out Reverse Request on the short path and WTR on the long path.
b) when WTR interval expires, the node performs the following actions:
• drop span switch restoring the high priority traffic received on working channels (AIS on these
flows is nomore present);
• send No Request code on both directions.
c) the adjacent node, upon reception of the No Request code on the short path, performs the following
actions:
• drop span switch restoring the high priority traffic on the other direction;
• drop bridge switch (reconnecting on the released protection channels the low priority channels);
• sources the Idle status.
d) the initial failed node, upon reception of the Idle status on the short path, performs:
• drop its bridge switch (reconnecting on the released protection channels the low priority
channels);
• sources the Idle status.
e) Both nodes, upon reception of the Idle status on the short path, perform:
• AIS removing on the preempted low priority channels (both drop and pass–through sides). Now
1AA 00014 0004 (9007) A4 – ALICE 04.10
f) All the other nodes, upon reception of the Idle code from both sides, return in the Idle state.
ED 01 SC.3: NPE
188
TSD ITALIA
Nodes belonging to a Transoceanic ring have a different behaviour respect to a non–Transoceanic ring.
4 5 6
HP traffic
LP traffic
ED 01 SC.3: NPE
188
TSD ITALIA
Ring switching consists in replacing the failed span with the protection fibres of all the other nodes of the
ring away from the failure.
not permitted without written authorization from Alcatel.
Since the protection channels along each span (except the failed span) are used for recovery, the
All rights reserved. Passing on and copying of this
document, use and communication of its contents
Figure which follows shows a ring protection switching involved in a non–Transoceanic ring.
1 2 3
4 5 6
HP traffic
LP traffic
During a ring switch, the node adjacent the failure bridges the high priority traffic that were entering on the
failed span onto the protection fibre transmitting in the opposite direction (loopback action). This bridged
traffic travels the long way around the ring on the protection fibres to the other node interfacing the failure.
Here it is switched back onto the working channels (loopback action) rebulding in this way the interrupted
path from the source node to the destination node.
In the other direction the high priority traffic is bridged and switched in the same manner.
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED 01 SC.3: NPE
188
TSD ITALIA
Ring switching consists in rerouting all affected paths in the opposite direction toward the destination
nodes.
The following figure shows a ring protection switching involved in a Transoceanic ring.
1 2 3
4 5 6
HP traffic
LP traffic
This protection mechanism allows to mantain part of the low priority traffic when a fault occurs (differently
from normal MS–SPRing protocol). During ring switching HP and LP traffic on the ring is analyzed and,
according to the fault localization, some LP traffic must be cancelled to restore the affected HP traffic, but
the remaining part of it can be mantained.
The intermediate nodes are involved in switching operations as the nodes interfacing the failure.
The main differences between the two ring protection mechanisms can be so described:
– in transoceanic application only the protection channels carrying the working channels affected by
the failure are managed; in non–transoceanic application all span protection channels are managed.
1AA 00014 0004 (9007) A4 – ALICE 04.10
– in transoceanic application also intermediate nodes are involved in bridge and switch operations.
ED 01 SC.3: NPE
188
TSD ITALIA
The next figures show how the connections are managed in a Transoceanic ring.
not permitted without written authorization from Alcatel.
All rights reserved. Passing on and copying of this
document, use and communication of its contents
1 2 3
4 5 6
ED 01 SC.3: NPE
188
TSD ITALIA
After the fault event between Node 6 and Node 3, the LP3 Connection is lost (the AU–4 is used to carry
the HP Traffic), the LP1 Connection is lost however for the failure, but instead the LP2 Connection is not
lost.
4 5 6
ED 01 SC.3: NPE
188
TSD ITALIA
According to ITU–T Recommendation, the ring switching/restoring algorithm provides the restore of the
preempted extra traffic on the protection channels not used to restore the normal traffic. LP traffic
not permitted without written authorization from Alcatel.
Alcatel transoceanic ring performances surpass ITU requirements, since in presence of failure a
significant part of the LP traffic neither is lost nor interrupted.
These LP paths are left in the own time slots and no action is done on them.
Then there is no need for a subsequent LP traffic restoration functionality.
Ring switching needs that every node of the ring (the adjacent at the failure and the intermediate ones)
knows if its HP and LP inserted/dropped traffic is affected by the failure. HP and LP traffic maps must be
provisioned on all the ring nodes.
For HP traffic the algorithm individuates if the path is affected by failure and then must be restored on
protection channels; for LP traffic the algorithm individuates if the path must be interrupted to restore the
corresponding HP path.
To operate correctly ring switching and restoring mechanisms need a set of operations (bridge, switch,
AIS forcing) executed on more ring nodes in a synchronized way to avoid temporary misconnection on
HP and LP connections.
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED 01 SC.3: NPE
188
TSD ITALIA
Ring switching of a HP path in transoceanic application consists in dynamically building a new path on a
portion of the ring using the corrispondent time slot of the protection channels. This is done without causing
The basic mechanism of ring protection involves the ring nodes in two sequencially distinct phases:
– first phase: building of HP path on protection channels and preemption of affected LP paths
– second phase: restoring of HP path.
To ensure correct mechanism a node may execute the operations associated to second phase only after
all ring nodes have completed the operations of the first phase.
– first phase:
1 ) on the HP path AIS insertion also in the protection time slot.
So if the involved time slot carries a LP path, AIS is detected and the path is preempted.
2 ) on the intermediate nodes of the new HP path execution of pass–through connections.
3 ) on the drop termination node of all LP paths to preempt, execution of squelching operation (AIS
forcing to tributary channel).
– second phase:
After that all the drop termination nodes of the preempted LP paths have inserted AIS it is possible
to use the protection time slots for carrying the HP path.
4 ) on the HP path insertion node execution of bridge operation and then remove of previously
inserted AIS.
If in the drop node switch operation was already executed, the HP path is restored.
5 ) in the HP path drop node execution of the switch operation.
If on the correspondent insertion node bridge operation was not yet executed the connection
will receive AIS forced by the insertion node itself. When also bridge operation is performed,the
HP path is restored.
Pass–through operation executed in intermediate nodes may occur before AIS forcing action performed
on insertion node or squelching on drop node. Thus a pass–through operation may inter–connect two LP
paths without presence of AIS on the flow causing temporary misconnection on a LP path.
To avoid misconnection pass–through operation on intermediate nodes are preceded by an AIS forcing
action on transmission side.
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED 01 SC.3: NPE
188
TSD ITALIA
Ring restoring of a HP path in transoceanic application consists in the reconnection of the provisioned HP
path and re–building plus restoring of previous preempted LP paths. This must be done without causing
not permitted without written authorization from Alcatel.
The basic mechanism of ring restoring involves the ring nodes in three sequencially distinct phases:
– first phase: connection of HP path on working channels;
– second phase: deletion of HP path on protection channels and rebuilding of provisioned LP paths
– third phase: restoring of LP paths.
The operations belonging to a phase can be tied to a timer whose duration must be sufficient to guarantee
that signalling arrives to all ring nodes.
The operations performed are:
– first phase:
• on HP path drop node execution of drop switch operation reusing the provisioned HP path
received on working channels.
HP path is reconstituted. Restored HP path is disconnected and the protection channels can
be reused to carry LP paths.
– second phase:
• on HP path insertion node execution of drop bridge operation and on the intermediate nodes
of drop pass–through operation.
In both cases the operation consists into reconnecting on protection channels the provisioned
LP connection on the node (insertion, pass–through or not equipped). Provisioned LP paths
are re–built from insertion until drop nodes.
– third phase:
• on LP paths drop node removing of squelching action (AIS unforced on tributary side).
Now LP paths are completely restored.
drop nodes. To allow the flowing of provisioned LP paths AIS must be eliminated.
• on the LP paths drop node removing of squelching action (AIS unforced on tributary side).
Now LP paths are completely restored.
ED 01 SC.3: NPE
188
TSD ITALIA
The ring may be affected by multiple failures with different characteristics: more span failures, more ring
failures, span failure plus ring failure.
Span switching mechanism involves the protection channels of the affected span only. For this reason
it is possible to execute span switching in every span affected by a failure.
In presence of multiple span failures the ring is involved in multiple span switching to restore all HP paths
travelling on the ring.
In Transoceanic application ring protection mechanism occupies only a portion of the protection bandwidth
of the ring spans.
In presence of more span failures and a ring failure a generic HP path may be in one of the following
situations:
In case 1) the execution of ring switching will determine the restoring of the lost HP connections (the
restored HP path on protection channels will cross all the other span failures present of the ring that does
not interrupt the path).
In case 2) the execution of multiple span switchings on the failed spans will determine the restoring of the
lost HP connections.
In case 3) the execution of ring protection will surely determine the restoring of the lost HP connection (the
restored HP path on protection channels will cross the remaining span failures present on the ring that do
not interrupt the path).
Instead the execution of span switchings however does not guarantee that the HP path is re–established
(provisioned HP path crosses the ring failed span and then it results still interrupted).
If the aim is to restore the maximum number of HP connections on the ring between two protection
mechanism the priority should be done to ring switching instead of span switching.
In Transoceanic application in case of contemporary presence of span and ring failures the optimal
protection algorythm is:
– submit to ring switching the time slots carrying HP paths affected by ring failure
– submit to span switching the remaining time slots not involved in ring switching carrying HP paths
affected by span failures (in case of multiple span failures the involved time slots could be different
on each span according to the occupation of new restored HP path for ring switching).
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED 01 SC.3: NPE
188
TSD ITALIA
In Transoceanic application multiple ring failures does not split the ring into multiple subrings as occurs
in non–Transoceanic application, but it results segmented into a set of linear insert/drop chains separated
not permitted without written authorization from Alcatel.
by cable failures.
All rights reserved. Passing on and copying of this
document, use and communication of its contents
In a ring involved in ring protection for one or more ring failures the occurrence of another ring failure
always determines the loss of some other HP traffic: the HP paths affected by new failure that cannot be
restored because also the other way on the ring is interrupted by other failures.
To know which are the LP paths not interrupted by the failures , LP traffic maps are processed. Alcatel
implementation is as follows:
On a ring involved in ring protection for two or more ring failure, clearing of ring failure determines the
capability to re–obtain some other HP traffic: HP paths no more directly affected by the failure; HP paths
affected by the remaining failures for which the restored HP path on protection channels is available.
– restored HP paths on protection channels are mantained because the provisioned HP path is still
affected by other failures (with multiple ring failures a restored HP path implies that the provisioned
HP path crosses all present ring failures);
– provisioned HP paths no more affected by failures are re–connected without any switching operation
(previously during appearance of ring failure corrispondent provisioned HP path was restored);
– some provisioned HP paths still affected by remaining failures are restored on protection channels
(this occurs only for the paths which have restored HP path on protection channels no more
interrupted on the ring);
– provisioned LP paths no more affected by failures and not preempted for new HP restoring are
re–connected without any switching operation (previously during appearance of ring failure all the
LP paths not involved in ring switching were re–constituted).
With one or more ring failures already present in the ring another ring failure causes a partial ring restoring
operation involving the HP paths that cannot more be restored via protection channels on the other way.
With two or more ring failures present in the ring the clearing of a ring failure causes a partial ring switching
operation involving the HP paths for which the restored path on protection channels is no more interrupted.
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED 01 SC.3: NPE
188
TSD ITALIA
The presence of two (or more) ring failures on a ring causes ring segmentation on APS protocol signalling.
The nodes located between two failures on a side of the ring cannot reach the nodes located on the other
In this condition ring restoring operation during appearance of ring failure and ring switching operation
during clearing of ring failure can be executed only on a portion of the nodes.
Ring switching and restoring operations generally involve all ring nodes. First nodes crossed by the
restored HP path that execute bridge, switch, pass–through, AIS insertion actions during ring switching
and homologous dropped actions during ring restoring. But also other nodes not carrying restored HP path
may be involved to execute the specific AIS insertion and remove tributary side actions (squelching action
to preempt or restore LP connections).
ED 01 SC.3: NPE
188
TSD ITALIA
On ring segmentation example the appearance and clearing of a ring failure between C and D nodes cause
respectively the elimination or building of restored HP paths that are all located on nodes on which protocol
signalling arrives (B, C, D, E and F nodes in the example).
But it may occur that a LP path to be restored or to be preempted has as drop point a node on the
not permitted without written authorization from Alcatel.
isolatedside of the ring (A, G and H nodes in the example). In this case squelching tributary side, remove
All rights reserved. Passing on and copying of this
document, use and communication of its contents
a) in SF unidirectional failure (multiple ring failures in SD are not allowed) force AIS on all 16 time slots
received from protection fibre also on the side not detecting failure upon reception of bridge request
on short path from adjacent node.
In this case all the LP paths travelling the failed span receive AIS and are all preempted. Thus with
ring segmentation also LP paths for which the drop points is unreachable result already preempted.
Then, the failure clears AIS on all the protection channels is removed; but now the node
that must execute squelching action can be reached and then preemption of LP path can be main
tained.
As counteraction this solution determines in unidirectional case the loss of all LP paths crossing the
failed span also in the direction not affected by the failure.
b) on the nodes interfacing ring failure insert AIS only on the protection channels transmitted toward
failed span carrying LP paths preempted to restore HP paths. This action allows to squelch LP path
to be preempted also if AIS forcing action was not possible on provisioned LP drop point. The action
is necessary only during ring switching mechanism activated in presence of ring segmentation.
The impossibility to remove AIS does not allow to restore LP path. LP path crosses one of the existing
failures and it is however lost if it travels along failed span direction.
Then when the failure interrupting LP path clears, squelching action can be removed because now the
node can communicate through protocol signalling and execute ring switching operations. Thus LP path
results correctly restored.
ED 01 SC.3: NPE
188
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED
01
957.130.872 H
SC.3: NPE
TSD ITALIA
188
3AL 61259 AA AA
34 / 188
All rights reserved. Passing on and copying of this
document, use and communication of its contents
not permitted without written authorization from Alcatel.
TSD ITALIA
3 BROADCAST CONNECTIONS
3.1 Introduction
not permitted without written authorization from Alcatel.
All rights reserved. Passing on and copying of this
document, use and communication of its contents
In the traffic map this connection is represented as a path in which a node is the insertion point and more
nodes are drop points. On some nodes the flow enters from an aggregate side; then exits from the other
aggregate side and from tributary side. The node needs the contemporary provisioning of a time slot in
pass–through and drop connections.
The figure below shows an example of broadcast connection carried by 4F ring on working channels. The
signal is transmitted by node 5 and received by nodes 1,2,3.
1 2 3
4 5 6
HP traffic
LP traffic
Broadcast connection
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED 01 SC.3: NPE
188
TSD ITALIA
4F Transoceanic MS–SPRing ring protection mechanism is used also to restore broadcast paths.
If the ring failure occurs on the span connecting source and nearest sink node, the signal does not reach
any drop point.
1 2 3
4 5 6
HP traffic
LP traffic
Broadcast connection
Protected broadcast connection
To restore the broadcast connection it is necessary to switch the flow to the other ring direction , not
affected by the failure.
The actions to perform are:
ED 01 SC.3: NPE
188
TSD ITALIA
If the ring failure occurs on a span included between two sink nodes, the signal still reaches some drop
points.
not permitted without written authorization from Alcatel.
All rights reserved. Passing on and copying of this
document, use and communication of its contents
1 2 3
4 5 6
HP traffic
LP traffic
Broadcast connection
Protected broadcast connection
ED 01 SC.3: NPE
188
TSD ITALIA
The characteristic action involves the nodes of the path on which the double connection in drop and
pass–through must be performed.
ED 01 SC.3: NPE
188
TSD ITALIA
During both span and ring protection mechanisms the node determines the time slots of the LP channels
involved in a particular action.
During ring switching each node of the ring (not only those interfacing the failure) must determine which
are the LP paths to preempt leaving free the protection time slots to re–route the HP paths.
This activity is realized by ring path restoring algorythm.
The following information are required:
– node identifier;
– ring map;
– traffic maps.
The input parameter is the fault localization.
According to the current node position the algorythm is able to determine which are the LP paths to
preempt.
The following table shows a typical traffic map for HP and LP paths. The example illustrates only the first
8 time slots of both working and protection channels.
ED 01 SC.3: NPE
188
TSD ITALIA
The following table describes the traffic map relevant to Step 1) for HP and LP paths. For the working
channels the table report the remaining connections not affected by the failure. For the protection
channels the table reports only the new HP connections.
Step 2) Determination on the local node of the transmitted and received AU4 time slots of the protection
channels to preempt.
Comparing the localization of the occupied time slots of the new connections with the provisioned LP paths
involved in the node (protection path dropped, inserted or pass–througed by the node) the algorythm
determines which are the LP channels to cancel.
The following tables reports the provisioned LP connections to preempt and the provisioned LP
1AA 00014 0004 (9007) A4 – ALICE 04.10
connections not involved in protection and then that are mantained on the ring.
ED 01 SC.3: NPE
188
TSD ITALIA
ÁÁÁÁ
NODES
ÁÁÁÁ
AU_number A B C D E F
1 Pt –––––––
2 Pt
3 Pt
4 Pt
5 Pt
6 Pt
7 Pt –––––––
8 Pt
........
........
At the end is reported the final status of the connections on working and protection channels of the ring
after a ring switching.
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED 01 SC.3: NPE
188
TSD ITALIA
Besides normal drop/insert connections the algorythm manages also broadcast connections and D&C
connections ( on transmission direction D&C path may be seen as a broadcast connection having the
termination node as source point and primary and secondary nodes as the two sink points).
For broadcast paths (and then D&C paths transmission side) it rebuilds the connection on the protection
channels of the ring with one or more nodes in bridge according to the localization of the failure.
In case of multiple failures the algorythm starts from the current traffic maps of the HP connections on
working and protection channels on the ring (originated by means of previous failure) to determine:
– the protection channels to preempt for span switching when is already present a ring failure (they may
be provisioned LP channels or channels already used for ring protection);
– the LP paths to restore when there are more ring failure conditions;
– some new HP paths to re–build (and consequent LP paths to preempt) and other LP paths to restore
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED 01 SC.3: NPE
188
TSD ITALIA
During span protection it is necessary to individuate which are the LP channels to cancel for protection
selectivity.
not permitted without written authorization from Alcatel.
All rights reserved. Passing on and copying of this
document, use and communication of its contents
The algorythm needs only to know the HP and LP connections, subdivided in transmission and receiving
direction, interfacing the failed span.
They will be subdivided partly on tributary side for AIS forcing on dropped side and partly on aggregate
side for AIS forcing on pass–through side.
The same time slots are those involved on tributary side and aggregate main opposite side for span switch
operation.
ED 01 SC.3: NPE
188
TSD ITALIA
c) Ring Map sequence of nodes (node identifier) where the ring is crossed in a specific direction
d) Ring WTR WTR time used to restore normal state after a span or ring switch
HP traffic maps data are subdivided in two distinct tables for clockwise and counter–clockwise
transmission direction.
About LP traffic map the node is interested at the paths involving only the node itself.
For clockwise and counter–clockwise transmission direction two distinct tables.
For each of the 16 time slots they report:
– source node
– destination node.
HP and LP connections are subdivided in transmit connections and receive connections and they are
provisioned for each node side.
For everyone of the 16 time slots the transmit connection reports the type (NOT USED, PASS–THROUGH,
INSERTION).
For everyone of the 16 time slots the receive connection reports the type (NOT USED, PASS–THROUGH,
DROP).
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED 01 SC.3: NPE
188
TSD ITALIA
a) Command type:
All rights reserved. Passing on and copying of this
document, use and communication of its contents
4) Lockout of protection
5) Force Span Switch
6) Force Ring Switch
7) Manual Span Switch
8) Manual Ring Switch
9) Exercise Span
10 ) Exercise Ring
11 ) Clear Command
b) Side:
1) East
2) West
OS must get informations concerning the Node status in order to provide a feedback about the ring status.
These informations are:
1) Lockout protection
2) Force Span Switch
3) Force Ring Switch
4) Manual Span Switch
5) Manual Ring Switch
6) Exercise Span
7) Exercise Ring
8) Clear Command
9) Side:
East
West
c) Switch Status: Idle, Span Bridge, Span Switch, Span Bridge and Switch, Ring Bridge, Ring Switch,
Ring Bridge and Switch
ED 01 SC.3: NPE
188
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED
01
957.130.872 H
SC.3: NPE
TSD ITALIA
188
3AL 61259 AA AA
46 / 188
All rights reserved. Passing on and copying of this
document, use and communication of its contents
not permitted without written authorization from Alcatel.
TSD ITALIA
5.1 Introduction
not permitted without written authorization from Alcatel.
All rights reserved. Passing on and copying of this
document, use and communication of its contents
D&C function stays on primary node. It consists into selecting (drop) one of two path (service circuit and
secondary circuit) available on the node and transmits it onwards on the ring (continue).
The service circuit arrives to the primary node from the tributary side, while the secondary circuit arrives
from the aggregate opposite side coming from secondary node.
The function is implemented by the Service Selector.
In the description which follow P means primary node, S secondary node, T termination node.
Figure 15. reports the behaviour of the Service Selector for all the types of involved failures.
In all these cases will always remain available one of the two circuits (service circuit or secondary circuit)
allowing the establishment of the path.
The first example illustrates the selection of the flows coming from tributary side in the following conditions:
– failure on a link included between primary and secondary node carrying the secondary circuit;
– secondary node failure;
– failure on the interconnection link between P and S nodes carrying the secondary circuit.
The second example illustrates the selection of the flows coming from aggregate opposite side in the
following conditions:
– failure on the interconnection link between P and S nodes carrying the service circuit;
– failure on a link included between primary and secondary node carrying the service circuit.
D&C functionality associated with Transoceanic MS–SPRing protection mechanism causes a completely
different interaction respect to not–Transoceanic application, particularly in consequence of the bridge
and switch operations performed by intermediate nodes.
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED 01 SC.3: NPE
188
TSD ITALIA
P S P S
S P S P
T T
ED 01 SC.3: NPE
188
TSD ITALIA
Failures occurring on spans and nodes on the side of the ring not crossed by D&C protected connection
have no interaction with D&C function.
not permitted without written authorization from Alcatel.
D&C protected path pass through the service connection ( from Primary to Secondary )
All rights reserved. Passing on and copying of this
document, use and communication of its contents
D&C function is performed by the primary node by selecting one of the two available circuits according
to the detected alarm conditions.
If the failure is localized between primary and secondary nodes the secondary circuit is not rebuilt on
protection channels on the opposite way as Transoceanic ring protection criterion should request. So the
secondary circuit is lost; the primary node selects the service circuit because the other circuit is affected
by alarm condition.
Failures affecting spans or nodes (crossed by the selected D&C path ) from primary to termination node
cause the interruption of the path. D&C connection is restored according to Transoceanic MS–SPRing
ring protection mechanism by interacting with D&C function.
D&C function together with Transoceanic MS–SPRing is able to protect the D&C path even in case of
failure of the primary node.
Failures are:
ED 01 SC.3: NPE
188
TSD ITALIA
Failures affecting D&C path from primary to termination nodes are restored by the Transoceanic
MS–SPRing protection mechanism interacting with D&C function.
The preemption of secondary circuits is signalled to avoid misconnection on D&C protected path.
This is done forcing AIS to the D&C secondary circuit on the primary node before arrival of the flow on
Service Selector.
Figure 16. illustrates the case of a D&C path selecting secondary circuit on LP channel subsequently
preempted because of span failure.
Failures are:
ÍÍ
ÍÍ HP AU4#i
ÍÍ
LP AU4#i
Node P Node S
ÍÍ
ÍÍ HP AU4#i
ÍÍ AIS
LP AU4#i
Node P Node S
HP channels
ÍÍÍ
ÍÍÍ
ÍÍÍ
D&C Selector
LP channels
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED 01 SC.3: NPE
188
TSD ITALIA
The failure cases causing particular management of the protection mechanism are:
– span failure occurring on the span adjacent primary node on Service Selector side (applicable for
not permitted without written authorization from Alcatel.
T T
P S P S
S P S P
Service Selector
Figure 17. D&C protection management: span failure on link adjacent Service Selector
For secondary circuit carried on HP channels , the secondary circuit is selected executing a
cross–connection operation because the signal comes from opposite side working line.
For secondary circuit carried on LPchannels, the secondary circuit is selected executing a pass–through
connection operation because the signal comes from opposite side protection line.
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED 01 SC.3: NPE
188
TSD ITALIA
P S P S
S P S P
The termination node receives D&C path performing ring switching of the flow from the other side.
In this case D&C function disappears; D&C path is mantained simply executing a transoceanic ring
switching operation for the connection.
Secondary and termination nodes execute ring bridge and switch actions on D&C path so that also in
transmission direction D&C path, starting on termination node and arriving on secondary node, is sent
toward the other ring crossing its primary node.
This case is managed only by Transoceanic MS–SPRing manager. The D&C path is represented on traffic
map as HP connection having secondary and termination nodes as drop/insert points.
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED 01 SC.3: NPE
188
TSD ITALIA
5.1.7 Ring failure on span included between primary and termination nodes (HP case)
Figure 19. reports the behaviour of D&C function together with Transoceanic MS–SPRing when a failure
occurs on a span or node included between primary and termination node of a D&C path.
not permitted without written authorization from Alcatel.
All rights reserved. Passing on and copying of this
document, use and communication of its contents
T T
P S P S
S P S P
Service Selector
Figure 19. D&C protection management: ring failure on link between P and T nodes (HP case)
According to Transoceanic concept the selected D&C path must be routed in the opposite way on the
corresponding protection channel.
The primary node still performs the Service Selector function, but moved to the other side of the node.
The selection is always between the service circuit coming from tributary side and the secondary circuit
coming from secondary node on aggregate side. The selected flow is transmitted back to the
corresponding protection channel toward the secondary node.
Then during the persistence of the failure the node operation is:
– when occurs an alarm condition on one of the two available circuits, the D&C function of the opposite
side performs the selection connecting one of the flows to the protection channel used to restore the
HP D&C path.
When the flow coming from aggregate side must be connected, the node must perform a loopback
operation from working to protection channel. ( not common in Transoceanic application)
This choice realizes that a flow travels twice the link between P and S nodes (a first time from S to P and
1AA 00014 0004 (9007) A4 – ALICE 04.10
then from P to S) and seems not in accordance with Transoceanic concept. But it is also true that primary
and secondary nodes of a D&C protected path usually are not positioned as nodes adjacent to an oceanic
link.
ED 01 SC.3: NPE
188
TSD ITALIA
5.1.8 Ring failure on span included between primary and termination nodes (LP case)
The following figure reports the behaviour of D&C function together Transoceanic MS–SPRing when
occurs a failure on a span or node included between primary and termination node of a D&C path.
P S P S
S P S P
Figure 20. D&C protection management: ring failure on link between P and T nodes (LP case)
Differently from secondary circuit on HP channels in this case it is not possible to re–route toward opposite
way D&C path on primary node after selection because the corresponding LP channel is used to transmit
the secondary circuit on the other direction.
D&C selection capability is lost; the unique possibility is to the route secondary circuit to the termination
node crossing other direction of the ring. This is done using the same protection channels and executing
bridge operation on secondary node and switch operation on termination node.
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED 01 SC.3: NPE
188
6 D&C INTERCONNECTION DATA
6.1 Introduction
not permitted without written authorization from Alcatel.
All rights reserved. Passing on and copying of this
document, use and communication of its contents
This chapter contains the description of D & C for 2–fibre and 4–fibre arrangement.
• used or not used in D&C protection (and if used the type of secondary circuit: HP or
LP);
• connection side (local or opposite): the provisioned D&C connections for which the
selector is located on the same side are local; the provisioned D&C connections for
which the selector is located on the other side of the equipment are opposite;
• preferential circuit: the selection to perform when both circuits are not affected by
failure (insertion from tributary or pass–through from aggregate).
c) Revertive for every AU4 D&C protected if the protection is revertive or not;
d) WTR for every AU4 D&C protected in revertive way the WTR time to expire after which
the preferential circuit is restored.
Other data involved in the function are the provisioned connections on aggregate and tributary cards.
A D&C protected connection with service and secondary circuits is described by general traffic maps used
for ring protection.
On transmission direction D&C path is originated on termination node, configured in bridge on primary
node and in drop on secondary node.
On receiving direction a service circuit is inserted on primary node and a secondary circuit is inserted on
secondary node. Then only one of them reaches the termination node.
With the aim of rebuilding the connection during ring switching a D&C flow may be considered in the
following way:
– on Rx side as a normal path inserted on primary node and dropped to the termination node
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED 01 SC.3: NPE
188
6.1.3 Commands data
a) Command type:
1) Manual Switch
2) Forced Switch
3) Clear Switch
1) Manual Switch
2) Forced Switch
3) Clear Switch
ED 01 SC.3: NPE
188
6.1.5 Data bus for TRANSOCEANIC MS–SPRING/D&C IN 1664SM SYSTEM
This is the alarm byte sent by an aggregate card (main or spare) toward Transoceanic MS–SPRing
All rights reserved. Passing on and copying of this
document, use and communication of its contents
manager.
The least significant bits (bit 0 and 1) are used only by aggregate spare cards in which is resident the
manager to synchronize the operation of the two managers. In this case the byte is transmitted by an
Aggregate Spare and received by the other Aggregate Spare.
Each Aggregate Spare transmits the status of its manager (master or slave) at regular interval time.
6.1.5.2 K1 byte
Byte K1 is transmitted within multiplex section overhead carrying the protection channels.
Bits 1–4 carry bridge request codes, bits 5–8 carry the destination node identifier (least significant part).
The meanings are defined and reported on Recommendation G.841.
Table 8. K1 byte
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED 01 SC.3: NPE
188
6.1.5.3 K2 byte
Byte K2 is transmitted within multiplex section overhead carrying the protection channels.
Table 9. K2 byte
Alcatel Transoceanic MS–SPRing manages up to 64 nodes. Another byte of the multiplex section
overhead (called K0) is used, to identify source and destination nodes.
This byte is also used to communicate the information regarding the status of the Manager (active or
standby) to the Transoceanic Actuators. Then the byte is transmitted by two Aggregate Spare and
received by two Aggregate Main and all Tributary cards.
ED 01 SC.3: NPE
188
6.1.5.5 Commands
Commands byte may be distinct in two parts: command for span protection and command for ring
protection.
not permitted without written authorization from Alcatel.
All rights reserved. Passing on and copying of this
document, use and communication of its contents
The most significant bit (bit 7) of the Commands establishes if the commanded actions refer to span
switching or ring switching procedure.
Bit 6 and bit 7 of the Commands to value 0 establishes that the command byte has no action to drive.
Commands for ring protection is organized in macro–commands: a single command bit signals the
execution of a group of operations that can be performed together at the same time.
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED 01 SC.3: NPE
188
The commands are six plus an option. At each macro–command corresponds the following operations:
– FIRST STEP SWITCHING : AIS DROP, AIS TRASMISSION, PASS–THROUGH
– SECOND STEP SWITCHING : BRIDGE, DROP AIS TRASMISSION
– SWITCH: SWITCH
Multiple protection mechanisms (ring + span, span + ring, ring + ring) will cause the alternation of
Commands byte 1 and Commands byte 2.
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED 01 SC.3: NPE
188
6.1.5.6 Fault localization
The position of a failure in the ring (span between two nodes) may be signalled via the node identifier of
only one of the two nodes and the side (west or east) .
not permitted without written authorization from Alcatel.
All rights reserved. Passing on and copying of this
document, use and communication of its contents
– WEST side
– node identifier of the node adjacent the failed span on the west side.
– No failure indication
– same node identifier.
– 00 : RESET
– 01 : WEST
– 10 : EAST
– 11 : NO_FAIL
RESET value identifies the initial situation without failures on the ring; WEST (or EAST) value associated
to a node identifier reports the presence of ring failure; NO_FAIL value associated to the same node
identifier reports the clearing of the previous corresponding ring failure.
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED 01 SC.3: NPE
188
6.1.6 Alarm Management Function
When an alarm coming from a main card interfacing the working fibre is detected, a timeout is started to
detect a potential alarm from the spare card of the same side. So the manager is able to declare span
failure or ring failure condition.
For Transoceanic D&C management this function provides Signal Fail or Signal Degrade detention of the
AU4 time slots involved in D&C protection coming from the two available path (from tribuatary side and
from aggregate opposite side).
The SF and SD condition of the AU4 received from tributary side is detected by the tributary card.
The SF and SD condition of the AU4 received from aggregate opposite side is detected by the aggregate
card.
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED 01 SC.3: NPE
188
6.1.7 Operations executed by NPE actuator
– AIS FORGING DROP side (for both span and ring protection)
All rights reserved. Passing on and copying of this
document, use and communication of its contents
– AIS FORGING TRANSMISSION side (for both span and ring protection)
– AIS CROSS–CONNECTION side (interaction between Transoceanic and D&C functions)
– AIS PASS–THROUGH side (interaction between Transoceanic and D&C functions)
– SPAN BRIDGE (West or East)
– SPAN SWITCH (West or East)
– RING PASS–THROUGH
– RING BRIDGE
– RING SWITCH
The action is performed by the Aggregate card (Main and/or Spare) receiving the signal when an alarm
is detected causing a signal failure condition.
The action is done internally without need of command by Transoceanic MS–SPRing manager forcing
AU–AIS on all 16 AU4 flows.
AIS indication crosses both drop tributary flows and pass–through flows.
This action is executed during both span and ring protection mechanisms.
The action is performed by the Aggregate Spare card acting only on the flows sent toward tributary cards
In span protection the action regards only the spare card of the side interfacing the failure; in ring protection
the action may regard both spare cards(West/East)
This action is executed during both span and ring protection mechanisms.
In span protection the action concerns only the spare card of the side opposite to the one interfacing the
failure to signal AIS on the LP channels travelling toward the other nodes that are preempted to restore
HP channels.
In ring protection the action may regard one of the two spare cards of the equipment: the card of the side
acting as insertion point of a HP connection to restore.
This action allows to have AIS on the LP connections to preempt during the instauration of the new HP
path avoiding misconnection before, AIS forging on drop termination nodes (drop side)
The action is temporary; as soon as the new HP path is completed AIS forcing is removed to allow the
flow signal between insert and drop points of the connection.
With multiple ring failures ring switching and restoring mechanisms provide the insertion of temporary AIS
on transmission side on all nodes carrying the new HP paths on protection channels (during ring switching)
or involved in restore of previously preempted LP paths (during ring restoring).
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED 01 SC.3: NPE
188
6.1.7.4 AIS Forcing on LP channels sent toward Aggregate Main (AIS Cross–Connection Side)
This action is executed during both span and ring protection mechanisms interacting on protected D&C
paths that have secondary circuit carried on LP channels.
During span and ring protection, for every protected D&C path on the node, the action regards only the
spare card of the side opposite to the one hosting provisioned D&C selector.
The operation allows to squelch secondary circuit going toward D&C selector when this is preempted to
restore HP paths travelling on the same corrisponding working channels.
6.1.7.5 AIS Forcing on LP channels received from Aggregate Spare (AIS Pass–Through Side)
This action is executed in presence of double span protection mechanism interacting with protected D&C
paths that have secondary circuit carried on LP channels.
During second span switching mechanism, for every protected D&C path on the node, the action regards
only the spare card of the same side hosting provisioned D&C selector.
The operation allows to squelch secondary circuit coming from opposite side aggregate spare before that
arrives on active D&C selector moved on the card itself. This is done when secondary circuits are
preempted to restore HP paths travelling on the same corrispondent working channels on adjacent span.
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED 01 SC.3: NPE
188
TSD ITALIA
7.1 Introduction
not permitted without written authorization from Alcatel.
All rights reserved. Passing on and copying of this
document, use and communication of its contents
Since the no. of nodes of the ring are greater than 16, source and destination node identifier codes on K1
and K2 bytes are not sufficient; another byte (kobyte) must be used.
It is to be noted that K1 and K2 bytes must carry also MS–AIS and MS–RDI indications.
Besides, the ring could be constituted by node apparatus of different vendors and the extension to 64
nodes (16x4) is a proprietary need in consequence of the use of a NPE station.
The NPE station may be composed by a 1664SM equipment cascade (up to 4).
A single equipment is identified through a couple of numbers (Es.: 15.3). The first number is coded as
source and destination identifiers on assigned bits of K1 and K2 bytes; the second number is coded on
K0 byte.
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED 01 SC.3: NPE
188
TSD ITALIA
In the following figures are reported the steps of an unidirectional SF span protection switching.
The example reports the connections of two nodes of the ring that will be involved in span protection.
A B
– AIS forcing on 5,7 passed–through LP channels to preempt transmitted on the opposite side.
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED 01 SC.3: NPE
188
TSD ITALIA
A B 1,2,4,5,6,7
ED 01 SC.3: NPE
188
TSD ITALIA
Step 4) A span bridge & switch acknowledgement on the short path arrives on node A.
Figure 25. Span bridge & switch acknowledgement short path on node A
ED 01 SC.3: NPE
188
TSD ITALIA
In the following figures are reported the steps of an unidirectional SF span protection restoring starting
from the final conditions of the previous example.
not permitted without written authorization from Alcatel.
All rights reserved. Passing on and copying of this
document, use and communication of its contents
ED 01 SC.3: NPE
188
TSD ITALIA
ED 01 SC.3: NPE
188
TSD ITALIA
– drop span switch on 3,6,7 dropped and 1,4,5 passed–through HP channels restoring the HP
connections;
not permitted without written authorization from Alcatel.
All rights reserved. Passing on and copying of this
document, use and communication of its contents
– drop span bridge on 3,6,7 inserted and 1,4,5 passed–through HP channels reconnecting the inserted
and pass–throghed LP channels;
– drop span bridge on 1,4,6 inserted and 3,5,7 passed–through HP channels reconnecting the inserted
(3,6 time slots) and pass–throghed (5,7 time slots) LP channels;
ED 01 SC.3: NPE
188
TSD ITALIA
1,2,3,5,6,8 2,3,5,8
A 2,3,5,6,7,8 B 2,5,7 1,2,4,5,6,7
ED 01 SC.3: NPE
188
TSD ITALIA
In Transoceanic 4F MS–SPRing multiple span failures have as counteraction multiple span switching
executed on different spans.
not permitted without written authorization from Alcatel.
All rights reserved. Passing on and copying of this
document, use and communication of its contents
A singular case is represented by multiple span failures occurring on adjacent spans. In this case a node
is involved in span protection on both sides of the equipment.
The following figures shows an example: a previous span failure occurred between B and C nodes has
caused a span switching to restore HP paths travelling on failed span.
Subsequently a bidirectional span failure occurs between A and B nodes.
1,4,5 3,5,7
1,4,6,7, 5 1,6, 5 A 1,2,6,8, 3,5 B C
1,2,4,5,6,7
2,3,5,8 1,2,3,4,5,6,7,8 2
For the second span failure 1,5,8 LP paths must be preempted. On node B LP path1 is dropped and LP
paths 5,8 are passed–through. Span switching processing foresees AIS forcing action on these time slots.
About passed–through flows time slot 5 is already involved in previous span switching and the insertion
of AIS on this flow should cause loss of the restored HP path.
Then AIS forcing action on transmitted LP channels must be executed only on the provisioned LP in
pass–through connection not already involved in previous span failure.
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED 01 SC.3: NPE
188
TSD ITALIA
Node A performs:
1,4,5 3,5,7
4,6,7, 1,5 1,6, 5 A 1,2,6,8, 3,5 B 1,2,3,4,5,6,7,8
C
1,2,4,5,6,7
2,3,5,8 2
For the second span failure span switching processing foresees bridge action on 1,4,5,7,8 HP time slots:
7,8 in insertion and 1,4,5 in pass–through connection on node B. This operation is normally performed
by the card interfacing the protection fibre connecting the inserted flows from tributary and the
passed–through flows from the aggregate working opposite side.
On node B for the presence of adjacent span failure the passed–through flows must be taken from
aggregate protection opposite side.
Only on node B, after soon bridge operation, AIS forcing action on transmitted LP channels executed for
the first span failure must be dropped on the time slots that results to be preempted also for the second
span failure (among the bridged one time slots both in insertion and pass–through connection).
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED 01 SC.3: NPE
188
TSD ITALIA
Node A performs:
– bridge on 1,4,7 inserted HP channels and 5,8 passed–through HP channels from working opposite
side fibre.
not permitted without written authorization from Alcatel.
All rights reserved. Passing on and copying of this
document, use and communication of its contents
– bridge on 7,8 inserted HP channels and 1,4,5 pass–through HP channels from protection opposite
side fibre;
– AIS removing on 5 pass–through LP channel already preempted for the first span failure.
1,4,5 3,5,7
A B C
4,6,7, 1,5 1,5,6 1,2,4,5,6,7,8, 3 2,3,1,4,5 1,2,3,4,5,6,7,8 1,2,4,5,6,7
2
For the second failure switching processing foresees switch action on 1,4,5,7,8 HP time slots.
This operation is normally performed by the card interfacing the working fibre for the passed–through flows
and by the tributary card for the dropped flows.
On node B because of adjacent span failure, pass–through flows must be switched by aggregate
protection instead of aggregate working.
Add on aggregate working, normally executing this operation in single failure case, executes also in this
situation switch action. The operation seems useless, but it may be important when occurs clearing of
adjacent span failure. In this situation consequent drop switch action allows the immediate
re–establishment of the HP paths travelling from the remaining failed span toward the reconstituted span.
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED 01 SC.3: NPE
188
TSD ITALIA
– switch on 1,4,5 pass–throughed HP channels executed by protection opposite side card taking them
from opposite protection fibre;
– switch on 1,4,5 pass–throughed HP channels executed by working opposite side card taking them
from opposite protection fibre.
ED 01 SC.3: NPE
188
TSD ITALIA
A singular case is represented by clearing of span failure in one of the adjacent spans involved in multiple
span switching.
not permitted without written authorization from Alcatel.
In this case a node was involved in span protection on both sides of the equipment.
All rights reserved. Passing on and copying of this
document, use and communication of its contents
In the following figures are reported the steps of a span protection restoring starting from the final
conditions of the previous example. The reconstituted span is between B and C nodes.
– drop span switch on 1,4,6 dropped and 3,5,7 pass–through HP channels restoring the HP
connections.
Since previous span switching operation executed by working card on node B the pass–throughed
HP flows 1,4,5 will be transferred toward node C without AIS and then result correctly received.
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED 01 SC.3: NPE
188
TSD ITALIA
ED 01 SC.3: NPE
188
TSD ITALIA
Span restoring processing foresees drop span switch and bridge operation on node B. These operations
are analyzed in two steps: the first explains drop switch action and the second explains the drop bridge
action.
not permitted without written authorization from Alcatel.
Drop switch action is performed on 3,6,7 dropped time slots and on 1,4,5 pass–through time slots.
All rights reserved. Passing on and copying of this
document, use and communication of its contents
The operation involves tributary cards for dropped channels and both working and protection aggregate
cards for pass–through channels.
On working card the action is similar at single failure case and consists in selecting the pass–through flows
from working fibre of the opposite side and no more from protection fibre opposite side executing a direct
connection.
On protection card the action consists in selecting the pass–through flows from working fibre opposite side
and no more from protection fibre opposite side executing a cross–connection.
Drop bridge action involves 3,6,7 inserted time slots and 1,4,5 pass–throughed time slots.
The operation includes protection aggregate card: the action consists into disconnecting the HP paths and
reconnecting the provisioned LP paths (similar as single span restoring).
About LP pass–through flows reconnection it is necessary to force AIS on the flows that are involved in
remaining span failure before the execution of the provisioned LP connections to avoid misconnection
(these flows are involved in HP restoring and then do not carry LP traffic).
Among 2,3,5,8 LP pass–through flows 5,8 time slots are involved in remaining span protection (it is to be
noted that time slot already has AIS forcing).
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED 01 SC.3: NPE
188
TSD ITALIA
– drop span switch on 3,6,7 dropped time slots executed by tributary cards;
– drop span switch on 1,4,5 pass–through HP channels executed by both aggregate working and
– drop span bridge on 1,4,6 inserted and 3,5,7 pass–throughed HP channels reconnecting the inserted
(3,6 time slots) and pass–throgh (5,7 time slots) LP channels;
– AIS removing on 3,6 dropped LP channels restoring 3,6 LP paths;
– AIS removing on 5,7 pass–through LP channels restoring only 7 LP path (time slot 5 has still AIS
forcing deriving from the previous node).
ED 01 SC.3: NPE
188
TSD ITALIA
– AIS removing on 6,7 dropped LP channels restoring 6,7 LP paths (as for single span failure);
All rights reserved. Passing on and copying of this
document, use and communication of its contents
– AIS removing on 3,5 pass–through LP channels (as for single span failure): time slot 5 already not
had AIS forcing because involved in remaining span failure and then the action restores only 3 LP
path.
ED 01 SC.3: NPE
188
TSD ITALIA
In the following figures are reported the steps of an unidirectional SF ring protection switching.
The ring is composed by six nodes. HP and LP connections reflect the traffic map already seen for ”Path
A B C
1,3,4,5,6 3,4,5,6,7
F E D
1,2,3,5,8 1,3,6,7,8
ED 01 SC.3: NPE
188
TSD ITALIA
restoring.
All rights reserved. Passing on and copying of this
document, use and communication of its contents
A B C
1,4,5,6,3 3,4,5,6,7
3, 6 4,5 3,5,7
1,6, 2,3 1, 3,5,6,7,8
A B C
1,5,7 1,2,3,5,7,8 2,3,5 2,3,5,6,7 2,5,7
F E D
2,3 1,2,3,5,8 1,8 1,3,6,7,8
2, 1,5 6 7, 8 1, 5 5 2,4,7, 5
ED 01 SC.3: NPE
188
TSD ITALIA
Step 2) A SF ring short path request arrives on node E. The node performs:
– AIS forcing on 5,8 dropped LP channels to preempt from both sides;
– AIS forcing on 2,3,5 transmitted LP channels away from the failure used for HP connections
restoring.
A B C
1,4,5,6 ,3 3,4,5,6,7
3, 6 4,5 3,5,7
1,6 ,2,3 1,3,5,6,7,8
A B C
1,5,7 1,2,3,5,7,8 2,3,5 2,3,5,6,7 2,5,7
F E D
2,3 1,2,3,5,8 1,8 1,3,6,7,8
2, 1,5 6 7, 8 1, 5 5 2,4,7, 5
ED 01 SC.3: NPE
188
TSD ITALIA
Step 3) A SF ring long path request arrives on node A. The node performs:
– AIS forcing on 2,3,8(both sides) dropped LP channels to preempt;
– AIS forcing on 2 transmitted LP channel away from the failure used for HP connections restoring;
– pass–through of 1,5,8 LP channels used for HP connections restoring on both sides.
not permitted without written authorization from Alcatel.
All rights reserved. Passing on and copying of this
document, use and communication of its contents
A B C
1,4,5,6 ,3 3,4,5,6,7
3, 6 4,5 3,5,7
1,6 ,2,3 1,3,5,6,7,8
A B C
1,5,7,8 1,2,3,5,7,8 2,3,5 2,3,5,6,7 2,5,7
F E D
2,3 1,2,3,5,8 1,8 1,3,6,7,8
ED 01 SC.3: NPE
188
TSD ITALIA
Step 4) A SF ring long path request arrives on node D originated by node E. The node performs:
– AIS forcing on 2,5(both sides) dropped LP channels to preempt;
– AIS forcing on 8 transmitted LP channel away from the failure used for HP connections restoring;
– pass–through of 2,3,5 LP channels used for HP connections restoring on both sides.
A B C
1,4,5,6 ,3 3,4,5,6,7
F E D
2,3 1,2,3,5,8 1,8 1,3,6,7,8
ED 01 SC.3: NPE
188
TSD ITALIA
Step 5) A SF ring long path request arrives on node B originated by node F. The node performs:
– AIS forcing on 1,8 dropped LP channels to preempt;
– AIS forcing on 3 transmitted LP channel away from the failure used for HP connections restoring;
– pass–through of 1,2,5,8 LP channels used for HP connections restoring on both sides.
not permitted without written authorization from Alcatel.
All rights reserved. Passing on and copying of this
document, use and communication of its contents
A B C
1,4,5,6 ,3 3,4,5,6,7
3, 6 4,5 3,5,7
1,6 ,2,3
1,3,5,6,7,8
A B C
1,7,8, 5 1,3,7,8,2,5 1,3,8, 2,5 3,6,7, 2,5 2,5, 7
F E D
2,3 1,2,3,5,8 1,8 1,3,6,7,8
ED 01 SC.3: NPE
188
TSD ITALIA
Step 6) A SF ring long path request arrives on node C originated by node E. The node performs:
– AIS forcing on 3 dropped LP channels to preempt;
– AIS forcing on 1 transmitted LP channel away from the failure used for HP connections restoring;
– pass–through of 2,3,5,8 LP channels used for HP connections restoring on both sides.
A B C
1,4,5,6 ,3 3,4,5,6,7
3, 6 4,5 3,5,7
1,6 ,2,3
1,3,5,6,7,8
A B C
1,5,8, 7 1,2,3,5,8, 7 1,2,3,5,8 1,2,3,5,8, 6,7 2,3,5,8, 7
F E D
2,3 1,2,3,5,8 1,8 1,3,6,7,8
ED 01 SC.3: NPE
188
TSD ITALIA
Step 7) A SF ring long path request arrives on node C originated by node F. The node performs:
– bridge and switch on 1 restored HP channel;
– AIS removing on 1 transmitted LP channel carrying the new HP connection.
not permitted without written authorization from Alcatel.
All rights reserved. Passing on and copying of this
document, use and communication of its contents
A B C
1,4,5,6 ,3 3,4,5,6,7
3, 6 4,5 3,5,7
1,6 ,2,3
1 1,3,5,6,7,8
A B C
5,8, 1,7 2,3,5,8, 1,7 1, 2,3,5,8 2,3,5,8, 1,6,7 2,3,5,8, 7
F E D
2,3 1,2,3,5,8 1,8 1,3,6,7,8
ED 01 SC.3: NPE
188
TSD ITALIA
Step 8) A SF ring long path request arrives on node B originated by node E. The node performs:
– bridge and switch on 3 restored HP channel;
– AIS removing on 3 transmitted LP channel carrying the new HP connection.
A B C
1,4,5,6 ,3 3,4,5,6,7
3, 6 4,5 3,5,7
1,6 ,2,3
1 1,3,5,6,7,8
3
A B C
5,8, 1,7 2,5,8, 1,7 1, 2,5,8 2,3,5,8, 1,6,7 2,3,5,8, 7
F E D
2,3 1,2,3,5,8 1,8 1,3,6,7,8
ED 01 SC.3: NPE
188
TSD ITALIA
Step 9) A SF ring long path request arrives on node D originated by node F. The node performs:
– bridge and switch on 8 restored HP channel;
– AIS removing on 8 transmitted LP channel carrying the new HP connection.
not permitted without written authorization from Alcatel.
All rights reserved. Passing on and copying of this
document, use and communication of its contents
A B C
1,4,5,6 ,3 3,4,5,6,7
3, 6 4,5 3,5,7
1,6 ,2,3
1 1,3,5,6,7,8
3
A B C
1,7,8, 5 2,5, 1,7,8 1,8, 2,5 2,3,5, 1,6,7,8 2,3,5,7,8
F E D
2,3 1,2,3,5,8 1,8 1,3,6,7,8
ED 01 SC.3: NPE
188
TSD ITALIA
Step 10) A SF ring long path request arrives on node A originated by node E. The node performs:
– bridge and switch on 2 restored HP channel;
– AIS removing on 2 transmitted LP channel carrying the new HP connection.
A B C
1,4,5,6 ,3 3,4,5,6,7
3, 6 4,5 3,5,7
1,6 ,2,3
2 1 1,3,5,6,7,8
3
A B C
1,7,8, 5 2,5, 1,7,8 1,8, 2,5 2,3,5,1,6,7,8 2,3,5,7,8
F E D
2,3 1,2,3,5,8 1,8 1,3,6,7,8
ED 01 SC.3: NPE
188
TSD ITALIA
Step 11) A SF ring long path request arrives on node E originated by node F. The node performs:
– bridge and switch on 2,3,5 restored HP channels;
– AIS removing on 2,3,5 transmitted LP channel carrying the new HP connections.
The 2,3 HP connections now are completely restored in both directions.
not permitted without written authorization from Alcatel.
All rights reserved. Passing on and copying of this
document, use and communication of its contents
A B C
1,4,5,6 ,3 3,4,5,6,7
3, 6 4,5 3,5,7
1,6 ,2,3
1 1,3,5,6,7,8
2 3
A B C
1,5,7,8 1,2,5,7,8 1,2,5,8 1,2,3,5,6,7,8 2,3,5,7,8
F E D
2,3 1,2,3,5,8 1,8 1,3,6,7,8
ED 01 SC.3: NPE
188
TSD ITALIA
Step 12) A SF ring long path request arrives on node F originated by node E. The node performs:
– bridge and switch on 1,5,8 restored HP channels;
– AIS removing on 1,5,8 transmitted LP channel carrying the new HP connections.
Also the 1,5,8 HP connections now are completely restored in both directions. HP traffic is all restored.
A B C
1,4,5,6 ,3 3,4,5,6,7
3, 6 4,5 3,5,7
1,6 ,2,3
1 1,3,5,6,7,8
2 3
A B C
1,5,7,8 1,2,5,7,8 1,2,5,8 1,2,3,5,6,7,8 2,3,5,7,8
F E D
2,3 1,2,3,5,8 1,8 1,3,6,7,8
ED 01 SC.3: NPE
188
TSD ITALIA
The following figures show the steps of an unidirectional SF ring protection restoring, starting from the final
conditions of the previous example.
not permitted without written authorization from Alcatel.
All rights reserved. Passing on and copying of this
document, use and communication of its contents
A B C
1,4,5,6 ,3 3,4,5,6,7
3, 6 4,5 3,5,7
1,6 ,2,3
1 1,3,5,6,7,8
2 3
A B C
1,5,7,8 1,2,5,7,8 1,2,5,8 1,2,3,5,6,7,8 2,3,5,7,8
F E D
2,3 1,2,3,5,8 1,8 1,3,6,7,8
ED 01 SC.3: NPE
188
TSD ITALIA
Step 1) SF ring condition clearing detected from node F. The node performs:
– AIS removing on 1,2,3,5,8 received HP channels and on 6,7,8 received LP channels.
A B C
1,3,4,5,6 3,4,5,6,7
F E D
2,3 1,2,3,5,8 1,8 1,3,6,7,8
ED 01 SC.3: NPE
188
TSD ITALIA
Step 2) WTR/2 interval expires on node C. The node drops ring switch on 1 HP channel.
Step 3) WTR/2 interval expires on node B. The node drops ring switch on 3 HP channel.
Step 4) WTR/2 interval expires on node D. The node drops ring switch on 8 HP channel.
Step 5) WTR/2 interval expires on node A. The node drops ring switch on 2 HP channel.
not permitted without written authorization from Alcatel.
Step 6) WTR interval expires on node F. The node drops ring switch on 1,5,8 HP channels.
All rights reserved. Passing on and copying of this
document, use and communication of its contents
A B C
1,3,4,5,6 3,4,5,6,7
F E D
2,3 1,2,3,5,8 1,8 1,3,6,7,8
ED 01 SC.3: NPE
188
TSD ITALIA
A B C
1,3,4,5,6 3,4,5,6,7
F E D
2,3 1,2,3,5,8 1,8 1,3,6,7,8
ED 01 SC.3: NPE
188
TSD ITALIA
Step 8) No Request code arrives on node C from both sides. The node performs:
– drop ring bridge on 1 HP channel;
– restoring provisioned 3 LP channel in insertion and 2 LP channel in pass–through.
not permitted without written authorization from Alcatel.
All rights reserved. Passing on and copying of this
document, use and communication of its contents
A B C
1,3,4,5,6 3,4,5,6,7
F E D
2,3 1,2,3,5,8 1,8 1,3,6,7,8
ED 01 SC.3: NPE
188
TSD ITALIA
Step 9) No Request code arrives on node B from both sides. The node performs:
– drop ring bridge on 3 HP channel;
– restoring provisioned 1,8 LP channels in insertion and 2,3 LP channels in pass–through.
A B C
1,3,4,5,6 3,4,5,6,7
F E D
2,3 1,2,3,5,8 1,8 1,3,6,7,8
ED 01 SC.3: NPE
188
TSD ITALIA
Step 10) No Request code arrives on node D from both sides. The node performs:
– drop ring bridge on 8 HP channel;
– restoring provisioned 5 LP channel on a side and 2,5 LP channels on the other side in insertion.
not permitted without written authorization from Alcatel.
All rights reserved. Passing on and copying of this
document, use and communication of its contents
A B C
1,3,4,5,6 3,4,5,6,7
F E D
2,3 1,2,3,5,8 1,8 1,3,6,7,8
ED 01 SC.3: NPE
188
TSD ITALIA
Step 11) No Request code arrives on node A from both sides. The node performs:
– drop ring bridge on 2 HP channel;
– restoring provisioned 8 LP channel on a side and 2,8 LP channels on the other side in insertion and
1 LP channel in pass–through both directions.
A B C
1,3,4,5,6 3,4,5,6,7
F E D
2,3 1,2,3,5,8 1,8 1,3,6,7,8
ED 01 SC.3: NPE
188
TSD ITALIA
A B C
1,3,4,5,6 3,4,5,6,7
F E D
2,3 1,2,3,5,8 1,8 1,3,6,7,8
ED 01 SC.3: NPE
188
TSD ITALIA
Step 13) Second Idle code arrives on node A. It removes AIS on 8 and 2,3,8 LP channels.
Step 14) Second Idle code arrives on node B. It removes AIS on restored 1,8 LP channels.
Step 15) Second Idle code arrives on node C. It removes AIS on restored 3 LP channel.
Step 16) Second Idle code arrives on node D. It removes AIS on 5 and 2,5 LP channels.
A B C
1,3,4,5,6 3,4,5,6,7
F E D
2,3 1,2,3,5,8 1,8 1,3,6,7,8
ED 01 SC.3: NPE
188
TSD ITALIA
In the following figures are reported the steps of a node failure ring switching protection.
The ring is composed by six nodes. HP and LP connections reflect the traffic map already seen for ”Path
not permitted without written authorization from Alcatel.
restoring algorythm” paragraph that reports the ring connection for only the first 8 time slots.
All rights reserved. Passing on and copying of this
document, use and communication of its contents
A B C
1,3,4,5,6 3,4,5,6,7
F E D
1,2,3,5,8 1,3,6,7,8
ED 01 SC.3: NPE
188
TSD ITALIA
A B C
1,4,5,6, 3 3,4,5,6,7
3, 6 4,5 3,5,7
1,6, 2,3 1, 3,5,6,7,8
A B C
1,5,7 1,2,3,5,7,8 2,3,5 2,3,5,6,7 2,5,7
F E D
2,3 1,2,3,5,8 1,8 1,3,6,7,8
2, 1,5 6 7, 8 1, 5 5 2,4,7, 5
ED 01 SC.3: NPE
188
TSD ITALIA
A B C
1,4,5,6, 3 3 ,4,5,6,7
3, 6 4,5 3 ,5,7
1,6, 2,3 5,7,8, 1,3,6
A B C
1,5,7 1,2,3,5,7,8 2,3,5 2,3,5,6, 7 2,5, 7
F E D
2,3 1,2,3,5,8 1,8 1,3,6,7,8 1, 3,6
2, 1,5 6 7, 8 1, 5 5 2,4, 5, 7
ED 01 SC.3: NPE
188
TSD ITALIA
Step 3) A SF ring long path request arrives on node A originated by node F. The node performs:
– AIS forcing on 2,3,8(both sides) dropped LP channels to preempt;
– AIS forcing on 2 transmitted LP channel away from the failure used for HP connections restoring;
– pass–through of 1,5,8 LP channels used for HP connections restoring on both sides.
A B C
1,4,5,6, 3 3 ,4,5,6,7
3, 6 4,5 3 ,5,7
1,6, 2,3 5,7,8, 1,3,6
A B C
1,5,7,8 1,2,3,5,7,8 2,3,5 2,3,5,6, 7 2,5, 7
F E D
2,3 1,2,3,5,8 1,8 1,3,6,7,8 1, 3,6
2, 1,5 6 7, 8 1, 5 5 2,5, 4, 7
ED 01 SC.3: NPE
188
TSD ITALIA
Step 4) A SF ring long path request arrives on node C originated by node D. The node performs:
– AIS forcing on 3,6(both sides) dropped LP channels to preempt;
– AIS forcing on 1,6 transmitted LP channels away from the failure used for HP connections restoring;
– pass–through of 7,8 LP channels used for HP connections restoring on both sides.
not permitted without written authorization from Alcatel.
All rights reserved. Passing on and copying of this
document, use and communication of its contents
A B C
1,4,5,6, 3 3 ,4,5,6,7
3, 6 4,5 3 ,5,7
1,6, 2,3 5,7,8, 1,3,6
A B C
1,5,7,8 1,2,3,5,7,8 2,3,5 2,3,5, 1,6,7,8 2,5, 7,8
F E D
2,3 1,2,3,5,8 1,8 1,3,6,7,8 1, 3,6
2, 1,5 6 7, 8 1, 5 5 2,5, 4, 7
ED 01 SC.3: NPE
188
TSD ITALIA
Step 5) A SF ring long path request arrives on node B originated by node F. The node performs:
– AIS forcing on 1,8 dropped LP channels to preempt;
– AIS forcing on 3 transmitted LP channel away from the failure used for HP connections restoring;
– pass–through of 1,2,5,8 LP channels used for HP connections restoring on both sides.
A B C
1,4,5,6, 3 3 ,4,5,6,7
3, 6 4,5 3 ,5,7
1,6, 2,3 5,7,8, 1,3,6
A B C
1,8 ,5,7 2,3,5,7, 1,8 2,3,5, 1,8 2,3,5, 1,6,7,8 2,5, 7,8
F E D
2,3 1,2,3,5,8 1,8 1,3,6,7,8 1, 3,6
7, 8 6,7, 8 6 1,5,6 1, 6
2, 1,5 6 7, 8 1, 5 5 2,5, 4, 7
ED 01 SC.3: NPE
188
TSD ITALIA
Step 6) A SF ring long path request arrives on node B originated by node D. The node recognizes a node
E failure; the HP connections dropped and inserted by the node E (2,3,5 time slots on a side and 3,6,7
on the other side) are however lost and there is no more need to restore. The node performs:
– confirming provisioned 6,7 LP channels in drop/insert toward node C (no more used for node failure);
not permitted without written authorization from Alcatel.
– AIS removing on 3 transmitted LP channel toward node C (no more used for node failure).
A B C
1,4,5,6, 3 3 ,4,5,6,7
3, 6 4,5 3 ,5,7
2,3 5,7,8, 1,3,6
A B C
1,8 ,5,7 2,3,5,7, 1,8 2,3,5, 1,8 2,3,5, 1,6,7,8 2,5, 7,8
F E D
2,3 1,2,3,5,8 1,8 1,3,6,7,8 1, 3,6
7, 8 6,7, 8 6 1,5,6 1, 6
2, 1,5 6 7, 8 1, 5 5 2,5, 4, 7
ED 01 SC.3: NPE
188
TSD ITALIA
Step 7) A SF ring long path request arrives on node C originated by node F. The node recognizes a node
E failure. The node performs:
– confirming provisioned 3,6 LP channels in drop/insert toward node B and 6 LP channel toward node
D (no more used for node failure);
A B C
1,4,5,6, 3 3 ,4,5,6,7
3, 6 4,5 3 ,5,7
2,3 1
A B C 5,7,8, 1,3,6
1,5,7, 8 1,2,3,5,7, 8 1,2,3,5, 8 1,2,3,5,6, 7,8 2,5, 7,8
F E D
2,3 1,2,3,5,8 1,8 1,3,6,7,8 1, 3,6
1,2,5,7, 8
F E D 1,6 ,2,4,5, 7,8
7,8 6,7,8 6 1,5,6 1, 6
7, 8 6,7, 8 6 1,5,6 1, 6
2, 1,5 6 7, 8 1, 5 5 2,5, 4, 7
ED 01 SC.3: NPE
188
TSD ITALIA
Step 8) A SF ring long path request arrives on node A originated by node D. The node recognizes a node
E failure. The node performs:
– confirming provisioned 2,3 LP channels in drop/insert toward node B (no more used for node failure);
– no bridge & switch action;
not permitted without written authorization from Alcatel.
– AIS removing on 2 transmitted LP channel toward node B (no more used for node failure).
All rights reserved. Passing on and copying of this
document, use and communication of its contents
A B C
1,4,5,6, 3 3 ,4,5,6,7
3, 6 4,5 3 ,5,7
2,3 1
A B C 5,7,8, 1,3,6
1,5,7, 8 1,2,3,5,7, 8 1,2,3,5, 8 1,2,3,5,6, 7,8 2,5, 7,8
F E D
2,3 1,2,3,5,8 1,8 1,3,6,7,8 1, 3,6
1,2,5,7, 8
F E D 1,6 ,2,4,5, 7,8
7,8 6,7,8 6 1,5,6 1, 6
7, 8 6,7, 8 6 1,5,6 1, 6
2, 1,5 6 7, 8 1, 5 5 2,4, 5, 7
ED 01 SC.3: NPE
188
TSD ITALIA
Step 9) A SF ring long path request arrives on node D originated by node F. The node recognizes a node
E failure. The node performs:
– bridge and switch on 8 restored HP channel;
– AIS removing on 7,8 transmitted LP channels toward node C (7 no more used for node failure);
A B C
1,4,5,6, 3 3 ,4,5,6,7
3, 6 4,5 3 ,5,7
2,3 1
A B C 5,7,8, 1,3,6
F E D
2,3 1,2,3,5,8 1,8 1,3,6,7,8 1, 3,6
1,2,5,7,8
F E D 1,6 ,2,4,5,7,8
7,8 6,7,8 6 1,5,6 1, 6
2, 1,5 6 7, 8 1, 5 5 2,4,7, 5
ED 01 SC.3: NPE
188
TSD ITALIA
Step 10) A SF ring long path request arrives on node F originated by node D. The node recognizes a node
E failure. The node performs:
– bridge and switch on 1,8 restored HP channels;
– AIS removing on 1,5,8 transmitted LP channels toward node C (5 no more used for node failure);
not permitted without written authorization from Alcatel.
– AIS removing on 5 received LP channel tributary side (no more used for node failure).
All rights reserved. Passing on and copying of this
document, use and communication of its contents
A B C
1,4,5,6, 3 3 ,4,5,6,7
3, 6 4,5 3 ,5,7
2,3 1
A B C 5,7,8, 1,3,6
1,6 7, 8 5,7,8
1,8, 5 2,3,5 3,6,7
F E D
2,3 1,2,3,5,8 1,8 1,3,6,7,8 1, 3,6
7 6,7 6 1,5,6 1, 6
1 ,2,5 6 7, 8 1, 5 5 2,4,5,7
ED 01 SC.3: NPE
188
TSD ITALIA
Step 11) Bridge & Switch status arrives on node C originated by node D.
The node performs:
– AIS removing on 3,6(both sides) received LP channels tributary side (no more used for node failure).
A B C
1,4,5,6, 3 3 ,4,5,6,7
3, 6 4,5 3 ,5,7
2,3 1
A B C 5,7,8, 1,3,6
1,6 7, 8 5,7,8
1,8, 5 2,3,5 3,6,7
F E D
2,3 1,2,3,5,8 1,8 1,3,6,7,8 1, 3,6
7 6,7 6 1,5,6 1, 6
1 ,2,5 6 7, 8 1, 5 5 2,4,5,7
ED 01 SC.3: NPE
188
TSD ITALIA
Step 12) Bridge & Switch status arrives on node A originated by node F. The node performs:
– AIS removing on 2,3 received LP channels tributary side (no more used for node failure).
Step 13) Bridge & Switch status arrives on node B originated by node D. The node performs:
not permitted without written authorization from Alcatel.
– no action.
All rights reserved. Passing on and copying of this
document, use and communication of its contents
– LP channels no more used HP channels are restored. Only LP channels 1 and 8 are preempted.
A B C
1,4,5,6, 3 3 ,4,5,6,7
3, 6 4,5 3 ,5,7
2,3 1
A B C 5,7,8, 1,3,6
1,6 7, 8 5,7,8
1,8, 5 2,3,5 3,6,7
F E D
2,3 1,2,3,5,8 1,8 1,3,6,7,8 1, 3,6
7 6,7 6 1,5,6 1, 6
1 ,2,5 6 7, 8 1, 5 5 2,4,5,7
ED 01 SC.3: NPE
188
TSD ITALIA
The following figures describe the steps of an unidirectional SF span protection coexisting with ring
switching protection already present.
A B C
1,4,5,6 ,3 3,4,5,6,7
3, 6 4,5 3,5,7
1,6 ,2,3
1 1,3,5,6,7,8
2 3
A B C
1,5,7,8 1,2,5,7,8 1,2,5,8 1,2,3,5,6,7,8 2,3,5,7,8
F E D
2,3 1,2,3,5,8 1,8 1,3,6,7,8
ED 01 SC.3: NPE
188
TSD ITALIA
A B C
3,6 1,3,6, 4,5 4,5 3,4,5,6,7
1,2,3,6 1,4,5,6, 3
3, 6 4,5 3,5,7
1,6 ,2,3 1 1,3,5,6,7,8
2 3
A B C
1,5,7,8 1,2,5,7,8 1,2,5,8 1,2,3,5,6,7,8 2,3,5,7,8
F E D
2,3 1,2,3,5,8 1,8 1,3,6,7,8
ED 01 SC.3: NPE
188
TSD ITALIA
Step 2) A SF span short path request arrives on node C. The node performs:
– among 3,4,5,6,7 channels: 3,5 are used for ring protection and then only 4,6,7 channels are involved
in span switching;
– AIS forcing on 6 provisioned dropped LP channel to preempt;
A B C
3,6 1,3,6, 4,5 4,5 3,4,5,6,7
1,2,3,6 1,4,5,6, 3
3, 6 4,5 3,5,7
4,6,7
1,6 ,2,3 1 1,3,5,6,7,8
2 3
A B C
1,5,7,8 1,2,5,7,8 1,2,5,8 1,2,3,4,5,6,7,8 2,3,5,7,8
F E D
2,3 1,2,3,5,8 1,8 1,3,6,7,8
ED 01 SC.3: NPE
188
TSD ITALIA
A B C
3,6 1,3,4,6, 5 4, 5 3,4,5,6,7
1,2,3,6 1,4,5,6, 3
3, 6 4,5 3,5,7
4,6,7
1,6 ,2,3 4,6,7 1 1,3,5,6,7,8
2 3
A B C
1,5,7,8 1,2,5,7,8 1,2,5,8 1,2,3,4,5,6,7,8 2,3,5,7,8
F E D
2,3 1,2,3,5,8 1,8 1,3,6,7,8
ED 01 SC.3: NPE
188
TSD ITALIA
Step 4) A span bridge and switch status arrives on node C. The node performs:
– span switch on 4,6,7 LP channels.
At the end all the HP connections lost for ring failure are mantained and other 3 HP connections affected
by span failure are restored; only 3,5 HP paths carried on failed span are lost. The 7 LP path from B to
A B C
3,6 1,3,4,6, 5 4, 5 3,4,5,6,7
1,2,3,6 1,4,5,6, 3
3, 6 4,5 3,5,7
1,6 ,2,3 4,6,7 4,6,7 1 1,3,5,6,7,8
2 3
A B C
1,5,7,8 1,2,5,7,8 1,2,5,8 1,2,3,4,5,6,7,8 2,3,5,7,8
F E D
2,3 1,2,3,5,8 1,8 1,3,6,7,8
ED 01 SC.3: NPE
188
8 FEATURES
This Chapter is in accordance with ITU–T Recommendation G.841; explanations have been for better
understanding.
not permitted without written authorization from Alcatel.
All rights reserved. Passing on and copying of this
document, use and communication of its contents
DEFINITIONS
ITU–T Recommendation G.841 definitions apply. In addition, more definitions are suggested hereafter.
path: according to ITU–T Recommendation G.803, a path is a transport entity (i.e., architectural
component) used to transfer information. Nevertheless, this name will be used throughout this document
to indicate the information carried either unidirectionally or bi–directionally between two access points of
a ring on either a path link connection (if the two points are both PDH) or trail segment.
bridge&switch node: the node that performs the bridge and switch function for a protection event. Where
the bridge and switch is performed on a per AU–4 basis, the node executing a bridge and switch of at least
one AU–4 is referred to as a bridge and switch node. Note that with a Transoceanic application, a node
in the switching status may not be a bvridge&switch node, whereas a node in the pass–through state may
be a bridge&switch node. With the Classic application, only a request node (see below) may be a
bridge&switch node.
protocol request: a message sent by a node to another node via K1/K2 bytes with the purpose of settling
a certain behavior. All the K1 request codes represent protocol requests, but not all of them are bridge
requests. For example, a SF–R is a bridge request, but LP–S is not: both of them are protocol requests.
Even NR is a protocol request.
protocol reply: a message sent by a node to another node via K1/K2 bytes with the purpose of
acknowledging a received protocol request.
request node: a node that generates either a protocol request or protocol reply (other than NR!). The pair
of nodes sending each other protocol request/reply are peer request nodes.
intermediate node: the node that is not a request node. It is always in the pass–through state. If such
a node executes bridge and switch of at least one AU–4 it is also a bridge&switch node.
commanded span: is either the span involved in a couple of crossing protocol requests (or protocol
request and protocol reply) being exchanged by tail/head end nodes, or the span involved by an externally
initiated command, even if this requires no specific signaling on the ring (i.e., LOW).
MSSPRING channels: The range of channels that are part of the MSSPRING operation (i.e. the whole
of the working and protection channels).
protection section: the full set of both protection and (lower) unprotected channels in a multiplex section.
protection semisection: the part of multiplex section (i.e. the N/2+1..N channels in a 2–fiber STM–N NE)
consisting of protection channels.
working section: the full set of both working and (upper) unprotected channels in a multiplex section.
1AA 00014 0004 (9007) A4 – ALICE 04.10
working semisection: the part of multiplex section (i.e. the 1..N/2 channels in a 2–fiber STM–N NE)
consisting of working channels.
ED 01 SC.3: NPE
188
8.1 Introduction
This document covers the management of MSSPRING with the following characteristics:
– ring access: 140 Mbit/s, STM–1, STM–4;
Multiplex Section Shared Protection Ring (MSSPRING) is an SDH trail protection scheme, as it is
described in ITU–T Recommendation G.841, section 6.1.
The MSSPRING application described in G.841, sections 6.1 and 7.2 is called Classic MSSPRING
application.
The MSSPRING application described in G.841, sections 6.2 and Annex A is called Transoceanic
MSSPRING application.
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED 01 SC.3: NPE
188
8.1.2 MS shared protection rings – Transoceanic application
The application is fully compliant with G.841, Annex A.
8.1.2.1 Application
not permitted without written authorization from Alcatel.
1) Switch time. The switch completion time is less than 300 milliseconds, independent of whether
the ring is carrying extra traffic.
2) Extent of protection: b) The ring restores all traffic possible, even under conditions of multiple
bridge requests of the same priority.
a) During a failure, pre–empted extra traffic can be re–established on the protection channels
not used to restore the normal traffic.
b) For transoceanic applications, ring maps are used to switch traffic affected by a failure at
intermediate nodes. A mechanism that auto–provisions the data required for these maps,
and maintains its consistency.
c) If a ring switch exists and a failure of equal priority occurs on another span requiring a ring
switch, then, if the priority of the bridge request is Signal Fail (Ring) or higher, both ring
switches are established resulting in the ring segmenting into two separate segments.
It is assumed that the span switch must be performed on a per–AU–4 basis. In this way, an unloaded
Normal AU–4 will not be bridged & switched, and the corresponding ET AU–4 will not be pre–empted.
An MS shared protection ring in a transoceanic application uses SDH multiplex section layer indications
to trigger the protection switching. Switching action is performed only on AU–4 tributaries affected by the
failure. Multiplex section indicators include MS failure conditions, and signalling messages that are sent
between nodes to affect a coordinated MS protection switch.
In the event of a failure, ring switches are established at any node whose traffic is affected by the failure.
Unlike the general purpose approaches described earlier, no loopbacks are established. Loopbacks and
switching only at the nodes adjacent to a failure are the cause of triple ocean crossing encountered by the
traffic restoration path mentioned above. Therefore, in the transoceanic approach, all nodes are allowed
to switch and use the existing protocol in conjunction with ring maps. As in the general purpose cases
described in Sections 7.2.1.1 and 7.2.1.2, the affected traffic is rerouted away from the failure over the
protection channels.
The problem of misconnection is eliminated for the transoceanic ring application because there are no
loopbacks at the switching nodes. It is the looping at switching nodes that sets up the potential for
misconnections.
Single and multiple failures resulting in ring switching are executed in the same manner, by simply bridging
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED 01 SC.3: NPE
188
8.1.2.4 Switching criteria
As described also in Section 7.4.2, the WTR bridge request is used to prevent frequent oscillation between
the protection channels and the working channels. The intent is to minimize oscillations, since hits are
incurred during switching. The WTR bridge request is issued after the working channels’ BER meets the
restoral threshold. The WTR is issued only after an SF or an SD condition and, thus, does not apply for
externally initiated bridge requests. For ring switches in a transoceanic application, a WTR bridge request
received bidirectionally by an intermediate node with bridged and switched traffic results in the following.
The intermediate node initiates a local WTR whose time interval is one half that of the switching node WTR
interval. For transoceanic applications, the WTR interval is set to the same value at all nodes.
ED 01 SC.3: NPE
188
8.1.2.6 Additional requirements
The following additional requirements dealing with particular paths other than uni– or bi–directional
point–to–point shall be met.
not permitted without written authorization from Alcatel.
All rights reserved. Passing on and copying of this
document, use and communication of its contents
A unidirectional multiply dropped path (also called broadcast or point–to–multipoint, see Figure 82. ) shall
be protected as follows: the capability for the insert node to reach all drop nodes must be preserved upon
occurrence of single (ring/span) failure (exception: insert node failure).
Interworking between the Transoceanic MS–SPRING and another ring is achieved as follows:
– the “continue” portion of the drop& continue (all spans between Primary and Secondary node, that
may not be adjacent) uses working channels; this methos will be referred to as drop &
continue/working herein;
– the “continue” portion of the drop& continue (all spans between Primary and Secondary node, that
may not be adjacent) uses protection channels; this methos will be referred to as drop &
continue/protection herein.
The latter option provides a lower lever of survivability, but on the other hand avoids using up working (i.e.,
premium) channels for redundancy purposes.
– the dual–node interconnection capability shall be preserved upon a single ring failure occurring
between the termination node and the Primary node (not including node failures of both termination
and Primary); this means that the interconnection is still redundant after the occurrence of such a
failure; the above only applies to drop & continue/working method; if the drop & continue/protection
method is used, the loss of dual–node interconnection capability is tolerated upon occurrence of the
mentioned failure.
– The dual–node interconnection capability shall be preserved upon multiple span failure, even
occurring on span(s) between the Primary and Secondary node.
– The dual–node interconnection capability is obviously lost in case of failure of either Primary or
Secondary node. The interconnection shall however be preserved via the available interconnection
node.
– The loss of dual–node interconnection capability is tolerated upon occurrence of any (span/ring)
failure between the Primary and Secondary node; in this case, only the Primary interconnection
remains available and guarantees interconnction.
• unidirectional paths;
• broadcast paths;
1AA 00014 0004 (9007) A4 – ALICE 04.10
• bidirectional paths with add/drop node different from Primary node (see Figure 84. through
Figure 87. );
ED 01 SC.3: NPE
188
• bidirectional paths with add/drop node is the Primary node (see Figure 88. through Figure 91. ),
namely the path enters the ring at the Primary node to reach the other ring through the Primary
itself as well as the Secondary;
ED 01 SC.3: NPE
188
not permitted without written authorization from Alcatel.
All rights reserved. Passing on and copying of this
document, use and communication of its contents
C B A R Q
D P
working channels
protection channels
E N
F G H L M
C B A R Q
D P
working channels
protection channels
E N
F G H L M
1AA 00014 0004 (9007) A4 – ALICE 04.10
Figure 83. Dual–node ring interconnection with D&C/working mechanism: unidirectional path
ED 01 SC.3: NPE
188
not permitted without written authorization from Alcatel.
All rights reserved. Passing on and copying of this
document, use and communication of its contents
C B A R Q
D P
working channels
protection channels
E N
F G H L M
Figure 84. Dual–node ring interconnection with D&C/working mechanism: bidirectional path, outgoing
direction
C B A R Q
D P
working channels
protection channels
E N
F G H L M
1AA 00014 0004 (9007) A4 – ALICE 04.10
Figure 85. Dual–node ring interconnection with D&C/protection architecture: bidirectional path,
outgoing direction
ED 01 SC.3: NPE
188
not permitted without written authorization from Alcatel.
All rights reserved. Passing on and copying of this
document, use and communication of its contents
C B A R Q
D P
working channels
protection channels
E N
F G H L M
= selector
Figure 86. Dual–node ring interconnection with D&C/working architecture: bidirectional path, incoming
direction
C B A R Q
D P
working channels
protection channels
E N
F G H L M
= selector
1AA 00014 0004 (9007) A4 – ALICE 04.10
Figure 87. Dual–node ring interconnection with D&C/protection architecture: bidirectional path,
incoming direction
ED 01 SC.3: NPE
188
not permitted without written authorization from Alcatel.
All rights reserved. Passing on and copying of this
document, use and communication of its contents
C B A R Q
D P
working channels
protection channels
E N
F G H L M
Figure 88. Dual–node ring interconnection with D&C/working mechanism: outgoing direction (insert
node = Primary node)
C B A R Q
D P
working channels
protection channels
E N
F G H L M
1AA 00014 0004 (9007) A4 – ALICE 04.10
Figure 89. Dual–node ring interconnection with D&C/protection architecture: outgoing direction (insert
node = Primary node)
ED 01 SC.3: NPE
188
not permitted without written authorization from Alcatel.
All rights reserved. Passing on and copying of this
document, use and communication of its contents
C B A R Q
D P
working channels
protection channels
E N
F G H L M
= selector
Figure 90. Dual–node ring interconnection with D&C/working architecture: incoming direction (drop
node = Primary node)
C B A R Q
D P
working channels
protection channels
E N
F G H L M
= selector
1AA 00014 0004 (9007) A4 – ALICE 04.10
Figure 91. Dual–node ring interconnection with D&C/protection architecture: incoming direction (drop
node = Primary node)
ED 01 SC.3: NPE
188
8.1.2.7 Protection algorithm operation
Full compliance to G.841, Annex A, section A.6 is ensured, with the following additions.
– the nodes do not reroute and save the premium paths affected by both.
– the nodes do not reroute and lose the premium paths affected by FS–R only.
– the nodes do not reroute and save the premium paths affected by SF–R only.
– the nodes do not reroute the premium paths affected by one SF–R only.”
– the nodes do not reroute the premium paths affected by one FS–R only.”
Figure 82. shows a generic ring and a normal point–to–multipoint cicuit being inserted at node A and
broadcast to nodes G, H, and L.
With the Transoceanic MS–SPRING, the ring traffic map shall describe a point–to–multipoint path
according to the following rules:
– the insert node for the given path (see Figure 82. , node A) shall see the outgoing point–to–multipoint
path as being inserted locally and dropped at the farthest drop node (L);
– each node dropping the incoming point–to–multipoint path shall see it as being inserted at the insert
node (A) and dropped locally. In other words, the drop&continue connection is seen as a normal drop
connection plus a pass–through connection. Every such node shall also be aware that the drop
connection is part of a point–to–multipoint path.
According to the above rules, any failure between the insert node and the first drop node, not including
the insert node failure (see Figure 92. ), shall be handled as follows:
– Because of the ring signaling, the insert node (A) knows that a ring failure has occurred between D
and E, and bridges the affected path onto the protection channel that travels away from the failure.
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED 01 SC.3: NPE
188
– Node L realizes that the failure is affecting the point–to–multipoint path it is receiving from A (because
the ring traffic map declares the path as A⇒L, and the failure is in between) and, knowing to be the
farthest drop node for that path, drops the extra–traffic according to the usual rules and converts its
drop/West connection of the failed point–to–multipoint path into a drop&continue/East of the
not permitted without written authorization from Alcatel.
corresponding protection channel in the opposite direction. The “drop” part is necessary to receive
All rights reserved. Passing on and copying of this
document, use and communication of its contents
the good path from A, whereas the “continue” is necessary to forward that good path to nodes G and
H.
– Likewise, node H realizes that the failure is affecting the point–to–multipoint path it is receiving from
A (because the ring traffic map declares the path as A⇒G, and the failure is in between) and, knowing
to be an intermediate drop node for that path, converts its drop&continue/West connection into a
drop&continue/East of the corresponding protection channel in the opposite direction.
– Node G realizes that the failure is affecting the point–to–multipoint path it is receiving from A and,
knowing to be the first drop node for that path, converts its drop&continue/West connection into a
drop/East of the corresponding protection channel in the opposite direction.
As a consequence of that failure, this mechanism brings about an alternative path traveling on the
protection channel in the opposite direction and feeding all the drop nodes of the point–to–multipoint path
a good signal as a substitute for the failed one.
A failure between the first drop node and the farthest drop node (see Figure 93. ), both not included,
is handled as follows:
– Node A realizes that only the nodes preceding the ring failure (G) are still reachable: for ring
interconnection purposes, this is sufficient to guarantee that a good tributary can still be sent by A
to the other ring, and thus no switching action is required at all.
– If the capability of sending to all the drop nodes is to be preserved upon single ring failure, it is
necessary that node A bridges the inserted path onto the protection channel in order to reach the
affected nodes (H and L); moreover, the nodes beyond the failure (H and L) shall behave as in above
case, Node G realizes that the failure is not affecting the point–to–multipoint path it is receiving from
A and does no switching at all.
The original point–to–multipoint path is therefore split into
• a point–to–multipoint path on the working channel, from the insert node through the farthest
unaffected drop node (G), and
• a point–to–multipoint path on the corresponding protection channel in the opposite direction,
from the insert node through the first affected drop node (H).
A failure of the farthest drop node (see Figure 94. ) is handled as follows:
– Node A does no switching because the node being declared by its ring traffic map as destination of
the point–to–multipoint path it is inserting is faulty.
– All the intermediate drop nodes are unaffected by the failure and keep receiving the path from A on
the working channel.
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED 01 SC.3: NPE
188
not permitted without written authorization from Alcatel.
All rights reserved. Passing on and copying of this
document, use and communication of its contents
C B A R Q
D P
working channels
protection channels
E N
F G H L M
C B A R Q
D P
working channels
protection channels
E N
F G H L M
F
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED 01 SC.3: NPE
188
not permitted without written authorization from Alcatel.
All rights reserved. Passing on and copying of this
document, use and communication of its contents
C B A R Q
D P
working channels
protection channels
E N
F G H L M
Figure 95. (drop & continue/working method) and Figure 96. (drop & continue/protection method) show
the nominal failure–free state of a simple MS–SPRING and illustrates a particular tributary handed–off at
two ring interconnection nodes (D, E) and to be terminated at node A. The two ring interconnection nodes
are referred to as the Primary node and the Secondary node. Primary and secondary nodes are defined
on a per–tributary (AU–4) basis.
Each bi–directional path going from an MS–SPRING ring to another ring through a dual–node
interconnection is therefore a combination of a point–to–multipoint path and a multipoint–to–point path
traveling in the opposite direction and traversing the same spans.
a failure of the Primary node in the [Transoceanic] MS–SPRING results in a secondary connection of the
tributary. Failure of the Primary node is illustrated in Figure 97. (drop & continue/working method) and
Figure 98. (drop & continue/protection method). All traffic traversing the failed node is recovered by
bridging & switching the affected paths onto the protection capacity at each termination node (node A in
the example) as well as at the secondary node (node D).
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED 01 SC.3: NPE
188
8.1.2.7.5.2 Failure outside of the termination, Primary, or Secondary nodes
A cable cut failure is illustrated in Figure 99. (drop & continue/working method) and Figure 100. (drop &
continue/protection method).
– the Primary node shall loop the path after the selector back onto the protection channel toward the
secondary node.
– the Secondary node is not impacted, as it continues transmitting/receiving to/from the Primary node
using the same side.
This is the only event where a loopback is allowed with Transoceanic application. The increase of distance
to travel (all the spans between the Primary and Secondary node are gone through twice, if the secondary
interconnection is selected) is considered negligible. Note that such a loopback does not imply any
potential for misconneciton, as the paths destined to the failed node (in the event of node failure) are not
bridged & switched.
In this way the dual–node interconnection capability is preserved, still allowing the ring self–healing when
a potential additional fault affects the secondary path (the hand–off to the Secondary node).
As for the drop & continue/protection method, the loopback is not applicable as the “continue” portion is
pre–empted by the path being bridged & switched by the termination node A onto the protection channel
away from the failure to reach the Primary node. The secondary interconnection is therefore no longer
available.
The same behavior recommended for Classic MS–SPRING applies to both drop & continue/working and
/protection methods:
for a failure of the secondary node, the tributary at the terminating node (see node A in Figure 102. ) is
unaffected, since it receives its tributary from the primary node. Because of the ring signaling, the Primary
node knows that the secondary node has failed. The Primary node chooses its tributary from the traffic
entering it from the other ring.
A failure occurring between the two interconnection nodes (see Figure 101. ), is dealt with in the same way
as in the Secondary node failure case. The secondary interconnection is no longer available.
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED 01 SC.3: NPE
188
All rights reserved. Passing on and copying of this
document, use and communication of its contents
not permitted without written authorization from Alcatel.
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED
01
Working
Protection
957.130.872 H
SC.3: NPE
E
A
F
B
188
3AL 61259 AA AA
D
139 / 188
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED
01
Working
Protection
957.130.872 H
SC.3: NPE
E
A
F
B
188
3AL 61259 AA AA
D
140 / 188
All rights reserved. Passing on and copying of this
document, use and communication of its contents
not permitted without written authorization from Alcatel.
All rights reserved. Passing on and copying of this
document, use and communication of its contents
not permitted without written authorization from Alcatel.
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED
01
Working
Protection
957.130.872 H
SC.3: NPE
A
E
F
B
188
3AL 61259 AA AA
D
Figure 97. Transoceanic drop & continue/working: failure of the primary node
141 / 188
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED
01
Working
Protection
957.130.872 H
SC.3: NPE
A
E
F
B
188
3AL 61259 AA AA
D
Figure 98. Transoceanic drop & continue/protection: failure of the primary node
142 / 188
All rights reserved. Passing on and copying of this
document, use and communication of its contents
not permitted without written authorization from Alcatel.
Working
Protection
(f. pass–through) B
not permitted without written authorization from Alcatel.
A (f. pass–through)
All rights reserved. Passing on and copying of this
document, use and communication of its contents
Protocol
request
F (f. pass–through)
C (f. pass–through)
Protocol
reply
E(switching) (switching) D
Figure 99. Transoceanic drop&c/working:failure outside of the termination, primary, or secondary nod
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED 01 SC.3: NPE
188
Working
Protection
(f. pass–through) B
A (f. pass–through)
F (f. pass–through)
C (f. pass–through)
Protocol
reply
E(switching) (switching) D
Figure 100. Transoceanic drop&c/protection: failure outside of the termination, primary, or secondary
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED 01 SC.3: NPE
188
Working
Protection
(f. pass–through) B
not permitted without written authorization from Alcatel.
A (f. pass–through)
All rights reserved. Passing on and copying of this
document, use and communication of its contents
Protocol
request
F (f. pass–through)
C (f. pass–through)
Protocol
reply
E(switching) (switching) D
Figure 101. Transoceanic drop & continue/working: failure between primary and secondary
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED 01 SC.3: NPE
188
Working
Protection
(f. pass–through) B
C (f. pass–through)
E(switching) (switching) D
Figure 102. Transoceanic drop & continue/working: failure of the secondary node
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED 01 SC.3: NPE
188
8.1.2.7.6 Path types and traffic map
This section lists a set of paths that are supported by networks that include an NPE ring.
not permitted without written authorization from Alcatel.
N.B. In all traffic map bits k = i+N, where N comes from STM–N.
ED 01 SC.3: NPE
188
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED
01
F
A
957.130.872 H
SC.3: NPE
F
A
F
A
E
B
NPE
E
B
E
B
NPE
NPE
D
C
D
C
D
C
188
3AL 61259 AA AA
Figure 103. inside, (a) unidir (b) bidir (c) broadcast, unprotected, no prot. in NPE, HP
148 / 188
All rights reserved. Passing on and copying of this
document, use and communication of its contents
not permitted without written authorization from Alcatel.
All rights reserved. Passing on and copying of this
document, use and communication of its contents
not permitted without written authorization from Alcatel.
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED
01
F
A
957.130.872 H
SC.3: NPE
F
F
A
A
E
B
E
B
E
B
D
C
D
C
D
C
188
3AL 61259 AA AA
Figure 104. inside, (a) unidir (b) bidir (c) broadcast, SNCP, no prot. in NPE, HP
149 / 188
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED
01
F
F
A
957.130.872 H
SC.3: NPE
E
B
E
B
NPE
NPE
D
C
D
C
F
A
F
A
E
B
E
B
NPE
NPE
188
3AL 61259 AA AA
Figure 105. boundary (2 NPE rings), bidir, D&C, no prot. in NPE, HP
D
C
D
C
150 / 188
All rights reserved. Passing on and copying of this
document, use and communication of its contents
not permitted without written authorization from Alcatel.
All rights reserved. Passing on and copying of this
document, use and communication of its contents
not permitted without written authorization from Alcatel.
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED
01
F
F
A
957.130.872 H
SC.3: NPE
E
B
E
B
NPE
NPE
D
C
D
C
F
A
F
A
E
B
E
B
NPE
NPE
188
3AL 61259 AA AA
D
C
D
C
Figure 106. boundary, bidir, D&C, no prot. in NPE, HP (add/drop node = Primary)
151 / 188
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED
01
F
F
A
957.130.872 H
SC.3: NPE
E
B
E
B
NPE
NPE
D
C
D
C
F
A
F
A
E
B
E
B
NPE
NPE
188
3AL 61259 AA AA
D
C
D
C
Figure 107. boundary, bidir, D&C, no prot. in NPE, HP (add/drop node between P and S)
152 / 188
All rights reserved. Passing on and copying of this
document, use and communication of its contents
not permitted without written authorization from Alcatel.
All rights reserved. Passing on and copying of this
document, use and communication of its contents
not permitted without written authorization from Alcatel.
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED
01
F
A
F
A
957.130.872 H
SC.3: NPE
E
B
E
B
NPE
NPE
D
C
D
C
F
A
E
B
188
3AL 61259 AA AA
Figure 108. boundary, unidir, D&C, no prot. in NPE, HP
NPE
D
C
153 / 188
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED
01
957.130.872 H
SC.3: NPE
F
A
E
B
NPE
D
C
188
3AL 61259 AA AA
Figure 109. crossing, unidir, unprotected, no prot. in NPE, HP
154 / 188
All rights reserved. Passing on and copying of this
document, use and communication of its contents
not permitted without written authorization from Alcatel.
All rights reserved. Passing on and copying of this
document, use and communication of its contents
not permitted without written authorization from Alcatel.
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED
01
957.130.872 H
SC.3: NPE
F
A
E
B
NPE
D
C
188
3AL 61259 AA AA
Figure 110. crossing, biidir, unprotected, no prot. in NPE, HP
155 / 188
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED
01
957.130.872 H
SC.3: NPE
F
A
E
B
NPE
D
C
188
3AL 61259 AA AA
Figure 111. crossing, broadcast, unprotected, no prot. in NPE, HP
156 / 188
All rights reserved. Passing on and copying of this
document, use and communication of its contents
not permitted without written authorization from Alcatel.
All rights reserved. Passing on and copying of this
document, use and communication of its contents
not permitted without written authorization from Alcatel.
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED
01
957.130.872 H
SC.3: NPE
F
A
E
B
NPE
D
C
188
3AL 61259 AA AA
Figure 112. crossing, broadcast, SNCP, no prot. in NPE, HP
157 / 188
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED
01
957.130.872 H
SC.3: NPE
F
A
E
B
NPE
D
C
188
3AL 61259 AA AA
Figure 113. crossing, unidir, SNCP, no prot. in NPE, HP
158 / 188
All rights reserved. Passing on and copying of this
document, use and communication of its contents
not permitted without written authorization from Alcatel.
All rights reserved. Passing on and copying of this
document, use and communication of its contents
not permitted without written authorization from Alcatel.
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED
01
957.130.872 H
SC.3: NPE
F
A
E
B
NPE
D
C
188
3AL 61259 AA AA
Figure 114. crossing, unidir, D&C, no prot. in NPE, HP (1)
159 / 188
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED
01
957.130.872 H
SC.3: NPE
F
A
E
B
NPE
D
C
188
3AL 61259 AA AA
Figure 115. crossing, unidir, D&C, no prot. in NPE, HP (2)
160 / 188
All rights reserved. Passing on and copying of this
document, use and communication of its contents
not permitted without written authorization from Alcatel.
All rights reserved. Passing on and copying of this
document, use and communication of its contents
not permitted without written authorization from Alcatel.
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED
01
F
A
957.130.872 H
SC.3: NPE
E
B
NPE
D
C
F
A
E
B
188
Figure 116. crossing, bidir, SNCP, no prot. in NPE, HP
3AL 61259 AA AA
NPE
D
C
161 / 188
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED
01
F
A
957.130.872 H
SC.3: NPE
E
B
NPE
D
C
F
A
E
B
188
3AL 61259 AA AA
NPE
D
C
162 / 188
All rights reserved. Passing on and copying of this
document, use and communication of its contents
not permitted without written authorization from Alcatel.
9 THE 4–F MS SPRING RM SIDE
9.1 Introduction
not permitted without written authorization from Alcatel.
All rights reserved. Passing on and copying of this
document, use and communication of its contents
Glossary
4f MS–Spring
9.1.1 Glossary
– Tail(–end) node: the node that detects a failure or receives an external command from the manager
and then initiates the K1K2 protocol sending a protocol request (a bi–directional failure is detected
by two adjacent nodes, that for this reason are both Tail nodes).
– Head(–end) node: the node that receives a K1K2 protocol request from a Tail node and
acknowledges it (via a protocol reply) to complete the protocol process.
– Served request (trigger): a request for which some consequent action takes place according to the
MS–SPRING rules.
– Pending request (trigger): those triggers that are not served due to the presence of higher priority
triggers. Also the simultaneous presence of the equal priority triggers may lead to a pending
condition.
– Serving nodes: the two nodes that talk to each other on the K1K2 channel, sending their protocol
messages in order to serve their requests. If more than one request is served on the ring, the serving
nodes may be more than two.
– Intermediate nodes: the nodes that are not directly interested by the fault.
– MS–SPRING request (trigger): any kind of valid input to the MS–SPRING machine:
equipment/signal failure, signal degrade, external commands, and protocol requests/replies.
– protocol request: a protocol message issued by a Tail node toward its peer request node (that may
either be a Tail node or Head node, depending on the nature of the trigger).
– protocol reply: a protocol message issued by a Head node back to its peer Tail node to acknowledge
a Tail node’s protocol request.
– protocol message: a K1K2 code sent on the K1K2 channel that may either be a protocol request
or protocol reply.
– Lockout of Working channels – ring (LW–R): command that disables the node capability to issue
a ring protocol request of any kind. The node is anyway allowed to issue ring protocol replies. The
command is local, i.e. it is not forwarded to the other nodes through K1K2 channels.
– Lockout of Working channels – span (LW–S): command that disables the node capability to issue
a span protocol request of any kind. The node is allowed to issue span protocol replies. The
command is local, i.e. it is not forwarded to the other nodes through K1K2 channels.
1AA 00014 0004 (9007) A4 – ALICE 04.10
– Lockout of Protection channels – span (LP–S): command that preventes the use of the protection
channels over the addressed span. The command is not local, i.e. it is forwarded through K1K2
channels also to the other nodes that, as a consequence, do not take any action involving the
addressed span.
ED 01 SC.3: NPE
188
9.1.2 4f MS–Spring
9.1.2.1 Introduction
For Paths and Trails a new attribute is defined, enabling the usage of low priority resources. This attribute
is taken into account during path allocation.
The protection capabilities of the ring are based on the information stored in the Ring Traffic Map and
evaluated by each NE in order to take the appropriate decisions in case of fault.
The “component” of the ring traffic map related to each path and trail is evaluated and sent to all NEs in
the ring.
In order to avoid misconnections, RM, during the implementation phase, sends the update of the ring traffic
maps before the creation of connections, and viceversa, during the de–implementation phase, updates
the maps only after the deletion of connections.
The ring traffic map is not shown to the RM operator, because the same information are provided by the
path/trail route display functionality.
The D&C is performed using protecting AU4s between Service Nodes according to NE implementation.
– D&C on interconnected NPE rings is not always able to survive to double failures, a failure per
ring, (this happens when the primary node of one ring is connected to the secondary node of the other
ring)
ED 01 SC.3: NPE
188
9.1.2.2 Impacted classes
9.1.2.2.1 Path
All rights reserved. Passing on and copying of this
document, use and communication of its contents
– Server MS protection usage profile: it represents the profile of the MS resources to be used in
allocating the path.
The possible values are:
• Normal (default)
When crossing 4 Fibers MS–Spring, the path uses only working (high priority) resources,
except for primary and secondary nodes of the double interconnection with another ring,
because these nodes are characterized by the Drop & Continue protection.
as a result, in the segment between service nodes:
– if the path is bidirectional (Figure 118. ), the used resource (nodes E, D, H, I) can be only
the protection one: a bidirectional D&C IC on protection is performed in the primary nodes
(D, H);
– if a path is unidirectional point–to–point (Figure 119. ), the used resource is:
• protection if the signal flows into the service nodes (B, C): a unidirectional D&C IC
on protection is performed in the primary node (B);
• working if the signal flows out of the service nodes (E, D): a multipoint connection
is performed in the primary node (E); this allows the user to perform subsequent add
leg operation;
it is possible to use the protection resource instead of the working (nodes E, D), e.g. forced
by a constraint (Figure 120. );
– if a path is broadcast (Figure 121. ), the used resource is:
• protection if the signal flows into the service nodes (B, C) like in a unidirectional
point–to–point path: a unidirectional D&C IC on protection is performed in the primary
node;
• working if the signal flows out of the service nodes (E, D): a multipoint connection
is performed in the primary node);
it is not possible to use the protection resource instead of the working one.
As a result of the previous rules defined for unidirectional and broadcast paths, a unidirectional
point–to–point path can become broadcast only if the working resources are used between
service nodes (nodes E, D in Figure 121. ).
ED 01 SC.3: NPE
188
9.1.2.2.2 Trail
A B C
NPE
F E D
G H I
NPE
N M L
ED 01 SC.3: NPE
188
working
protection
not permitted without written authorization from Alcatel.
SNCP
All rights reserved. Passing on and copying of this
document, use and communication of its contents
A B C
NPE
F E D
SNCP
Figure 119. unidirectional protected path (using working resource between nodes E and D)
working
protection
SNCP
A B C
NPE
F E D
SNCP
1AA 00014 0004 (9007) A4 – ALICE 04.10
Figure 120. unidirectional protected path (using protection resource between nodes E and D)
ED 01 SC.3: NPE
188
working
protection
SNCP
SNCP
An attribute specifies if the Physical Connection is Working (i.e. it connects main ports, involved in a MS
protection mechanism) or Protecting (i.e. it connects spare ports) or Normal (i.e. it connects ports not
involved in any MS protection mechanism or, if, e.g. in the 2f MS–Spring, the LP traffic is not allowed). This
attribute is automatically built in case of usage of the 1664SM where Main and Spare aggregate ports are
clearly defined. For Second generation NEs the information has to be inserted manually by the user during
network construction.
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED 01 SC.3: NPE
188
9.1.2.3 New classes
The following new classes (the grayed ones) are inserted in order to manage the MS–SPRING topologies.
not permitted without written authorization from Alcatel.
All rights reserved. Passing on and copying of this
document, use and communication of its contents
4f MS–Spring
path / trail (ET)
Node
AU4
Map
4f MS
Protection Block
end node
AU4 RTM
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED 01 SC.3: NPE
188
9.1.2.3.1 4f MS Protection Block
– Configuration State. It is the state requested at the interface Functional Agent / TSD–IM Front End
Processor and can assume the following values:
• virtual.
The MS–SPRING et topology is only planned inside the RM (i.e. is in the state “defined”) and
is not established inside the NE (the ring coordinator object is not present in the NE)
• active.
The MS–SPRING et topology is active in the NE, i.e. it is “implemented” in RM (see also
Transition State)
– Transition State. It describes the transition state of the MS–SPRING in the NE during the
configuration phase. The following values are possible:
• idle. It is the value corresponding to the value “virtual” of the Configuration State
• defined. The ring has been defined by the action applied on the Protection Manager MOC in
NE: the information on working/protecting east/west msTTPs have been provided to the NEs.
As a result the Ring Coordinator object is created in the NE and all other objects (Ring Map, Ring
Traffic Map or Squelch Table, Ring Protection Group, Ring Protection Units ...) are created and
correlated to the Ring Coordinator. The Ring Coordinator has the status “enabled”
• populated map. The Ring Map has been populated according to the information contained in
the ring map info attribute through the populate action applied to the Ring Coordinator. As a
result, the information describing the map of the nodes inside the ring have been stored both
inside the Ring Map and in the Ring Traffic Map accordingly.
• activated. The Ring Coordinator has been activated (activate action). As a result, the protected
msTTPs, unprotected CTPs, working/protecting east/west side have been put in relation
according to the ring type (2/4 fiber with/without extra–traffic) and the MS–Spring mechanism
is active
The Configuration State attribute “active” is consistent with the NE ’status’ if the 4–F protection block
entered the sequence “defined”, “populated map”, “activated”, i.e. if the Ring Coordinator is
“activated”. In this case the attribute value is “activated” and the Consistency Status is “normal” .
– node id: it refers to the node id attribute inside the node entity
– ring map info: it is a string representing the sequence of node identifiers following the direction
east–west in the ring. It is used to provide to the NE the information usefull when filling the Ring Map
object (e.g.: “x,y,z,w”. Starting from the node x and moving to east the found nodes are in the
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED 01 SC.3: NPE
188
– traffic map: the attribute is a sort of ’token’ used to apply the alignment of the Ring Traffic Map inside
the NE, according to the info, if any, contained in the AU4 Transport Map, plus the implicit information
that, when the au4(s) or piece(s) of au4(s) are not contained inside the AU4 Transport Map, no
connection has to be present inside the Ring Traffic Map.
not permitted without written authorization from Alcatel.
All rights reserved. Passing on and copying of this
document, use and communication of its contents
– West Reliable ( protected ) Resource: it is the id of the reliable msCtpCap on the west main port
– East Reliable Resource: it is the id of the reliable msCtpCap on the east main port
– West Working Unreliable Resource: it is the id of the unreliable msCtpCap on the west main port
– East Working Unreliable Resource: it is the id of the unreliable msCtpCap on the east main port
– West Protecting Unrealiable Resource: it is the id of the unreliable msCtpCap on the west spare
port
– East Protecting Unreliable Resource: it is the id of the unreliable msCtpCap on the east spare port
– Ring WTR (Wait To Restore time): it containes the value to provide to the NE during the MS–Spring
provisioning phase.
– West Span WTR (Wait To Restore time): it contains the value (west side) to provide to the NE during
the MS–Spring provisioning phase.
– East Span WTR (Wait To Restore time): it contains the value (east side) to provide to the NE during
the MS–Spring provisioning phase.
– Current User Command. The attribute indicates the command (none, lockout working west, lockout
working east, west ring force switch...) requested by the RM user.
• no command: null
N.B. the WTR has been put together with the possible active commands because, even
if it is not a user command, it can be cleared through a user command as well as the
others.
ED 01 SC.3: NPE
188
– West Ring Pending Command
This attribute indicates the ring command that is currently stored to but not served by the NE on its
West side. The following values shall apply:
• no command: null
• no command: null
ED 01 SC.3: NPE
188
– West Lockout Working Span ( not supported by the current NE version )
This attribute indicates whether a Lockout of Working Channels Span command is currently stored
to the NE on its West side. It can assume the following values: none, lockoutWorking.
not permitted without written authorization from Alcatel.
This attribute indicates the K1K2 protocol failure detected on the West side of the node. The following
values shall apply:
ED 01 SC.3: NPE
188
– East Protocol Role
This attribute represents the status of a node in terms of how the node is acting on the protocol
channel in order to serve either a local or remote trigger regarding its East side. The values of this
attribute may be:
The AU4 Map is not visible at the user interface; it represents the “piece of row” of the ring traffic map
contained in a path or trail.
– et identifier;
ED 01 SC.3: NPE
188
9.1.2.3.3 End node
The End node is not visible at the user interface; it represents one end of a Au4 map.
not permitted without written authorization from Alcatel.
– AU4 MapId;
– node Id;
– role:
(dropInsert, passThrough, drop, insert, pointToMultiP, dropContinueW, dropContinueP, continue,
lastDropContinue, concatenated, firstPointToMultiP, lastPointToMultiP);
– connected Au4 # (with the same rules described for the same attribute in the AU4 map class);
it is used for time slot interchange only, included the drop & continue on a protection channel.
The AU4 RTM is visible at the user interface; it represents a whole row of the ring traffic map.
– containment information (network Id, subnetwork Id, ET id, node Id, 4FmsProtBlock Id);
– Au4 # (with the same rules described for the same attribute in the AU4 map class);
No identifier is needed (an instance of this class can be identified by nodeId and AU4 #).
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED 01 SC.3: NPE
188
9.1.2.4 RM behaviour during 2f/4f MS–SPRING topology Activation
• the involved ports have to be connected in a consistent way in the whole et (main–west to
main–east, spare–west to spare–east).
If one of the above checks fails, the Activation of the MS–SPRING topology fails (the user has to re–build
the et topology in the correct way)
ED 01 SC.3: NPE
188
9.1.2.6 Topology Implementation
a) starting from the “sequence number in et” node attribute (it provides the position of each node in the
All rights reserved. Passing on and copying of this
document, use and communication of its contents
et), it builds the string corresponding to the ring map info attribute of the 4f MS Protection Block MOC
1) it creates, ’contained’ in the node, the MS Protection Block MOC filling the Configuration State
attribute with the “virtual” value
2) it submits to the proper TSD–IM Front End Processor (in charge of the node) the request to
change on the MS Protection Block (contained in the node and related to the et) the
Configuration State attribute to the “active” value and the ring map info attribute to the string set
up at step a ). In case the topology is modified adding/removing a node and the et is requested
to be implemented again, the topology implementation process submits the request to change
the ring map info attribute only.
If the submitted request is to change on a MS Protection Block the Configuration State attribute from
“virtual” to “active” and the ring map info to the provided value, the TDS–IM Front End Processor executes
the following steps:
a) it sets the Configuration State and the ring map info to the requested value (active) and the
Consistency Status to “aligning”
b) it applies the consistency to the NE, i.e. it sends to the NE the proper commands in order to achieve
on NE side the ’status’ consistent with the transition “virtual” to “active” of the MS Protection Block
Configuration State. Three consecutive phases are accomplished on the NE (ring provisioning info,
map with topological info and ring activation). The Transition State of the MS Protection Block keeps
the mapping with the final state inside the NE of each phase: supposing that the Transition State
starting value is “idle”, the proper command (establish action on Ring Protection Manager MOC) is
sent in order to achieve the “defined” state. If the first phase is successful, the Transition State is set
to “defined” and the next command is sent (populate ring map action on Ring Coordinator MOC). If
the second phase is successful, the Transition State is set to “populated map” and the last command
is sent (activate action on Ring Coordinator MOC). If also the last phase is successful, the NE ’status’
is consistent with the value “active” of the Configuration State attribute, so the Consistency Status
of the MS Protection Block is changed from “aligning” to “normal”, the Transition State is set
“activated” and a positive response is sent back to the Topology Implementation process.
If one of the three phases fails, the NE ’status’ is not consistent with the value “active” of the
Configuration State attribute, so the Consistency Status of the MS Protection Block is changed from
“aligning” to “failed to align”, a KO response is sent back to the Topology Implementation process
and the Transition State keeps the value corresponding to the state associated to the last successful
phase (in this way, upon reception of the same request from the Topology Implementation process,
the TSD–IM Front End Processor knows the failed phase from which starting to re–execute)
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED 01 SC.3: NPE
188
If the submitted request is to change the ring map info only, the TSD–IM Front End Processor executes
the following steps:
a) it sets the ring map info attribute to the requested value and the Consistency Status to “aligning”
c) if step b ) is ok, the Consistency Status is set “normal” and a positive response is sent back to the
Topology Implementation process otherwise it is set “failed to align” and a ko response is sent back.
The following table shows the possible combined values assumed by the three represented states during
a MS–Spring topology implementation .
Table 15. Transition of the three states during MS–Spring implementation (case virtual –> active)
The remove node functionality, when the node belongs to a MS–Spring topology, updates the maps in the
remaining NEs.
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED 01 SC.3: NPE
188
9.1.2.8 RM behavior during 2f/4f MS–SPRING topology removal
If the topology to remove is a MS–Spring et, before executing the usual operations, common to each type
of topology, the Topology Implementation process performs the following specific steps:
a) for each node of the et, it submits to the proper TSD–IM Front End Processor (in charge of the node)
the request to change the Configuration State of the MS Protection Block (contained in the node) to
the “virtual” value.
b) if the TSD–IM Front End Processor gives back a positive response for each change request
submitted at the previous step, the topology implementation process performs the further following
steps:
1) for each node contained in the et, it removes the MS Protection Block object.
Otherwise, if at least one negative response is received, the ring topology removal activity requested
by the user fails, i.e. the ring topology working state is set to “failed to remove”.
If the submitted request is to change on a MS Protection Block the Configuration State attribute to “virtual”,
the TDS–IM Front End Processor executes the following steps:
a) it sets the Configuration State to “virtual” and the Consistency Status to “aligning”
b) it applies the consistency to the NE, i.e. it sends to the NE the proper commands in order to achieve
on NE side the ’status’ consistent with the transition of the MS Protection Block Configuration State
to “virtual”. To do this, two consecutive phases are accomplished in the NE (de–activate the
MS–Spring so that MS–Spring mechanism is stopped, the failure condition released inside the ring
but all the provisioned info are kept and then dismissed it so that all the rlevant MOCs are destroyed).
The proper command (de–activate action on the Ring Coordinator MOC) is sent. If successfull, the
Transition State is set “populated map” and the dismiss action on the Ring Coordinator MOC is sent.
If also the second phase is successfull, the Transition State is set “idle”, the NE ’status’ is consistent
with the value “virtual” of the Configuration State attribute, so the Consistency Status of the MS
Protection Block is changed from “aligning” to “normal”.
If one of the two phases fails, the NE ’status’ is not consistent with the value “virtual” of the
Configuration State attribute, so the Consistency Status of the MS Protection Block is changed from
“aligning” to “failed to align”, a ko response is sent back to the Topology Implementation process and
the Transition State keeps the value corresponding to the state associated to the last successfull
phase (in this way, upon reception of the same request from the Topology Implementation process,
the TDS–IM Front End Processor knows the failed phase from which starting to re–execute)
The following table shows the possible combined values assumed by the three represented states during
a MS–Spring topology removal.
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED 01 SC.3: NPE
188
Table 16. 0.Transition of the thre states during MS–Spring topology removal
ED 01 SC.3: NPE
188
9.1.2.9 RM behavior during path or trail implementation
The RM behavior during path/trail implementation is constituted by the behavior of the path/trail
implementation process and the behavior of the TSD–IM Front End Processor.
not permitted without written authorization from Alcatel.
All rights reserved. Passing on and copying of this
document, use and communication of its contents
If the transport entity (path/trail) to implement crosses a MS–Spring et topology, the path/trail
Implementation process performs the following further steps, before interacting with the TSD–IM Front
End Processor:
a) it creates, contained in the involved MS–Spring et MOC, the AU4 Maps (more than one, if a drop and
continue on protecton is in the path), filling the pointer to the related path/trail and the map
information; it creates also the related end nodes. The target state is set to implemented, the current
state is set to allocated.
b) before requesting the modification of the Configuration State from “allocated” to “implemented” of
each cross connection belonging to the path/trail, for each node belonging to the et (not only the
nodes involved in the path/trail) it submits to the TSD–IM Front End Processor the request to align
the Au4 RTM ( Ring Traffic Map )
If the TSD–IM Front End Processor gives back a positive response for each change request
submitted at the previous step, the path/trail implementation process starts the usual implement
path/trail needed operations; otherwise the path/trail implementation activity requested by the user
fails, i.e. the path/trail working state is set to “failed to implement”.
c) The current state of the Au4 map is updated after the reception of the last response from T–FEPs;
this state is used in order to propagate the correct configuration state to the path and to upper level
connections in topology:
• the current state is set = target state (i.e. implemented) if all the responses are OK (the
responses are OK also in case of notAligned objects).
• the current state is set = partially implemented if at least one response is KO;
According to the request received by the Path/trail Implementation process, the TSD–IM Front End
Processor performs the following steps:
a) it sets the Consistency Status of the Au4 RTM to the proper value: “notAligned” in case of download
disabled mode, “aligning” if it is allowed the operation towaards the NE.
b) if notAligned, a positive response is sent back to the path/trail implementation process, else it applies
the consistency with the NE, i.e. it sends to the NE the proper commands (compose traffic map or
update squelch table) in order to update the Ring Traffic Map (or the Squelch Table in 2 fiber
MS–Spring) according to the AU4 Map info and related end nodes (e.g., if the ring is a 4f MS–Spring,
starting from the source node, supposing one source node and one end node, and moving according
to the given “ring direction”, all the cross–connections of the starting, crossed and ending nodes are
provided with their type: insert–drop/pass–through/drop&continue....)
c) if step b ) is successfull, the Consistency Status of the involved AU4 RTM is set “normal” and a
positive response is sent back to the path/trail implementation process; otherwise it is set “failed to
align” and a ko response is sent back.
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED 01 SC.3: NPE
188
9.1.2.11 RM behavior during path or trail de–implementation
The RM behavior during path/trail de–implementation is distinguished between the behavior of the
path/trail implementation process and the behavior of the TSD–IM Front End Processor.
If the transport entity (path/trail) to de–implement crosses a MS–Spring et topology, after having
successfully requested the modification of the Configuration State from “implemented” to “allocated” of
each cross connection belonging to the path/trail, the path/trail Implementation process performs the
following steps:
b) for each node belonging to the et (not only the nodes involved in the path/trail) it submits to TSD–IM
Front End Processor the request to align the Au4 RTM.
c) The current state of the Au4 map is updated after the reception of the last response from T–FEPs;
this state is used in order to propagate the correct configuration state to the path and to upper level
connections in topology.
• the current state is set = target state (i.e. allocated) if all responses are OK (the responses are
OK also in case of notAligned objects). As a result, the Au4 map is deleted and the path is set
to allocated;
• the current state is set to partially implemented if at least one response is KO. As a result, this
AU4 map is not deleted from database at this point, in order to take it into account in the
successive calculations of the ring traffic map; the path is set partially implemented.
The general rule is: an AU4 map is deleted when both target state and current state are allocated.
This behavior is necessary, in order to take into account that an action to T–FEP can be lost (e.g. the
T–FEP is down): in this case, no misalignment information can be stored in the AU4 RTM object.
Due to the fact that the consistency is applied at node level and not at ring level, the presence of a failure
inside the ring can lead to “misconnections” while consistency is on–going.
The only way available to the user to avoid “misconnections” is to manually perform for each node inside
the ring the “lockout of protection” command, before applying the Consistency Download activity.
This activity is performed by TSD–IM Front End Processor process.
It is applied the same algorithm as in case of the path/trail implementation/deimplementation; the only
difference is that the activity is internal and not triggered by the Path / trail Implementation process.
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED 01 SC.3: NPE
188
9.1.2.14 RM behavior during consistency audit
It checks the differences between RM mib and NE, using the read Traffic Map row action defined in
TSD–IM; if there are differences in an Au4, the related Au4 RTM object is set to
notAligned/consistencyMismatch.
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED 01 SC.3: NPE
188
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED
01
957.130.872 H
SC.3: NPE
188
3AL 61259 AA AA
184 / 188
All rights reserved. Passing on and copying of this
document, use and communication of its contents
not permitted without written authorization from Alcatel.
10 DISPLAY OF THE PROTECTION BLOCKS
A view of all the MS Protection Blocks in a MS–SPRing is available in the browser. To display this view,
execute the following procedure:
a) From the browser point with the mouse at the 4–F MS–Spring and open the pop–up menu. Select
item Display all related items...
b) From the selection box select item All Protection blocks in MS Spring 4–F and click on No Filter
button. The Protection block drawing window is displayed. See Figure 123.
ED 01 SC.3: NPE
188
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED
01
957.130.872 H
SC.3: NPE
Protection blocks
188
3AL 61259 AA AA
186 / 188
All rights reserved. Passing on and copying of this
document, use and communication of its contents
not permitted without written authorization from Alcatel.
All rights reserved. Passing on and copying of this
document, use and communication of its contents
not permitted without written authorization from Alcatel.
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED
01
957.130.872 H
SC.3: NPE
Figure 124. Manage switch menu.
The figure which follows show the commands available to manage switches.
188
3AL 61259 AA AA
187 / 188
INDEX
H P
ED 01 SC.3: NPE
188
1354RM REL.5.2B OPERATOR’S HANDBOOK
not permitted without written authorization from Alcatel.
All rights reserved. Passing on and copying of this
document, use and communication of its contents
TABLE OF CONTENTS
1 INTRODUCTION . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
1.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
1.2 Target audience . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
1.3 Document structure . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
3 GLOSSARY OF TERMS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27
4 PRELIMINARY OPERATIONS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35
4.1 Logging in to the System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35
4.2 Workspace description . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36
4.3 Locking the screen . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37
4.4 Logging Out . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38
6 VIEWS DESCRIPTION . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43
1354RM REL.5.2B
OPERATOR’S HANDBOOK
ED 01 SC.4:GETTING STARTED
58
7 SDH NETVIEW : MAP NAVIGATION . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47
8 NAVIGATION . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 55
INDEX . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 58
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED 01 SC.4:GETTING STARTED
58
LIST OF FIGURES AND TABLES
ED 01 SC.4:GETTING STARTED
58
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED
01
957.130.872 H
SC.4:GETTING STARTED
58
3AL 61259 AA AA
4 / 58
All rights reserved. Passing on and copying of this
document, use and communication of its contents
not permitted without written authorization from Alcatel.
1 INTRODUCTION
1.1 Introduction
not permitted without written authorization from Alcatel.
All rights reserved. Passing on and copying of this
document, use and communication of its contents
This document aims at introducing the 1354RM working environment, to the users of the system, in terms
of getting access to the system, the environment utilities, the existing 1354RM functionalities and
navigation through the system.
• Windows
• Glossary
• Logging Operation
• Workspace description
• Logout
• View Description
• Map Navigation
• Navigation
• Help System
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED 01 SC.4:GETTING STARTED
58
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED
01
957.130.872 H
SC.4:GETTING STARTED
58
3AL 61259 AA AA
6 / 58
All rights reserved. Passing on and copying of this
document, use and communication of its contents
not permitted without written authorization from Alcatel.
2 REGIONAL MANAGER GRAPHICAL USER INTERFACE PRINCIPLES
2.1 Generalities
not permitted without written authorization from Alcatel.
All rights reserved. Passing on and copying of this
document, use and communication of its contents
The Regional Manager user interface is based on the Hewlett Packard Open View Windows (HP–OVW)
standard customized by Alcatel and on normal X windows. This section will describe the different elements
composing the interface as well as the users general environment.
The users work environment can be partitioned into the following utilities:
– Keyboards: the different keys and the actions they induce will be defined.
– Mouse: the operation of the different buttons will be explained.
– Workspace: A workspace is the screen area where you bring the applications needed for your work,
arrange them to suit your preferences, and put them away after finishing your job. Each workspace
occupies the entire display, and you switch from one workspace to another using a control.
– Icon: A small, graphic representation of an object on the workspace. Objects can be ”iconified”
(turned into icons) to clear a cluttered workspace and ”normalized” (returned to their original
appearance) as needed. Processes executing in an object continue to execute when the object is
iconified.
– Windows: the window’s general layout, menu and configuration (size) will be described.
– Dialogue Boxes: the different types of boxes and their aspect is defined so that the user will be
familiar with them.
ED 01 SC.4:GETTING STARTED
58
2.1.1 Keyboard
This cursor takes the form of an I–beam pointer (see Figure 2. ). It indicates where the text is going to be
entered. This cursor is frequently met when using Entry boxes (see chapter 2.2.7). The cursor can be
moved horizontally and vertically using the Navigation keys.
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED 01 SC.4:GETTING STARTED
58
2.1.3 Mouse
The mouse is associated with a mouse pointer. This pointer represents the current position of the mouse
on the screen. Any movement of the mouse, on the mouse pad, moves the pointer on the screen in an
not permitted without written authorization from Alcatel.
There are 3 Mouse buttons. The actions that are undertaken using the different mouse buttons depends
on their configuration. The following figure shows a right handed mouse configuration.
Drag button
Select button
Custom button
With a left handed mouse configuration, button 3 becomes the select button.
– Selecting an object: first move the mouse pointer to the object. Then select the object by clicking
on it with the ”Select” mouse button. The object appearance changes indicating that it has been
selected.
– Drag–and–drop mouse functionality: used for displacing objects or icons on the workspace. To
use it, first move the mouse pointer to the object you wish to move. Then press, and hold down, the
Drag mouse button and drag the object to the chosen area using the mouse. When the object has
reached the chosen area, release the mouse button.
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED 01 SC.4:GETTING STARTED
58
2.1.3.3 Mouse pointer signification
The shape of the mouse pointer gives an indication of what actions can be undertaken in that particular
mouse position. The user will soon understand the different functionalities related to the mouse pointer
is open and that a menu item can now be selected by clicking.
This I–beam pointer is usually associated with windows and entry boxes.
They indicate that a written entry can be performed here.
x The X pointer shape indicates that the mouse is outside an application area
(for example a window).
The work in progress pointer symbol indicates that some action is in pro-
gress.
The cross pointer is used to select a window to be printed as part of a screen
hardcopy process.
The Caution sign indicates that the graphical object under the mouse is not
selectable. For example, during a logout process, this pointer appears when
the mouse pointer is outside the confirmation dialogue box.
Numerous actions can be undertaken by double clicking using the mouse. For example, opening windows
related to objects (this is of importance during the construction of the Network Topology as shall be seen
in the Operation Manual) and opening iconified windows.
a) To open an object (file, directory..).
– Place the mouse pointer over the object you wish to open.
– Click twice, rapidly, using the ”Select” mouse button on the object.
– The mouse pointer will take the work in progress representation until the object should open.
b) To open a symbol submap (this refers to the Operation Construction manual).
– Place the mouse pointer over the symbol whose submap you wish to open.
– Click twice, rapidly, using the ”Select” mouse button on the object.
– The mouse pointer will take the work in progress representation until the symbol’s submap should open.
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED 01 SC.4:GETTING STARTED
58
2.2 Windows
This section defines the attributes of windows and describes their general aspects.
not permitted without written authorization from Alcatel.
All rights reserved. Passing on and copying of this
document, use and communication of its contents
Maximize
Window menu button Window title button
Iconify
button
Menu Bar
Client area
Resize borders
The Client area is the area in which you work. You can write text, insert or construct images or display
Network views. The window title gives the name of the window.
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED 01 SC.4:GETTING STARTED
58
2.2.3 Window menu
– Restore: restores the window from the iconified state to its normal size (in this case the window is
already opened so this menu option is greyed. Greyed menu options are explained in chapter
2.2.6.5).
– Move: displaces the window around the workspace,
– Size: changes the size of the window,
– Minimize: iconifies the window,
– Maximize: gives the window the full screen size,
– Lower: places the window at the back of the workspace (this is helpful if many windows are opened
and overlap on the workspace),
– Occupy Workspace...: gives you the possibility of selecting the workspace on which the window is
1AA 00014 0004 (9007) A4 – ALICE 04.10
shown,
– Occupy All Workspaces: places the window on all the workspaces,
– Unoccupy Workspace: removes the window from the workspace from which this option is selected,
ED 01 SC.4:GETTING STARTED
58
2.2.4 Scroll bars
If the window size does not enable all the information contained in the client area to be visible, scroll bars
enable you to move up, down, right or left in the client area.
not permitted without written authorization from Alcatel.
All rights reserved. Passing on and copying of this
document, use and communication of its contents
There are vertical and horizontal scroll bars as shown in the figure below.
Slider
Stepper
arrows
Scroll Region
tion desired. The contents in the client area are displaced as long as the slider moves.
ED 01 SC.4:GETTING STARTED
58
2.2.5 Buttons
In any working application related to the SDH Manager, the operator will have to confirm, cancel, select
options or ask for help using buttons. Different types of buttons exist and are described in this section.
– The graphical image representing the button. The buttons are generally of rectangular or square shape.
– The label identifying the action associated with the button. The label is placed on the button.
Examples of the different types of push buttons are described in the figure below.
To apply the action related to a push button, position the mouse pointer over the button you wish to select
and click using the ”Select” mouse button.
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED 01 SC.4:GETTING STARTED
58
2.2.5.2 Radio buttons
Each radio button represents a single choice selection. Selecting one radio button automatically deselects
the others in the set.
not permitted without written authorization from Alcatel.
All rights reserved. Passing on and copying of this
document, use and communication of its contents
To select a radio button, place the mouse pointer over the button needed and click on it using the ”Select”
mouse button.
ED 01 SC.4:GETTING STARTED
58
2.2.5.3 Option buttons
When you click on an option button, you open an option menu from which you choose a single item. Option
buttons are used when a list of items are mutually exclusive.
N.B. The example given above enables you to choose the zooming factor for a submap. To open the
option menu, click on the option button with the ”Select” mouse button. Select an item from the
list that opens.
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED 01 SC.4:GETTING STARTED
58
2.2.6 Menus
In this section we describe an important aspect of the user interface. The user constantly has to open win-
dows, select icons and navigate through the different functionalities of the SDH Manager. To do this he
not permitted without written authorization from Alcatel.
A menu consists of a title, that usually identifies the nature of the actions that can be undertaken, and a
list of options associated with actions.
– menu bars,
– pull down menus,
– cascading menus,
– tear_off menus,
– pop–up menus.
These types of menus are described in detail below. The details concern a view of the menu types on real
windows.
They are present at the top of a window, under the title of the window. They appear automatically along
with the window. An example is given in the figure below. They contain the titles from which pull down me-
nus and cascading menus are opened.
Menu Bar
Window title
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED 01 SC.4:GETTING STARTED
58
2.2.6.2 Pull down menus
A pull down menu is pulled down from a menu item present in a menu bar. To open a pull down menu, click
on the title of the menu you need to open with the ”Select” mouse button.
N.B. A menu option followed by ”...” means that selecting this option opens another view.
For example the Open... or Save As... menu options in the File pull down menu.
ED 01 SC.4:GETTING STARTED
58
2.2.6.3 Cascading menus
Cascading menus are derived from pull down menus and represent additional options for the pull down
menu item selected. Cascading menus are indicated if the ”>” sign follows an option in a pull down menu.
not permitted without written authorization from Alcatel.
All rights reserved. Passing on and copying of this
document, use and communication of its contents
To open a cascading menu, click on the menu option with the ”>” sign in the pull down menu.
Cascading menu
Pop–up menus appear when you click, using the ”Custom” mouse button, in the following cases:
ED 01 SC.4:GETTING STARTED
58
2.2.6.5 Unavailable menu items and Menu item Selection
In an opened menu (pull down or cascading), any item that is greyed indicates that you do not have access
to the menu item. Clicking on it will not activate it. You have access to all the items that are not greyed.
To select an item from a menu (any type of menu) place the mouse pointer over the item and click using
the ”Select” mouse button. The item will appear highlighted.
Selected menu
item ”highlighted”
2.2.6.6 Mnemonics
A mnemonic is a single letter that is underlined in a menu (in Menu bars, Pull down menus or Cascading
menus). For example, in Figure 11. every item of the menu bar has a single letter underlined. That letter
is the mnemonic. It enables you, via the keyboard, to undertake the selection of the corresponding menu
item.
To open a pull down menu press, simultaneously, the ALT key and the mnemonic of the pull down
menu you wish to open. The pull down menu opens immediately.
To select an option from the opened pull down menu, press on the keyboard the character corre-
sponding to the mnemonic of the option.
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED 01 SC.4:GETTING STARTED
58
2.2.7 Entry boxes
Entry boxes are windows in which you can consult, add or modify information or data. Figure 14. gives
All rights reserved. Passing on and copying of this
document, use and communication of its contents
Entry box
(text entry
area)
– Entry Box Label: Indicates what is entered or what is to be entered in the entry area concerned.
Entry Box: When selected, enables you to enter a text.
N.B. The text entry areas may not be accessible for entering text. In this case they have a different
colour than other entry areas in which text can be entered. In the example above, the Name of
Open Map entry box may not be used for text entry. Its colour is lighter than the other entry areas.
Furthermore the text cursor is dotted, indicating that text cannot be entered.
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED 01 SC.4:GETTING STARTED
58
To access an entry box and enter text, click on the text entry area. The text cursor begins to blink. The text
cursor has an I–beam shape. The following keys are useful when entering text.
,
, , Displace the cursor along the text.
To access another entry box, you can either click in the entry box using the ”Select” mouse button or use
the Tab key on the keyboard.
Selecting the Tab key, on the keyboard, enables you to pass to an entry box situated beneath the one from
which the Tab key is pressed. Selecting the Shift+Tab keys gives you access to an entry box situated
above the one from which the action is launched.
N.B. The Tab key does not give you access to those entry boxes that are read only and in which you
cannot write. Therefore, when a dialogue box containing entry boxes opens, the Tab key takes
you directly to the first entry box in which you can write.
This concerns the use of upper case and lower case characters when entering text.
The text entered is re–displayed in its original form.
This means that if upper case characters are given to a Log file name, the name will appear in upper case
characters in the save directory.
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED 01 SC.4:GETTING STARTED
58
2.2.8 Dialogue boxes
2.2.8.1 Generalities
not permitted without written authorization from Alcatel.
Dialogue boxes provide an interface between the SDH Manager and the user. They enable to confirm op-
All rights reserved. Passing on and copying of this
document, use and communication of its contents
erations or consult information, displayed by the system, following an action of the user.
There are many types of dialogue boxes. They generally combine several of the graphical controls de-
scribed previously (scroll bars, push buttons...). The principal dialogue boxes are described below.
A list dialogue box is generally a window that enables you to consult and select items from an existing list.
They have a Title heading indicating the purpose or contents of the List box. Depending on the size of the
List box, scroll bars are present or not.
Different types of List boxes can be distinguished.
Item
selected Push
from list. buttons:
actions
on List
List of
existing
Sub-
maps.
Entry Box
Push buttons
ED 01 SC.4:GETTING STARTED
58
a) Single column lists.
As the name suggests, they enable you to select elements from a single list. An example is shown
below.
They display the data in the form of multiple columns. An example is given below.
You can choose from the list the item you wish, and if possible, using the menu bar options undertake
certain operations concerning the item.
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED 01 SC.4:GETTING STARTED
58
2.2.8.3 Message and Confirmation dialogue boxes
They display messages and information. They require a confirmation of the action you wish to undertake.
Generally, work is suspended till the dialogue box is closed. This means that you first have to click on the
not permitted without written authorization from Alcatel.
corresponding button (OK, Cancel, Help or other options) before resuming operations.
All rights reserved. Passing on and copying of this
document, use and communication of its contents
These dialogue boxes are displayed to warn you about future events pertaining to the action you have
launched.
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED 01 SC.4:GETTING STARTED
58
These dialogue boxes indicate that work is in progress and that you may resume operations only when the work
is over. The dialogue box may close automatically or you may have to click on a push button to close it.
A question dialogue box requests additional confirmation following a command previously launched. The
Cancel push button cancels the operation.
They inform you on the action you have undertaken. In Figure 21. a particular printer was not configured
and could not be used for printing. Sending a print command to this printer generates this dialogue box.
ED 01 SC.4:GETTING STARTED
58
3 GLOSSARY OF TERMS
Administrator:
A user who has access rights to all the Management Domains of the SDH Manager product. He has access
to the whole network and to all the management functionalities.
Alarm:
An alerting indication to a condition that may have an immediate or potentially negative impact on the state
of an equipment or the OS. An alarm is characterized by an alarm begin and an alarm end.
Alarm Status:
Identifies the type and severity of an occurring alarm.
Administrative Unit:
Entity composed of a high order virtual container (VC4) to which is added a pointer indicating the position
of the virtual container in the STM–N frame.
Board:
A board is part of an NE. They are electronic cards that fit into slots in the NE.
ED 01 SC.4:GETTING STARTED
58
Craft Terminal:
Workstation or Personal computer (PC) from which local address to an NE is possible. It can be used to
configure or perform monitoring tasks on the NE.
Degraded Signal:
Alarm sent when the number of errors detected in a received signal frame exceeds a certain threshold.
Filter:
They are related to the alarms or events generated on an NE or internally within the OS itself. They can
be configured by an operator to reject specified types of notifications and limit the processing that is applied
to them.
Flushing:
This deals with logs. When a log is flushed, all its records are deleted.
ED 01 SC.4:GETTING STARTED
58
High Order Path Adaptation:
Function used to assemble the low order virtual containers (VC12 and VC3) into the high order virtual
container (VC4).
not permitted without written authorization from Alcatel.
Function dealing with the establishment of high order connections (cross connections and pass through
connections) in boards.
History Report:
This function enables operators to get information concerning performances, security or alarms on entities
composing the network, or on the network itself. The operator specifies the time period for which he
requires the report.
Information Manager:
Processes used by the SDH Manger that are the functional part of the SDH Manager applications.
Line Terminal:
A line terminal is the end point of a communication link. it is used to transmit or receive signals. They can
undertake signal conversion functions (adapting a signal to two different transmission media) or
multiplexing/demultiplexing functions.
Logs:
Logs are files used to store history data concerning the incoming notifications, operator commands and
system alarms. The size of the log can be configured.
Loss Of Frame:
Alarm linked to the regenerator section termination functional block, associated with the loss of signal
frame.
Loss Of Pointer:
Alarm linked to the section adaptation functional block, associated with the loss of a pointer in an
administrative unit.
Loss Of Signal:
Alarm linked to the physical interfaces, associated with the absence of a received signal.
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED 01 SC.4:GETTING STARTED
58
Low Order Path Adaptation:
Function of the 21x2Mbit/s, 3x34Mbit/s and the 140 Mbit/s tributary boards that maps (or de–maps) the
tributary signal to (or from) the virtual containers used in the synchronous transport domain.
Management Domain:
The SDH Manager product is partitioned into management domains for functional proposes. Each
management domain is associated with functionalities that enable the operators to manage the NEs.
Multiplexer:
Equipment used to combine several signals to produce a single signal at a higher transmission rate and
to decompose it back to the smaller rate signals.
Multiplex Section:
In general, represents the section containing the multiplexed signals.
Network Element:
Either a telecommunication equipment or groups parts of a Telecommunication Network. Have
characteristics compliant with CCITT recommendations.
ED 01 SC.4:GETTING STARTED
58
Network Service Access Point:
This refers to the access point in layer 3 (network layer) of the OSI stack which provides services to the
transport layer (layer 4). This access point is identified by a unique NSAP address which is constructed
according to international standards. On the 1353SH an NSAP address must be provided to uniquely
not permitted without written authorization from Alcatel.
Notification:
Spontaneous data received by the system concerning an NE.
Operation System:
A system dedicated to the supervision of NEs in a standard way, using protocols and interfaces. it offers to
the operator a set of functions necessary to supervise the NEs. The SDH Manager is an Operation System.
Operator:
The end–user of the SDH Manager. He supervises a part of the network that is dependant on his user profile.
Physical Interface:
Electrical transformers that decouple the line signals and adapt the form of signal for further transmission.
This functional block also manages clock extraction, signal loss monitoring and loopback functions.
Port:
A physical point at which the Network Element can be attached to a transmission medium. A port is either
a termination point or an origination point.
Regeneration Section:
When there is at least one repeater between two interconnected equipments, each part of the line section
between two repeaters or between a repeater and an line system is called a regenerator section.
Repeater:
Equipment used to regenerate a signal when it has travelled a long distance.
Section Adaptation:
Synchronizes the incoming higher order virtual container (VC 4) or the incoming STM–1 signal to the
outgoing STM–1 frame or the outgoing high order virtual container.
Severity:
Linked to alarms, severities indicate the magnitude related to the failure.
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED 01 SC.4:GETTING STARTED
58
Small Computer Serial Interface:
The Small Computer System Interface is an American National Standard for interconnecting computers
and peripheral devices. The SCSI standard includes specifications for a variety of device types.
Session:
A session is a temporary association between an operator and the SDH Manager. A session always begins
with the identification and authentication of the operator (the login phase) and ends with the exit of the
operator from the SDH Manager (the logout phase). A session generally lasts a few hours.
Transmit Fail:
Alarm that indicate a dysfunction in the transmission of the signal.
Telecommunication Network:
Describes the network to be managed. Provides the transmission, the transport and the switching
supports to the interconnected Network Elements.
Terminal Point:
Describes either the origin or the termination of a signal in an equipment. Is related to a port.
Thresholding:
This is the assignment of a specified value to monitored parameters ( for example BIt Error Rates) that,
when exceeded, generate trouble indications.
Tributary Unit:
Entity composed of a virtual container to which is added a pointer that indicates the position of the container
in the STM–N frame.
User Profile:
Identifies the functionalities of the SDH Manager to which a user has access. A finite number of predefined
user profiles is determined by a fixed set of FADs.
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED 01 SC.4:GETTING STARTED
58
User Service Manager:
These are presentation processes used by the SDH Manager to manage the Human Machine Interface
and facilitate the interaction with the product.
not permitted without written authorization from Alcatel.
Virtual Container:
All rights reserved. Passing on and copying of this
document, use and communication of its contents
Virtual Containers are managed by the SDH Manager. Entity composed of an information signal to which
a path overhead has been added. The path overhead is used in the management of the information signal.
Different types of virtual containers exist depending on the rate of the information signal. Lower and Higher
order virtual containers exist. The SDH norm identifies VC11, VC12, VC2, VC3 and VC4 virtual containers
named from the lowest (VC11) to the highest (VC4) container capacity.
Wrapping:
Wrapping is the technique that enables the most recent entries in a file to replace the oldest when a file
is full.
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED 01 SC.4:GETTING STARTED
58
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED
01
957.130.872 H
SC.4:GETTING STARTED
58
3AL 61259 AA AA
34 / 58
All rights reserved. Passing on and copying of this
document, use and communication of its contents
not permitted without written authorization from Alcatel.
4 PRELIMINARY OPERATIONS
This is the first operation you will have to undertake to access the Regional Manager system. The view
that will greet you, called the Login panel is presented below.
N.B. You are assigned the login name by the Regional Manager administrator.
After a correct login, the login view is replaced by a transition view giving certain software copyright
indications. This view is automatically replaced by the normal workspace view containing the Front Panel
from which you will be able to access the SDH Manager functionalities.
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED 01 SC.4:GETTING STARTED
58
4.2 Workspace description
Your workspace is described as the functionalities that appear on your workstation screen after login.
The workspace Front Panel is described below.
Exit Letter
Printer Terminal
Netstation applications
File Regional
Manager Manager
ED 01 SC.4:GETTING STARTED
58
4.3 Locking the screen
This utility enables you to lock the screen to prevent other users from using your working environment.
not permitted without written authorization from Alcatel.
All rights reserved. Passing on and copying of this
document, use and communication of its contents
Padlock
icon
To lock the screen simply click on the small Padlock icon situated on the Front Panel described above.
The screen will lock immediately. The following figure will appear on the screen.
ED 01 SC.4:GETTING STARTED
58
4.4 Logging Out
Logging out from the workstation will automatically quit all the Regional Manager graphical applications
that you opened and give place to the Login panel. Notice the the Regional Manager processes are still
Click on the EXIT icon on the front panel, using the ”Select” mouse button, as shown in the figure
below.
EXIT icon
A dialogue box opens from which you can confirm or cancel the ”Logout” operation.
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED 01 SC.4:GETTING STARTED
58
5 ACCESS TO THE MAIN FUNCTIONALITIES
A more detailed description concerning the Regional Manager management domains is given in the
Regional Manager Introduction Manual.
not permitted without written authorization from Alcatel.
All rights reserved. Passing on and copying of this
document, use and communication of its contents
Access to the Regional Manager functionalities is provided through the workspace front panel as
described in the following sections.
5.1 Introduction
– OSF Motif applications (Browser, RM Configuration Tools, Monitor tool, System Management
Functions, etc.).
The HP_CDE Tool panel ( See Figure 28. ) has been customized to contain the 1354RM Logo (right–hand
side).
WS
Clock activity Text
Padlock Workspaces Editor
Date
Exit Letter
Printer Terminal
Netstation applications
File Regional
Manager Manager
Clicking on the small arrow above the 1354RM logo you can open the Tool Subpanel. ( See Figure 29. )
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED 01 SC.4:GETTING STARTED
58
5.1.1 The Tool Subpanel
The HP_CDE Tool Subpanel (See Figure 29. ) has been customized to contain the icons that follow (click
on the small arrow above the 1354 RM logo to open the Tool Subpanel )
– Logo 1354 RM Network Management System. Clicking twice on it, the informa
tion on RM version is displayed.
– TMN OSs This icon, if selected, opens the supervision of the various OSs.
– Administration This icon, if selected, opens the System Management functions ( SMF ).
ED 01 SC.4:GETTING STARTED
58
5.1.1.1 TMNOSs
By clicking on the TMNOSs icon opens a window containing all the OSs icons, i.e. all the network SHs and
RMs. The colour of each icon depends on the OS process state:
not permitted without written authorization from Alcatel.
All rights reserved. Passing on and copying of this
document, use and communication of its contents
The window contains a pull–down menu bar comprising the following menus:
– Actions containing a list of menus that vary depending on the OS type (RM or SH)
and on its actual status. The relevant OS icon must be selected. The
available submenus are:
• Monitor. This submenu is available both for RM and SH. It opens the
Process Monitor window.
• SMF. This submenu is present both for RM and SH. It permits to launch
the System Management Features application.
• Alarms. This submenu is only available for SH. It permits to launch the AS
application.
• PNM. This submenu is only available for SH. It permits to launch the OVW
application relevant to the selected SH and displayed on the 1354RM
di–splay. This feature is called zoom–in or plug–in.
• Version. This menu is only available for SH. The SW version installed is
indicated.
• SH–P Log. This submenu is only present for RM. It permits to display the
messages relative to the SH application presented on the 1354RM display.
• SH–P Version. This submenu is only available for the 1354RM. It permits
to display the SH release that has been installed.
– Global Actions It permits to launch the entire system actions. It contains the following
sub–menus:
ED 01 SC.4:GETTING STARTED
58
5.1.2 Alarm management
From your workspace front panel click on the Alarm icon shown in Figure 29. on page 40.
The Counter summary window is opened from which the operations on alarms can be carried out.
1) PHYSICAL LINK
2) MS TRAIL
3) HO TRAIL
4) PATH
5) PROCESSING
Each row of the above sublist has been created, activated and saved; each row of the default sublist
has been deactivated and deleted. ( The default sublist contains one row per each alarm severity).
a) From the Counter summary window open the Alarm sublist clicking twice on the relevant row of the
Counter summary window ( PHYSICAL LINK, MS TRAIL, HO TRAIL, PATH, PROCESSING). As an
alternative select the row and issue the Sublist: Open pull–down menu item.
b) Select the alarm from the sublist and navigate it by selecting the Navigation: AS_EXT_Tool
pull–down menu item. A confirmation dialog box appears. Click on OK to confirm.
Notice that in each view the alarmed object is marked by an alarm icon. By clicking on this icon a window
is presented, which gives details on the selected alarm.
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED 01 SC.4:GETTING STARTED
58
6 VIEWS DESCRIPTION
The main 1354RM applications are Netview and Browser: See Figure 30. on page 45
not permitted without written authorization from Alcatel.
Netview is based on HP–Open View which permits to manage the map and the submap. Moreover it allows
All rights reserved. Passing on and copying of this
document, use and communication of its contents
to create and display the topological objects (Network, Subnetwork, Ring, Node, SDH Port) and the
physical connections involved.
In any submap, by clicking twice on an object, the submap associated to the object proper opens.
The different submaps are described in next Chapter ”Navigation”. It describes the Navigation procedures
among the Netview submaps.
– Root submap
– Network submap
– Subnetwork submap
– Ring submap
– Node submap
Two additional submaps are utilized when the map is being constructed: i.e.:
– a main view which allows to navigate among all the topological and connectivity objects;
• LO Paths in a HO–TRAIL
• Node view
• Nap view
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED 01 SC.4:GETTING STARTED
58
– several lists. They are:
• Path List
• CTP List
• CAP List
• Port List
Several windows associated to the Management Tools are also available. In the following are listed the
main ones:
– transports (trail/path)
ED 01 SC.4:GETTING STARTED
58
BROWSER WINDOWS NETVIEW WINDOWS
not permitted without written authorization from Alcatel.
All rights reserved. Passing on and copying of this
document, use and communication of its contents
EMLs
NEs
ED 01 SC.4:GETTING STARTED
58
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED
01
957.130.872 H
SC.4:GETTING STARTED
58
3AL 61259 AA AA
46 / 58
All rights reserved. Passing on and copying of this
document, use and communication of its contents
not permitted without written authorization from Alcatel.
7 SDH NETVIEW : MAP NAVIGATION
– Explodable Symbol
You can navigate between submaps using the submap navigation tools, located in the Toolbar of
each submap window. The following navigation tools are available (see Figure 31. on page 49):
• Parent. Displays the primary parent of this submap. This is the submap that is defined in the
Submap Description dialog box as the Parent of the current submap.
• Root. Displays the root submap. This submap is at the top of the hierarchy.
• Home. Displays the home submap. The home submap is the first submap that appears when
you open a map
• Panner. Displays the Panner. The panner lets you zoom in on details within a submap window
and pan from area to area in the submap window.
– Click on the panner icon (lens) or select View: Pan and Zoom.
– In the panner window use button 1 to draw a box around the area to zoom in. Use button
2 to move the box.
• Browser. This button is context–sensitive, i.e. it is available if you first select an object from the
map. When clicking this button, the browser application starts from the selected object.
• EML Navigation. You first select a node, then clicking on this icon you can open the 1353SH
Equipment View of that node.
• Path Create. This button is context–sensitive, i.e. it is available if you first select a node from
the map. When clicking this button, the Path Create application starts from the selected node.
• Path Constraints. This button is context–sensitive, i.e. it is available if you first select a
node/et/subnetwork/port/physical connection from the map from the map. When clicking this
button, the Path Constraints application starts and a message asks the user to insert the
trail/path to constraint.
In case the Path Constraints was previously opened, clicking this button the selected object is
automatically added as a constraint.
• Add Leg. This button is context–sensitive, i.e. it is available if you first select a node from the
1AA 00014 0004 (9007) A4 – ALICE 04.10
map. When clicking this button, the Add Leg application starts from the selected node.
ED 01 SC.4:GETTING STARTED
58
• Payload Configuration This button is context–sensitive, i.e. it is available if you first select a
ring/Physical connection from the map. When clicking this button, the Payload Configuration
application starts from the selected object.
• Path List in Topology. This button is context–sensitive, i.e. it is available if you first select a
topological object from the map. When clicking this button, the Path List application starts,
giving then the paths related to the selected topological object.
• Path List in Physical Connections. This button is context–sensitive, i.e. it is available if you
first select a Physical Connection from the map. When clicking this button, the Path List
application starts, giving then the paths crossing the selected Physical Connection.
• Nap List . This button is context–sensitive, i.e. it is available if you first select a topological
object from the map. When clicking this button, the browser application starts, giving then the
list of the Naps belonging to the selected topological object.
• Ctp List . This button is context–sensitive, i.e. it is available if you first select a topological object
from the map. When clicking this button, the browser application starts, giving then the list of
the Ctps belonging to the selected topological object.
• Alarmed Objects . This button is context–sensitive, i.e. it is available if you first select a
topological object from the map. When clicking this button, the browser application starts, giving
then the list of the alarmed objects belonging to the selected topological object.
• Trail List . This button is context–sensitive, i.e. it is available if you first select a topological
object from the map. When clicking this button, the browser application starts, giving then the
list of the trails belonging to the selected topological object.
• About OVW. Displays the About OpenView Windows dialog box. This dialog box provides
information about the copyright date, session ID, server name, and provides access to
information about registered applications.
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED 01 SC.4:GETTING STARTED
58
CLOSE ROOT PANNER EML
NAVIGATION
not permitted without written authorization from Alcatel.
All rights reserved. Passing on and copying of this
document, use and communication of its contents
PATH SETUP
CREATE ADD LEG TRAIL
• The Home submap is the first submap that appears when you open a map. To define the Home
submap do as follows:
– Open the submap you want to be displayed each time you open the current map.
• The map that OVW first displays when started, is called the user default map. To define the
user default map do as follows:
ED 01 SC.4:GETTING STARTED
58
EXAMPLE
b) Clicking twice on the network icon, the network map is opened. It contains the subnetwork symbols
along with their physical connections (see examples in Figure 33. on page 51)
c) Clicking twice on the subnetwork icon, the submap of the objects belonging to that subnetwork is
opened (see examples in Figure 34. on page 52 and Figure 37. on page 53)
d) Clicking twice on the icon of the ring, the submap of the objects belonging to that ring is presented
(see examples in Figure 35. on page 53)
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED 01 SC.4:GETTING STARTED
58
All rights reserved. Passing on and copying of this
document, use and communication of its contents
not permitted without written authorization from Alcatel.
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED
01
957.130.872 H
SC.4:GETTING STARTED
Figure 33. Network map
58
3AL 61259 AA AA
51 / 58
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED
01
957.130.872 H
SC.4:GETTING STARTED
Figure 34. Objects belonging to a subnetwork
58
3AL 61259 AA AA
52 / 58
All rights reserved. Passing on and copying of this
document, use and communication of its contents
not permitted without written authorization from Alcatel.
All rights reserved. Passing on and copying of this
document, use and communication of its contents
not permitted without written authorization from Alcatel.
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED
01
to a node
957.130.872 H
External connection
SC.4:GETTING STARTED
Figure 35. Objects belonging to a ring
58
3AL 61259 AA AA
to a
External
connection
subnetwork
53 / 58
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED
01
to a ring
957.130.872 H
External connection
to a subnetwork
External connection
SC.4:GETTING STARTED
Figure 37. Dialog box.
Figure 36. Objects belonging to a ring
58
3AL 61259 AA AA
54 / 58
All rights reserved. Passing on and copying of this
document, use and communication of its contents
not permitted without written authorization from Alcatel.
8 NAVIGATION
Select one node/more nodes or nap and enter command Path Create from toolbar.
Select a node/physical connection/ lc / ctp / path / trail and enter command Path Constraints
from toolbar.
Select a physical connection or a ring and enter command Payload Configuration from toolbar.
A node can be selected from the map. Enter command Setup Trail
The applications relative to the PM measures and the Event Logger can be obtained again from the
Brow–ser.
As regards ”Navigation from Browser to Netview”, the only function available is ”Locate”. It
allows to visualize a ctp, ttp, nap on the map ( at level of node ) or a trail / path , displaying the
route.
a) From the Counter summary window open the Alarm sublist clicking twice on the relevant row of the
Counter summary window ( PHYSICAL LINK, MS TRAIL, HO TRAIL, PATH, PROCESSING). As an
alternative select the row and issue the Sublist: Open pull–down menu item.
b) Select the alarm from the sublist and navigate it by selecting the Navigation: AS_EXT_Tool
pull–down menu item. A confirmation dialog box appears. Click on OK to confirm.
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED 01 SC.4:GETTING STARTED
58
The following cases are possible:
Notice that in each view the alarmed object is marked by an alarm icon. By clicking on this icon a window
is presented, which gives details on the selected alarm.
ED 01 SC.4:GETTING STARTED
58
9 ON–LINE DOCUMENTATION
9.1 Overview
not permitted without written authorization from Alcatel.
All rights reserved. Passing on and copying of this
document, use and communication of its contents
The help is based on world wide web technologies. The topics are written in html. Netscape Gold is the
browser used to navigate through the html pages and it is also used to edit the user personal pages.
Navigation through the help is also possible using a customized navigation bar permanently displayed in
the left of the help screen
The menu options are in fact entry points to the main help system. Once you have entered the help system
via one of these menu options, hyperlinks enable you to navigate to other parts of the help system and
to view other help topics.
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED 01 SC.4:GETTING STARTED
58
INDEX
B Pointer, 10
C
P
Cascading menus, 19
Pop–up menus, 19
Pull down menus, 18
L
M
U
Menu bar, 17
Upper case/Lower case characters, 22
Menus
User Interface, Standard elements, 7
Cascading menu, 19
item, 20
Menu bar, 17 W
Mnemonics, 20
Pop–up menu, 19 Windows
Pull down menu, 18 Layout, 11
Mnemonics, 20 Menu, 12
Mouse Scroll bars, 13
Actions, 9, 10 Workspace, Types of, 36
Buttons, 9
END OF DOCUMENT
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED 01 SC.4:GETTING STARTED
58
1354RM REL.5.2B OPERATOR’S HANDBOOK
not permitted without written authorization from Alcatel.
All rights reserved. Passing on and copying of this
document, use and communication of its contents
TABLE OF CONTENTS
1 INTRODUCTION . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
1.1 Purpose of the document . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
1.2 Target audience . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
1.3 Document description . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
1.4 Interrelationships with 1353SH during Network Construction . . . . . . . . . . . . . . . . . . . . . 14
1.5 System Startup . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15
2 NETWORK CONFIGURATION . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17
2.1 Network Construction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17
2.2 Create a new Map in HP-OV data base . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18
2.3 Populate the new Map . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21
2.4 Creating the 4–F MS–SPRING . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32
2.4.1 Creating the Nodes and the ports . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34
2.4.2 Creating the Connections between Nodes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37
2.5 Create Network for D & C in ADMs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41
2.6 Creating the Dual Node Interconnection with D & C in 1664SX . . . . . . . . . . . . . . . . . . . . 46
2.6.1 Sequence on SH . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47
2.6.2 Sequence on RM . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47
2.7 Creating the One Node Interconnection with D & C in 1664SX . . . . . . . . . . . . . . . . . . . . . 51
2.7.1 Sequence on SH . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 52
2.7.2 Sequence on RM . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 52
2.8 Contiguous Concatenated AU4’s . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 56
2.9 Line / Radio System Creation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 58
2.10 Network implementation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 60
2.11 Map Management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 62
2.12 Payload Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 64
2.12.1 Configuring the Payload . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 64
2.12.2 Payload Configuration monitoring . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 66
2.12.3 Payload Configuration supervision . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 67
2.13 AU4 Concatenation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 68
2.13.1 AU4 Concatenation SETUP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 68
2.13.2 AU4 Concatenation Display . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 71
2.13.3 AU4 Concatenation Remove . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 72
1354RM REL.5.2B
OPERATOR’S HANDBOOK
ED 01 SC.5:OPERATION
334
2.14 Setup Trail . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 74
2.14.1 Trail remove . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 78
2.15 Upload NAPs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 81
ED 01 SC.5:OPERATION
334
5.2 Network Modification with existing traffic . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 212
5.2.1 rmList file create . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 213
5.2.2 rmLCmd file play . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 216
5.3 Add/Remove Tributary Board . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 219
not permitted without written authorization from Alcatel.
ED 01 SC.5:OPERATION
334
9.2 Access of the operator with Initiator restr_pb1 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 290
9.2.1 Browser main window . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 290
9.2.2 Browser navigated objects . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 292
9.3 Access of the operator with Initiator restr_lo1 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 293
INDEX . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 333
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED 01 SC.5:OPERATION
334
LIST OF FIGURES AND TABLES
FIGURES
not permitted without written authorization from Alcatel.
ED 01 SC.5:OPERATION
334
Figure 51. Line System view . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 59
Figure 52. Line system details . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 59
Figure 53. Implement Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 60
Figure 54. All Protection Blocks in MS–SPRING 4 F . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 61
ED 01 SC.5:OPERATION
334
Figure 105. Routing display of a broadcast path. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 109
Figure 106. bidirectional protected path . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 111
Figure 107. unidirectional protected path (using working resource between nodes E and D) . . . . . 111
Figure 108. unidirectional protected path (using protection resource between nodes E and D) . . . 112
not permitted without written authorization from Alcatel.
ED 01 SC.5:OPERATION
334
Figure 159. Path Create between the two virtual nodes. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 158
Figure 160. P1+PV Join path pull–down menu. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 159
Figure 161. Join path dialog box ( P1+PV=P3) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 159
Figure 162. P2+P3 Join path pull–down menu. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 160
ED 01 SC.5:OPERATION
334
Figure 213. Supervision: Synchronize Map. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 222
Figure 214. Geogr. map construction. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 223
Figure 215. Map: Submap: Describe/Modify. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 224
Figure 216. Adding a graphical background. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 224
not permitted without written authorization from Alcatel.
ED 01 SC.5:OPERATION
334
Figure 267. Browse the virtual connection. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 298
Figure 268. NAD global change. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 298
Figure 269. Change NAD: 1354NN. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 299
Figure 270. NAD: Change for NAP(s). . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 300
TABLES
Table 1. VC4 squelching table for node A . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 188
Table 2. LVC squelching table for node A (no entries) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 188
Table 3. VC4 squelching table for node B . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 188
Table 4. LVC squelching table for node B (no entries) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 188
Table 5. VC4 squelching table for node C . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 189
Table 6. LVC squelching table for node C (no entries) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 189
Table 7. VC4 squelching table for node D . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 189
Table 8. VC4 squelching table for node E . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 190
Table 9. LVC squelching table for node E . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 190
Table 10. VC4 squelching table for node F . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 190
Table 11. LVC squelching table for node F . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 190
Table 12. VC4 squelching table for node G . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 191
Table 13. LVC squelching table for node G . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 191
Table 14. Commands and their priority . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 192
Table 15. Reports of the APS Controller . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 193
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED 01 SC.5:OPERATION
334
1 INTRODUCTION
This document describes al the procedures usually executed by the operator. It refers to a no faults
environment.
This document is intended for people who are in charge of the construction of the network.
The documents that should be read before starting this document are:
– MAP CREATE
• Network Configuration
• AU4C Topology
– NETWORK IMPLEMENTATION
• Network Implementation
– MAP MANAGEMENT
• Map Management
– CONFIGURATION
1AA 00014 0004 (9007) A4 – ALICE 04.10
• Payload Configuration
ED 01 SC.5:OPERATION
334
• Setup Trail
• Upload NAPs
• Path Create
• Path Allocate
• Path/Trail Constraints
• Add/Leg
• Add/Remove Protection
• Joint–Split Path
• Joint–Split Trail
– PROTECTION MANAGEMENT
• 2–F MS–SPRING
– NETWORK MODIFICATIONS
– NETWORK VIEWS
• Geographical Map
• Layered Map
• Connectivity Inventory
– PERFORMANCE MONITORING
•
1AA 00014 0004 (9007) A4 – ALICE 04.10
Performance Monitoring
• Create Measure
ED 01 SC.5:OPERATION
334
• Transport Correlation to Measure
• PMPT Attributes
All rights reserved. Passing on and copying of this
document, use and communication of its contents
• Measure Activation/Stop/Consistency
• Measure Merging
• PM data Display
• pmNE
• PM Archive
• Archive Session
– USER ADMINISTRATION
• Operator Administration
– RESTRICTED OPERATORS
• Path builder
• Look only
– EXPORT PROCEDURES
The paragraphs which follow briefly describe the Interrelationships with 1353SH during Network
Construction and System startup.
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED 01 SC.5:OPERATION
334
1.4 Interrelationships with 1353SH during Network Construction
This paragraph summarizes the macroactivities to be executed at SH and RM side during Network
Construction. The detailed description of the operations to be carried out at SH side is contained in the
– On 1353SH: Create NE Directory: Create NE. The NE which has been just created appears
brown–colored in the map window
– On 1353SH: Select the NE and Start: Supervision: Align Up. The NE is uploaded and assumes the
alarm synthesis color in the map. Check the uploaded hardware with Supervision: Show Equipment.
If needed, complete the hardware provisioning ( command Equipment:Board: Set Board )
ED 01 SC.5:OPERATION
334
1.5 System Startup
b) Select the Administration ( SMF ) icon from the vertical palette: the System Management Features
All rights reserved. Passing on and copying of this
document, use and communication of its contents
Administration icon
c) Select the option System Start/Stop and click on button OK. The system Start/Stop submenu opens.
d) Select the option Start System. A dialog window opens; click on Start button and confirm. A question
box arises: ” Do you want to start countdown?”:
1) If you click on Yes a 60 sec countdown starts including the ”Abort” button to interrupt the startup.
2) If you click on No the startup procedure begins immediately and an additional window
summarizes the main steps:
– ” Starting db instance... ”
ED 01 SC.5:OPERATION
334
not permitted without written authorization from Alcatel.
All rights reserved. Passing on and copying of this
document, use and communication of its contents
Figure 2. Startup monitoring window.
As an alternative:
1) Select Process Monitor Control and click on button OK; the Process Control window opens.
2) Select the Actions:Startup: Database pull–down menu item. Wait until the Database becomes
ON (green colored and ON textstring )
3) Select the Actions:Startup: System pull–down menu item. Wait until the System becomes ON
(green colored and ON textstring )
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED 01 SC.5:OPERATION
334
2 NETWORK CONFIGURATION
– Network Construction
All rights reserved. Passing on and copying of this
document, use and communication of its contents
– Payload Configuration
– Upload NAPs
It is assumed that the controlled network has been correctly installed and tested and the 1354RM has been
properly installed.
The network construction consists in representing the whole managed network with the necessary
submaps and creating all the required objects in the HP–OV and RM–MIB data bases.
During network construction, the map is automatically checked in order to verify if some errors has been
encountered.
• the involved ports have to be connected in a consistent way in the whole et (main–west to
main–east, spare–west to spare–east).
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED 01 SC.5:OPERATION
334
2.2 Create a new Map in HP-OV data base
a) Start the Netview application by selecting the Netview icon from the vertical palette.
• Map name
• Layout:None.
Select the application Map Management and click on Configure for This Map... button. The configuration
window is displayed.
Displays a Configuration dialog box for the application. The Configuration dialog box contains
configuration settings that are specific to that application.
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED 01 SC.5:OPERATION
334
The following configuration settings are available:
– Type of SDH network synchronization enabled for this map . Three pop–up options are selectable:
not permitted without written authorization from Alcatel.
• Unset. If this option is selected the operator will not be able to perform any operations of
All rights reserved. Passing on and copying of this
document, use and communication of its contents
alignment of the local (WS) OVW data base to the SNML_IM data base.
• Synchronize Complete Map (Map and Alarm Synchronization) If this option is selected the
operator will be able to perform operations of alignment of the local (WS) OVW data base to
the SNML_IM data base.
• Synchronize Only Alarm on Map .( DEFAULT) If this option is selected, the operator will be
able to perform operations of alarm alignment of the local (WS) OVW data base to the SNML_IM
data base.
– SDH network synchronization by site for this map, (DEFAULT=FALSE) if true, means that the
alignment will be executed geographically. If false will be executed logically. This field is effective only
if SDH map and alarm synchronization is enabled. Note that on geographical map only view
operation can be performed.
– SDH synchronize ports for physical maps (DEFAULT=TRUE) means alignment of the local OVW
data to SNML_IM data for the data relevant to the ports.
– SDH set attribute in creation enabled (DEFAULT=FALSE) means that the application will open the
View/Set attributes for each object added. (Not used)
– SDH delete operation enabled on implemented object (DEFAULT=FALSE), if true means that it is
possible to delete an object implemented. Deletion is only possible in OVwDb.
– SDH Show uselabel on Layered map (DEFAULT=FALSE). If set to Enabled, in the layered maps the
user label is displayed with the payload structure, otherwise only the payload is displayed.
• Select the application Map Management and click on Configure for this Map: a dialog box
opens. Select button SDH Synchronization enabled for this Map = TRUE.
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED 01 SC.5:OPERATION
334
not permitted without written authorization from Alcatel.
All rights reserved. Passing on and copying of this
document, use and communication of its contents
Figure 5. New map dialog box.
d) Press OK again from the New Map dialog box. The new Map is created. A dialog box asks if you want
to open the new map. By clicking on YES the new map is opened.
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED 01 SC.5:OPERATION
334
2.3 Populate the new Map
During this activity, the operator has to create all the submaps according to the network partitioning levels
and insert inside them all the objects (network, subnetworks, rings, nodes, ports and connections).
not permitted without written authorization from Alcatel.
All rights reserved. Passing on and copying of this
document, use and communication of its contents
The operator can populate the map either manually creating all objects or getting an already created map
from distributed archives.
b) In the Create dialog box enter the Network name and click on Create button. See Figure 6. The
Network icon appears in the New Object Holding Area. Drag ( holding the middle mouse button) the
icon into the window. Double click on the Network icon to open the Network map.
ED 01 SC.5:OPERATION
334
not permitted without written authorization from Alcatel.
All rights reserved. Passing on and copying of this
document, use and communication of its contents
Figure 7. Root Map
a) The subnetwork objects are created in the Network submap using the command Construction:
Create:Subnetwork.
b) In the Create:Subnetwork dialog box ( see Figure 8. ) enter the Subnetwork name and click on Create
button. The Subnetwork icon appears in the New Object Holding Area
c) Drag the icon to the window work area. See Figure 9. Double click on the Subnetwork icon to open
the Subnetwork submap.
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED 01 SC.5:OPERATION
334
All rights reserved. Passing on and copying of this
document, use and communication of its contents
not permitted without written authorization from Alcatel.
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED
01
957.130.872 H
SC.5:OPERATION
Figure 9. Network map
Figure 8. Create Subnetwork dialog box.
334
3AL 61259 AA AA
23 / 334
2.3.1.1.2 Creating the Ring (ET)
a) The ring (Elementary Topology) objects are created in a Subnetwork submap using the command
Construction:Create:Ring. The Create Ring dialog box is presented. See Figure 10.
• ET Type:
– SNCP–U Subnetwork Connection Protection–Unidirectional
– 2–F MS–SPRING Multiplex Section Shared Protection
– Meshed open ring
– 4–F MS–SPRING 4–F Transoceanic MS–SPRING.
• Fiber No. ( 2 / 4 )
b) Click on Create button. The Ring icon appears in the New Object Holding Area
c) Drag the icon to the center of the window. Double click on the Ring icon to open the Ring submap.
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED 01 SC.5:OPERATION
334
All rights reserved. Passing on and copying of this
document, use and communication of its contents
not permitted without written authorization from Alcatel.
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED
01
957.130.872 H
SC.5:OPERATION
Figure 11. Objects belonging to a subnetwork
334
3AL 61259 AA AA
25 / 334
2.3.1.1.3 Creating the Network Elements and the ports
A network element can be inserted either in the Subnetwork submap or in the Ring submap.
ED 01 SC.5:OPERATION
334
b) Select the EML containing the relevant NEs and execute:Construction:Upload EML(s)
info...:Available NEs in an EML. An EML submap containing all the NEs available in that EML is
generated.
not permitted without written authorization from Alcatel.
All rights reserved. Passing on and copying of this
document, use and communication of its contents
c) Select the relevant NE(s) with single or multiple selection and execute the command
Construction:Upload EML(s) info...:Available NE ports. The NE ports are loaded inside a new NE
submap.
Note that the node map is created but is not automatically opened.
d) The uploaded NEs can be moved from the ”Available” maps ( EML data ) to the topological maps.
Select the NE (left click) and holding the mouse button move to the proper submap working area,
then release the mouse button.
– Alternatively this operation is done by selecting the NE and issuing with Edit:Cut:From this submap.
Subsequently enter Edit:Paste into the proper window. The pasted objects appear in the New Object
Holding Area and the operator may drag them to the window work area.
– the NE is pasted to the map and its related node is created in the data base.
• For QB3* NEs the icon of the node is colored in brown, i.e. the node is created and its
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED 01 SC.5:OPERATION
334
• For TSD–IM NEs the icon of the node is colored in green, i.e. the node is created and its
operational state is enabled. See Figure 15.
TSD–IM NODE
ED 01 SC.5:OPERATION
334
2.3.1.1.4 Creating the Connections
a) Select View: Overlay Submap: off for all submaps, in order to display more submaps at the same
time.
not permitted without written authorization from Alcatel.
All rights reserved. Passing on and copying of this
document, use and communication of its contents
c) Select a couple of ports to be connected (use the Control button of the keyboard to select the second
port), then execute Construction: Create:Connection (alternatively press F12). In the Create
Connection dialog box ( see Figure 16. ) enter the connection name and click on Create button. The
connection is hence created and is displayed in the parent submap(s). See Figure 17. on page 30.
ED 01 SC.5:OPERATION
334
not permitted without written authorization from Alcatel.
All rights reserved. Passing on and copying of this
document, use and communication of its contents
Figure 17. Connection display.
• Having created the connection, an external connection symbol is created in the submaps which
contain the connected objects. The external connection symbol label contains the name of the
object connected at the other end plus the connection name.
• The connection is not visible in the Node submap which now contains only the ports not
connected. See Figure 18.
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED 01 SC.5:OPERATION
334
All rights reserved. Passing on and copying of this
document, use and communication of its contents
not permitted without written authorization from Alcatel.
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED
d)
01
957.130.872 H
SC.5:OPERATION
Create all the remaining connections as per above point c )
Figure 18. Connection just created.
334
3AL 61259 AA AA
31 / 334
2.4 Creating the 4–F MS–SPRING
a) The ring (Elementary Topology) objects are created in a Subnetwork submap using the command
Construction:Create:Ring. The Create Ring dialog box is presented. See Figure 19. herebelow.
b) In the Create Ring dialog box enter: Ring name, ET Type=4–F MS Spring, STM Type=STM–16, Fiber
No.= 4 , Global Configuration=True and then click on Create button. The Ring icon appears in the
New Object Holding Area.
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED 01 SC.5:OPERATION
334
c) Drag the icon to the center of the window. See Figure 20. on page 33. Double click on the Ring icon
to open the Ring submap.
not permitted without written authorization from Alcatel.
All rights reserved. Passing on and copying of this
document, use and communication of its contents
ED 01 SC.5:OPERATION
334
2.4.1 Creating the Nodes and the ports
Only the network element 1664SM can be inserted in the 4–F MS–Spring Ring submap.
ED 01 SC.5:OPERATION
334
b) Select the EML containing the relevant NEs and execute:Construction:Upload EML(s)
info...:Available NEs in an EML. An EML submap containing all the NEs available in that EML is
generated.
not permitted without written authorization from Alcatel.
All rights reserved. Passing on and copying of this
document, use and communication of its contents
c) Select the relevant NE(s) with single or multiple selection and execute the command
Construction:Upload EML(s) info...:Available NE ports. The NE ports are loaded inside a new NE
submap.
Note that the node map is created but is not automatically opened.
d) The uploaded NEs can be moved from the ”Available” maps ( EML data ) to the topological maps.
– This operation is done by selecting the NE and issuing with Edit:Cut:From this submap.
Subsequently enter Edit:Paste into the proper window. The pasted objects appear in the New Object
Holding Area and the operator may drag them to the window work area. See Figure 24. on page 36.
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED 01 SC.5:OPERATION
334
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED
01
957.130.872 H
SC.5:OPERATION
Figure 24. NPE Ring submap.
334
3AL 61259 AA AA
36 / 334
All rights reserved. Passing on and copying of this
document, use and communication of its contents
not permitted without written authorization from Alcatel.
2.4.2 Creating the Connections between Nodes
b) Select a couple of ports to be connected and click on F12. The Create connection dialog box is
presented.
ED 01 SC.5:OPERATION
334
not permitted without written authorization from Alcatel.
All rights reserved. Passing on and copying of this
document, use and communication of its contents
TX
RX
SLOT 17 SLOT 19
AGGR. WEST 1 AGGR. WEST 2
WORKING PROTECTION
SLOT 18 SLOT 20
AGGR. EAST 1 AGGR. EAST 2
WORKING PROTECTION
N.B. The 1644SM network element, when inserted in a NPE ring is equipped with 4 STM–16
aggregate boards, as shown in Figure 27.
N.B. West 1 and East 1 aggregate ports support the working capacity, West 2 and East 2 aggregate
ports support the protection capacity. In 1354RM node map West 2 and East 2 aggregate ports
icons are marked by a “ S “. See Figure 28.
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED 01 SC.5:OPERATION
334
not permitted without written authorization from Alcatel.
All rights reserved. Passing on and copying of this
document, use and communication of its contents
WORKING
PROTECTION
(MAIN)
(SPARE)
WORKING
(MAIN)
PROTECTION
(SPARE)
d) At the NE/EML layer read the information of Node Id and Node Position per each node of the ring
and move these information to 1354RM map. To do this start the browser on the 4–F MS Spring.
Select the ring icon from the map and issue Browse: Object(s) pull–down menu item. The Browser
start on the selected object. See Figure 29.
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED 01 SC.5:OPERATION
334
e) Select the nodes, one at a time and issue Show/Set Attributes. In the Show/Set Attributes dialog box
enter the values of Node Position and Node Id accordingly. See Figure 30. herebelow.
SET NODE ID
VALUES PRESENT AT
EML/NE LAYER
ED 01 SC.5:OPERATION
334
2.5 Create Network for D & C in ADMs
SEQUENCE
not permitted without written authorization from Alcatel.
ED 01 SC.5:OPERATION
334
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED
b)
01
957.130.872 H
SC.5:OPERATION
Create all connections as in Figure 32. thru Figure 34.
334
3AL 61259 AA AA
42 / 334
All rights reserved. Passing on and copying of this
document, use and communication of its contents
not permitted without written authorization from Alcatel.
All rights reserved. Passing on and copying of this
document, use and communication of its contents
not permitted without written authorization from Alcatel.
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED
01
957.130.872 H
SC.5:OPERATION
Figure 34. Ring3 submap
334
3AL 61259 AA AA
43 / 334
c) Implement the network by issuing the command Supervision: Implement Object. From the browser
you can monitor the implementation in progress.
ED 01 SC.5:OPERATION
334
All rights reserved. Passing on and copying of this
document, use and communication of its contents
not permitted without written authorization from Alcatel.
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED
d)
01
957.130.872 H
SC.5:OPERATION
Figure 36. Subnetwork and ring submaps.
334
3AL 61259 AA AA
Subnetwork and ring submaps after implementation are shown in Figure 36.
45 / 334
2.6 Creating the Dual Node Interconnection with D & C in 1664SX
SCOPE
Figure 37. shows an example of dual node interconnection with D & C in 1664SX. The two physical rings
are represented in the 1354 RM by meshed rings, in particular the two nodes interconnecting the SNCP
rings are grouped in a meshed ET.
ET–1 and ET–3 contain only ADM nodes, ET–2 contains the two cross connect equipments.
2–N D&C
ET–3
ET–1
tpZ
tpA
tpZA tpAZ
tpZA tpAZ
tpA tpZ
ALLOWED RATES Allowed rates, due to hardware limitations are STM–1 and STM–16.
ADVANTAGES
• no limitations on the no. of rings connectable on both sides: the only limitation is constituted by
the maximum capacity (in terms of ports) of the cross connect equipment.
• Assuming that no traffic is terminated to cross connect equipment and the total traffic flows
through ET–2, i.e. through the cross connect squipment, the total traffic terminated to SIDE A
(see Figure 37. above) should be equal to he total traffic terminated to SIDE B.
• Althogh no limitations exist on the number of rings, it is assumed that the total no. of physical
rings on SIDE A = total no. of physical rings on SIDE B.
ED 01 SC.5:OPERATION
334
2.6.1 Sequence on SH
a) TBD
not permitted without written authorization from Alcatel.
b) TBD
All rights reserved. Passing on and copying of this
document, use and communication of its contents
For each Cross connect equipment all physical ports associated to the TPs involved in the D & C
scheme must be housed in the same subrack.
The correct connection scheme can be verified at RM side by checking the tp attributes (port
name and payload position) by issuing Show/Set Attributes for the involved tp. The port name
contains the subrack name.
2.6.2 Sequence on RM
a) The ring (Elementary Topology) objects are created in a Subnetwork submap using the command
Construction:Create:Ring.
b) In the Create Ring dialog box enter: Ring name, ET Type=Meshed, STM Type=STM–16 or STM–1,
Fiber No.= 2 , Global Configuration=False and then click on Create button. The Ring icon appears
in the New Object Holding Area.
d) Execute above points b ) and c ) for the 3 rings, as shown in Figure 38.
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED 01 SC.5:OPERATION
334
e) Double click on the Ring icon to open the Ring submap.
h) Select the relevant NE(s) with single or multiple selection and execute the command
Construction:Upload EML(s) info...:Available NE ports. The NE ports are loaded inside a new NE
submap.
i) The uploaded NEs can be moved from the ”Available” maps ( EML data ) to the topological maps.
– This operation is done by selecting the NE and issuing with Edit:Cut:From this submap.
Subsequently enter Edit:Paste into the proper window, according to the scheme described under
SCOPE. The pasted objects appear in the New Object Holding Area and the operator may drag them
to the window work area.
j) Open the submap of the nodes to be connected and select a couple of ports to be connected and
click on F12. The Create connection dialog box is presented.
ED 01 SC.5:OPERATION
334
not permitted without written authorization from Alcatel.
All rights reserved. Passing on and copying of this
document, use and communication of its contents
• Having created the connection, an external connection symbol is created in the submaps which
contain the connected objects. The external connection symbol label contains the name of the
object connected at the other end plus the connection name. See Figure 40.
• The connection is not visible in the Node submap which now contains only the ports not
connected.
Figure 41. shows the details of the three rings which constitute this small sample network.
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED 01 SC.5:OPERATION
334
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED
01
ET–2
957.130.872 H
SC.5:OPERATION
ET–3
ET–1
334
3AL 61259 AA AA
Figure 41. Network submaps of the 3 Meshed ETs for 2 Node D & C
50 / 334
All rights reserved. Passing on and copying of this
document, use and communication of its contents
not permitted without written authorization from Alcatel.
2.7 Creating the One Node Interconnection with D & C in 1664SX
not permitted without written authorization from Alcatel.
All rights reserved. Passing on and copying of this
document, use and communication of its contents
ET2
tpA tpZ
ET1
ET3
tpA tpZ
SIDE A SIDE B
ENHANCED SNCP
SCOPE
The scope of this procedure is to create the topological objects needed to manage the Single Node
Interconnection with D & C in 1664SX.
Figure 37. shows an example of single node interconnection with D & C in 1664SX. The two physical rings
are represented in the 1354 RM by meshed rings, in particular the node interconnecting the SNCP rings
is contained in a meshed ET’s .
ET–1 and ET–3 contain only ADM nodes, ET–2 contains the cross connect equipment.
ALLOWED RATES Allowed rates, due to hardware limitations are STM–1 and STM–16.
ADVANTAGES
• no limitations on the no. of rings connectable on both sides: the only limitation is constituted by
the maximum capacity (in terms of ports) of the cross connect equipment.
• Assuming that no traffic is terminated to cross connect equipment and the total traffic flows
through ET–2, i.e. through the cross connect squipment, the total traffic terminated to SIDE A
(see Figure 42. above) should be equal to he total traffic terminated to SIDE B.
1AA 00014 0004 (9007) A4 – ALICE 04.10
• Althogh no limitations exist on the number of rings, it is assumed that the total no. of physical
rings on SIDE A = total no. of physical rings on SIDE B.
ED 01 SC.5:OPERATION
334
2.7.1 Sequence on SH
a) tbd
The correct connection scheme can be verified at RM side by checking the tp attributes (port
name and payload position) by issuing Show/Set Attributes for the involved tp. The port name
contains the subrack name.
2.7.2 Sequence on RM
b) The ring (Elementary Topology) objects are created in a Subnetwork submap using the command
Construction:Create:Ring.
c) In the Create Ring dialog box enter: Ring name, ET Type=Meshed, STM Type=STM–16 or STM–1,
Fiber No.= 2 , Global Configuration=False and then click on Create button. The Ring icon appears
in the New Object Holding Area.
ED 01 SC.5:OPERATION
334
f) Double click on the Ring icon to open the Ring submap.
h) Select the EML containing the relevant NEs and execute:Construction:Upload EML(s)
All rights reserved. Passing on and copying of this
document, use and communication of its contents
info...:Available NEs in an EML. An EML submap containing all the NEs available in that EML is
generated.
i) Select the relevant NE(s) with single or multiple selection and execute the command
Construction:Upload EML(s) info...:Available NE ports. The NE ports are loaded inside a new NE
submap.
j) The uploaded NEs can be moved from the ”Available” maps ( EML data ) to the topological maps.
– This operation is done by selecting the NE and issuing with Edit:Cut:From this submap.
Subsequently enter Edit:Paste into the proper window, according to the scheme described under
SCOPE. The pasted objects appear in the New Object Holding Area and the operator may drag them
to the window work area.
k) Open the submap of the nodes to be connected and select a couple of ports to be connected and
click on F12. The Create connection dialog box is presented.
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED 01 SC.5:OPERATION
334
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED
l)
01
957.130.872 H
SC.5:OPERATION
Enter the connection name and click on Create button.
Figure 44. Create connection.
334
3AL 61259 AA AA
54 / 334
All rights reserved. Passing on and copying of this
document, use and communication of its contents
not permitted without written authorization from Alcatel.
• Having created the connection, an external connection symbol is created in the submaps which
contain the connected objects. The external connection symbol label contains the name of the
object connected at the other end plus the connection name. See Figure 40.
not permitted without written authorization from Alcatel.
• The connection is not visible in the Node submap which now contains only the ports not
All rights reserved. Passing on and copying of this
document, use and communication of its contents
connected.
shows the details of the three rings which constitute this small sample network.
ET–1
ET–2
ET–3
ED 01 SC.5:OPERATION
334
2.8 Contiguous Concatenated AU4’s
– The user constructs the network inserting Virtual NE’s or reusing the existing Virtual NE’s in order
to describe the Physical Connections leaving the network managed by RM and supporting the
Figure 48. shows the Ring submap. Notice that the payload structue must be executed on all relevant MS
Trails.
The Create Connection command is executed by selecting the terminating port on the virtual network
element and the terminating port of the node to connect.
N.B. When designing the network which will convey concatenated traffic, it is suggested to verify the
resources needed:
• the Network Elements along the path must support the concatenation feature
• the STM–N physical connections along the path must support the target rate
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED 01 SC.5:OPERATION
334
not permitted without written authorization from Alcatel.
All rights reserved. Passing on and copying of this
document, use and communication of its contents
The Path Create command is executed by selecting first the terminating virtual network elements. See
Figure 50. on page 57
ED 01 SC.5:OPERATION
334
2.9 Line / Radio System Creation
a) Create, and implement the connection which physically contains Line/Radio Systems.
d) Execute Construction: Upload: available EMLs... for the EML which contains Line/Radio System
NEs. (emlfox)
e) Execute Construction: Upload: available NEs... for that EML, select the two line systems and issue
Edit: Cut from this Submap, then Edit: Paste to the meshed dedicated ET.
f) Execute Construction: Upload: available EMLs... for the virtual EML which contains the virtual nodes
to be connected to the Line Systems.
g) Execute Construction: Upload: available NEs... for this EML, select the virtual nodes, cut them and
paste them to the meshed dedicated ET.
NOTE
The name of the Virtual nodes should be related to the name of the physical connection (only for easier
understanding)
h) Create all the connections with Construction: Create: Connection. In the Line/Radio System detail
make use of the port called ”GEN” to create the connection towards the other line/radio system.
In the Virtual Network Element detail connect one STM–1 port.
j) Select the first Physical connection and execute Construction: Link to a Topology: Add. A dialog box
is displayed informing: ” Select the elementary topology ( ET ) to be related to the physical connection
and press OK when done ”
NOTE
You can remove the link symbol by means of the command Construction: Link to a Topology: Remove.
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED 01 SC.5:OPERATION
334
All rights reserved. Passing on and copying of this
document, use and communication of its contents
not permitted without written authorization from Alcatel.
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED
01
957.130.872 H
SC.5:OPERATION
Figure 51. Line System view
334
3AL 61259 AA AA
59 / 334
2.10 Network implementation
a) starting from the “sequence number in et” node attribute (it provides the position of each node in the
et), it builds the string corresponding to the ring map info attribute of the 4f MS Protection Block MOC
1) it creates, ’contained’ in the node, the MS Protection Block MOC filling the Configuration State
attribute with the “virtual” value
2) it submits to the proper TSD–IM Front End Processor (in charge of the node) the request to
change on the MS Protection Block (contained in the node and related to the et) the
Configuration State attribute to the “active” value and the ring map info attribute to the string set
up at step a ). In case the topology is modified adding/removing a node and the et is requested
to be implemented again, the topology implementation process submits the request to change
the ring map info attribute only.
ED 01 SC.5:OPERATION
334
N.B. In case of NPE MS–SPRING the operator can excute the following checks:
1) From the Subnetwork map point with the mouse at the NPE ring and issue the pop–up menu
Main Items: All Protection Blocks in MS–SPRING 4 F. The relevant graphical window is
not permitted without written authorization from Alcatel.
This map lists Ring Position and Node Id of each node and describes the connections with the
other nodes, in terms of Ring Position, Node Id and side (West/East)
3) From 1354RM 4 F–MS Spring window select a node and click on the Show/Set Attributes icon
( lens ). The Ring Map Info Attribute lists the sequence of the connected Node IDs in ET. The
Show/Set Attributes window contains also the values of the attributes Node Position in ET and
Node Id in ET. Notice that: VALUE at SH interface = VALUE at RM interface + 1
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED 01 SC.5:OPERATION
334
2.11 Map Management
– Map: Redo: Store. This command allows to store the commands required to create all topological
objects contained in the map or submap on both ovwdb and mibdb. It is possible to store the
map/submap without connections. See detailled description in Section Graphical Interface.
– Map: Redo: Execute. This command allows to execute all the commands previously stored by issuing
the menu Map: Redo: Store. See detailled description in Section Graphical Interface.
– Supervision: Placement: Store. This command allows to store in MIB data base the coordinates of
the topological objects, for the entire map, for the current submap or for the current submap including
the related child submaps.
– Supervision: Placement: Retrieve: Map This command allows to retrieve from MIB data base the
coordinates of all topological objects, for the entire map.
– Supervision: Placement: Retrieve: Not Placed This command allows to retrieve from MIB data base
the coordinates of all topological objects actually displayed in the New Object Holding Area. This
could apply for a user working in Read–Only modality.
• Store map image. Stores the current map in the central DB as a map–image. When a map is
being stored, the administrator can specify the list of users (user name list) who are enabled
to load the map. It is also possible to send a mail to the users of the list.
• List map images. Lists all the map–image saved in the central Map DB;
1AA 00014 0004 (9007) A4 – ALICE 04.10
• Remove map image. Removes a map–image from the central Map DB. It is also possible to
send a mail to the users of the list.
ED 01 SC.5:OPERATION
334
• Get map images. Retrieves all objects from an existing map–image in order to populate the
current map.
• Lock map image. Locks a map–image in order to prevent other users from accessing it while
not permitted without written authorization from Alcatel.
the administrator is working on it. This operation also permits to send a mail to the users of the
All rights reserved. Passing on and copying of this
document, use and communication of its contents
list.
• Unlock map. Release a map–image that has been previously locked. This operation also
permits to send a mail to the users of the list.
For more detailed information refer to Section 5, Graphical Interface. In particular see paragraph 3.6.
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED 01 SC.5:OPERATION
334
2.12 Payload Configuration
At the end of the network implementation the network is automatically configured at higher order, i.e. the
MIB contains all the HOLCs with the HOCTPs.
– modifying the existing payload configuration (e.g. from 63 x 2 Mb/s to 3 x 34 Mb/s payload structure)
– Ring
– Physical connection
– Higher order link connection
– Higher order trail
N.B. The payload configuration is not required for NPE Ring, since the 1664SM network element can
implement only connections at VC4 level.
a) FROM NETVIEW
2) Select the command: Tools: Modify Payload or click on the relevant tool button. The Payload
Configuration window is presented.
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED 01 SC.5:OPERATION
334
b) FROM BROWSER
1) Select the object from the Browser window and launch the Configure Payload application by
selecting the appropriate Tool button.
not permitted without written authorization from Alcatel.
All rights reserved. Passing on and copying of this
document, use and communication of its contents
If the object to be payloaded is a ring or a physical connection, the virtual container fields are shown
on the Payload Configuration window. The operator can write the new configuration into these fields
or he can choose it using the selection box on the right of the VC fields (Dictionary). Enter the
configuration and click on OK.
If the object to be payloaded is an HO trail or an HO–LC, the list of configurable TUG is presented.
Choose the TUG combination and click on OK. For example the TU12, TU12, TU3 combination
means 21 TU12+ 21 TU12+ 1 TU3.
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED 01 SC.5:OPERATION
334
2.12.2 Payload Configuration monitoring
When the payload configuration is in progress, the operator can supervise the operations performed by
the process. It mainly means:
b) If the object to configure is a ring, the working state of all the contained physical connections must
be ”configuring”. To do this enter command: Display:Related items:Physical Connections, starting
from a ring.
c) If the operator wants to supervise the other objects involved in payload configuration, he can issue
a Display:All Related items command on mstrails, Client Link Connections, HOtrails, Low Order Link
Connections, etc.
At the end of the configuration process the working state of the configured objects must return to ”normal”;
otherwise the working state becomes ”Fail to Configure”.
NOTE
ED 01 SC.5:OPERATION
334
2.12.3 Payload Configuration supervision
When the payload configuration is successfully completed, the user can supervise it in the following ways:
not permitted without written authorization from Alcatel.
a) From the map select the Physical Connection and use the pop–up menu Payload Configuration. The
All rights reserved. Passing on and copying of this
document, use and communication of its contents
routing display
West Aggr ms trail HO trail LO link connections
b) From the browser display the ring or the physical connection: both objects have dedicated fields
displaying the actual configuration of the Physical Connection. You can also use the Display: Related
items: Physical Connection Structure option to display the relevant drawing window.
1AA 00014 0004 (9007) A4 – ALICE 04.10
c) From the browser or from the Physical Connection drawing window you can open the graphical
window on the SDH Port, which displays the payload configuration supported by the port.
ED 01 SC.5:OPERATION
334
2.13 AU4 Concatenation
PAYLOAD CONFIGURATION
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED 01 SC.5:OPERATION
334
b) The actual payload structure is displayed in the bottom section of the window.
not permitted without written authorization from Alcatel.
All rights reserved. Passing on and copying of this
document, use and communication of its contents
PAYLOAD
STRUCTURE
first AU4
c) Click on the AU4 which will be the first AU4 of the concatenated stream. A subwindow is displayed
( see Figure 61. on page 70), which allows to select the payload structure. If the operator selects
AU4–4C and presses OK, the concatenated configuration is set up in the Payload Configuration
window. See Figure 62.
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED 01 SC.5:OPERATION
334
not permitted without written authorization from Alcatel.
All rights reserved. Passing on and copying of this
document, use and communication of its contents
Figure 61. Payload selection subwindow.
SETUP BUTTON
MS–TRAIL
CONCATENATED
PAYLOAD
CONFIGURATION
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED 01 SC.5:OPERATION
334
d) Click on SETUP button to confirm. The configuration is sent to the Network Elements and a Report
Log is displayed. See below Figure 63.
not permitted without written authorization from Alcatel.
All rights reserved. Passing on and copying of this
document, use and communication of its contents
a) Select the relevant Physical Connection and issue Display: Related Items: MS Trail Structure. The
graphical window is displayed in Figure 64. herebelow.
CONCATENATED
AU4–4C
MS–Trail
ED 01 SC.5:OPERATION
334
2.13.3 AU4 Concatenation Remove
a) From the browser select the MS trail to configure and click on Payload Configuration button. The
Payload Configuration window is presented. See Figure 60.
c) Click on the first AU4 of the concatenated stream. A subwindow is displayed ( see Figure 65. on
page 72 ), which allows to select the payload structure. If the operator selects AU4 and presses OK,
the concatenated configuration is removed from the Payload Configuration window.
d) Click on SETUP button to confirm. The configuration is sent to the Network Elements and a Report
Log is displayed. See below Figure 66.
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED 01 SC.5:OPERATION
334
Notice that the operation of physical connection remove comprises the removal of the physical
connection, MS trail and link connections. The involved ports are deassigned. No action is made
on the AU4s at NE level, which hold the last setting ( concatenated or not concatenated ).
not permitted without written authorization from Alcatel.
All rights reserved. Passing on and copying of this
document, use and communication of its contents
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED 01 SC.5:OPERATION
334
2.14 Setup Trail
A HO–Trail can be created only between nodes external to the NPE MS–Spring.
a) Select the Trail Termination points to be created on the map and then the Pull–down Supervision:Trail
Setup menu.
The Setup Trail dialog box is presented; it already contains the two selected nodes.
b) As an alternative, from the Browser select the HO–CTPs that will support the HO–Trail termination
HO–TTPs and then launch the Setup Trail application by selecting the relevant tool button.
c) The Setup Trail dialog box is presented. It already contains the selected objects.
d) If one or more end–nodes / ctps are in a globally configured ring issue a Show/Set Attributes of the
ring in order to modify the global configuration to False. Select Set, then Apply.
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED 01 SC.5:OPERATION
334
not permitted without written authorization from Alcatel.
All rights reserved. Passing on and copying of this
document, use and communication of its contents
e) In the Setup Trail dialog box enter the Trail name (user label ), the number of trails (only if you have
selected nodes) and select the trail configuration. Click on OK. The Creation Report is presented as
in Figure 69. and the Paths in trail view opens ( see Figure 70. )
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED 01 SC.5:OPERATION
334
not permitted without written authorization from Alcatel.
All rights reserved. Passing on and copying of this
document, use and communication of its contents
Figure 70. Paths in trail view.
Note that the number of trails can be specified only for trails between nodes.
• Not protected
• SNCP protected
• D&C protected
– Setup rule:
• user. The Operator must allocate and then implement the trail in a manual mode.
ED 01 SC.5:OPERATION
334
N.B. The trail can be terminated with an SNCP connection only in case of 1661SMC equipment with
Enhanced connectivity (able to create an SNCP connection with grooming). Otherwise the trail
must utilize an unprotected physical connection and create the SNCP connection in another
NE. See Figure 71.
not permitted without written authorization from Alcatel.
All rights reserved. Passing on and copying of this
document, use and communication of its contents
SPARE
LO–LCs
LO–CTPs
LO–CTPs
MAIN
SPARE
LO–LCs
LO–CTPs LO–CTPs
MAIN
ED 01 SC.5:OPERATION
334
2.14.1 Trail remove
A trail can be removed only if it is not crossed by any path. In addition, the trail must be configured at higher
order ( VC–4 ); so it can be deimplemented, deallocated and finally removed.
a) Select the trail from the trail list or from a drawing window ( e.g. Paths in Trail, Physical Connection
structure, ..) and issue the command Modify Payload. The payload configuration window is
displayed, already containing in the drop area the selected trail.
Setup button
AU4 configuration
b) Select the configuration at higher order AU4, as in Figure 72. and click on Setup button. Wait...
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED 01 SC.5:OPERATION
334
c) In the trail list the operator can verify that the payload configuration has been successfully changed
to higher order VC4. See Figure 73.
not permitted without written authorization from Alcatel.
All rights reserved. Passing on and copying of this
document, use and communication of its contents
configuration=AU4
d) Select the trail and issue the command Actions:Configuration:Deimplement from the pull–down
menu bar. The trail configuration state changes to Deimplemented.
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED 01 SC.5:OPERATION
334
e) Select the trail and issue the command Actions:Configuration:Deallocate from the pull–down menu
bar. The trail configuration state changes to Deallocated. ( See Figure 75. )
f) Select the trail and issue the command Actions:Remove: Remove from MIB from the pull–down
menu bar. The trail is removed.
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED 01 SC.5:OPERATION
334
2.15 Upload NAPs
The Upload NAPs operation is required to take in charge the NAPs ( Network Access Points ) at RM side.
NAPs are Lower Order Trail Termination Points for 2 Mb and 34 Mb tributary ports or Higher Order Trail
not permitted without written authorization from Alcatel.
Termination Points for 140 Mb tributary ports. In practice a NAP coincides with a VC–12, or VC–3, or VC–4.
All rights reserved. Passing on and copying of this
document, use and communication of its contents
As a result of this command, PDH ports are assigned to the Regional Manager and the related TTPs are
created in the RM database.
This command can be issued for the whole network, for a subnetwork only, an Elementary Topology (ring)
or a single Node.
SEQUENCE
a) From Netview map select a topological object and issue the command Supervision: Upload NAPs
from the pull–down menu bar. A dialog box alerts that the action has been correctly started.
ED 01 SC.5:OPERATION
334
2.15.1.1 Upload NAPs from Browser
SEQUENCE
ED 01 SC.5:OPERATION
334
2.15.1.2 NAP upload monitoring
The operator can monitor in real time the upload in progress by means of the browser, which displays the
working state=uploading of the involved topological object. See Figure 78.
not permitted without written authorization from Alcatel.
All rights reserved. Passing on and copying of this
document, use and communication of its contents
Working state=
uploading
ED 01 SC.5:OPERATION
334
2.15.1.3 Verify the Upload of NAPs
2) From the selection dialog box of Figure 80. on page 85 click on option NAPs and click on No
Filter. The NAP list is displayed. See Figure 83. on page 86
ED 01 SC.5:OPERATION
334
not permitted without written authorization from Alcatel.
All rights reserved. Passing on and copying of this
document, use and communication of its contents
1) Select from the suitable submap the topological object to verify and click on the functional button
NAP list. See Figure 81. The filter dialog box is presented (see Figure 82. on page 86) Click
on Apply. The NAP list is displayed as in Figure 83.
Nap list
ED 01 SC.5:OPERATION
334
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED
01
957.130.872 H
SC.5:OPERATION
Figure 83. NAP list.
Figure 82. Filter dialog box.
334
3AL 61259 AA AA
86 / 334
All rights reserved. Passing on and copying of this
document, use and communication of its contents
not permitted without written authorization from Alcatel.
3 TRANSPORT MANAGEMENT
– Path Constraints
– OS driven restoration
– Join/Split trail
3.1.1 Introduction
The path creation can be executed only in an implemented network with already uploaded NAPs.
– Path Create
You can then display the path route using the SDH netview or browser application.
ED 01 SC.5:OPERATION
334
3.2 Path Create
ED 01 SC.5:OPERATION
334
You can enter the following selections:
– userlabel
– type (UNIDIR/BROADCAST/BIDIR)
not permitted without written authorization from Alcatel.
N.B. For QB3* equipment the user can enable the UPA alarm by issuing the command Alarm
Enabling: LOP, EXBER, UPA command on the selected CAP. See Section Maintenance for
details.
The system provides defaults values for all attributes except for the userLabel.
If the user, when creating the path, selects Alarm Enabling Rule: Manual, for this Path it will be possible
to enable / disable the involved alarms ( from the Path List: menu Actions: SDH/PDH Alarms
enable/disable. See Figure 85.
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED 01 SC.5:OPERATION
334
In addition, after path creation, from the Path List the user can modify the PDH/SDH alarm enabling rule
by selecting the menu Actions: SDH/PDH Alarms: Set enabling rule, as in the case of path creation.
A dialog box is presented, which allows the enabling rule selection by means of a dictionary. See
b) Open the Network pop–up menu and select Display: Related items.
c) In the selection box select the option All Nodes and click on Apply.
The Nodes belonging to the selected Network are displayed in the node list window.
d) Select the first node involved in the path and execute Actions: Display: Related items: NAPs.
The Nap list is presented.
e) Select the NAP and click on the Path Creation tool button.
h) Click on the Create Path button. A dialog box informs: ’ Starting path creation’
If the path is created the browser window of path and used naps is automatically shown; starting from this
window is it possible to perform all actions on path (eg. allocate, implement, ...). In case of Multiple path
creation (see next paragraph) the list of created paths is automatically shown.
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED 01 SC.5:OPERATION
334
not permitted without written authorization from Alcatel.
All rights reserved. Passing on and copying of this
document, use and communication of its contents
b) Select menu Path: Create. The Path Create dialog box is open. It contains the already selected
nodes.
c) Click on the Path Creation button. A dialog box informs: ”Starting Path Creation”. The system
chooses the first free NAP from the selected nodes.
A message will inform whether the operation was successful or not.
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED 01 SC.5:OPERATION
334
3.2.1.2 Multipath Create
If the Operator selects the Multipath Create button, a dialog box is displayed. The following values must
be specified:
If Append is selected, the path sequential numbering is added as a suffix to the name of the path.
If you want to insert the sequential numbering in the inner of the path name, the userlabel containing the
%nd characters should be written where ”n” corresponds to the numbering field size. In this case you have
to select ”Replace”.
The Associate feature is provided (same route) if the following are selected:
starting any
This feature allows to associate as constraint the first created path. The user can carefully setup the
first created path. The remaining ones will have the same route.
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED 01 SC.5:OPERATION
334
3.2.1.3 Path Create by using NETVIEW Browse: Nap(s)
a) Select the involved nodes from the map and enter Browse:Nap(s):Idle 2Mb/ Idle 34Mb/ Idle140Mb
/ filtered.
not permitted without written authorization from Alcatel.
All rights reserved. Passing on and copying of this
document, use and communication of its contents
The NAP lists of both originating and terminating nodes are displayed.
b) From the NAP list of the originating node select the NAP and press tool button Create Path . The Path
Create dialog box opens, it contains the first selected NAP.
c) From the NAP list of the terminating node select the relevant NAP and press the tool button Create
Path. The selected NAP is added to the NAP list of the Path Create dialog box.
UPON CREATING A PATH AND SPECIFYING THE NOT ALARMED RESOURCES ONLY
OPTION, RM ONLY TAKES INTO ACCOUNT THE ROUTING RESOURCES AND NOT THE
NAP ONES.
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED 01 SC.5:OPERATION
334
3.3 Path Allocate,Implement, Commissioning and Display
This paragraph describes the commands used to modify path configuration state and to display the path.
The Path state is ”defined” after having been created. The operator can allocate the path, i.e. the network
resources can be assigned to it.
a) Open the Path list: from the Browser point to the Network icon and issue the Display: Related items
pop up command. From the list of the available items select Paths in Topology and click on button
” No Filter”.
b) From the list select the path to allocate and select the Actions: Configuration: Allocate pull–down
menu.
The Path working state changes from allocating to normal at the end of the allocation.
The Path configuration state changes from defined to allocated at the end of the allocation.
N.B. The Path Allocation can be executed only if the network is properly configured.
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED 01 SC.5:OPERATION
334
3.3.2 Path Implement
a) From the Path List select the path and the Actions: Configuration: Implement pull–down menu item.
not permitted without written authorization from Alcatel.
All rights reserved. Passing on and copying of this
document, use and communication of its contents
The Path Implement activity consists in sending commands to the NEs in order to set up the NE internal
connections.
The Path working state changes from implementing to normal at the end of the implementation.
The Path configuration state changes from allocated to implemented at the end of the implementation.
a) From the Path List select the path and the Actions: Configuration: Commission pull–down menu item.
When the path is in this state no other operations are possible except for path de–commissioning and
performance monitoring and TCAs enabling/disabling. (Threshold crossing).
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED 01 SC.5:OPERATION
334
3.3.4 Displaying the path route
It is possible to display the path route for allocated, implemented and commissioned paths from browser
or path inventory applications and from SDH netview.
From the Path List you can display the path route window by selecting the Show the Path Route icon.
From the Routing Display window you can display the Route Report by selecting View: Report: Route
full....
ED 01 SC.5:OPERATION
334
3.3.4.2 Path Routing view
This view displays the complete path route including the main resources dedicated to the selected path.
not permitted without written authorization from Alcatel.
From the Path Routing view you can display the route report of the path by entering the command View:
All rights reserved. Passing on and copying of this
document, use and communication of its contents
The Path Routing view wholly represents the connectivity objects belonging to a defined path.
The view is subdivided into vertical columns (named Main, Spare, Service), each of which represents a
whole route.
Some cases can be distinguished:
• Main
• Spare (more than one spare route can be present)
• different service routes
The number of service and spare connections depends on how the path has been constructed.
Moreover if the path is broadcast, the different legs are separately represented.
The main and spare routes are represented for each leg if the path is of the broadcast and protected type.
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED 01 SC.5:OPERATION
334
3.3.4.3 Main Route
The Main route graphical representation comprises (in the area relevant to the first column):
On the right–hand side of the different connections in topology the first end point (NAP) is depicted, hence
in the column are displayed the CTPs and the link connections connecting the CTPs belonging to different
nodes.
The link connection icon contains the label describing the relevant payload position.
The representation of the ”Switch” connections in topology ( either Switch or Bridge & Switch ) contains
an icon (Resource Type) indicating the actual switch status. It can be:
– C It is used only for a D&C type switch, i.e. for the service type connections. It
indicates that the switch is set at ”Service”.
The connection in topology of the Switch, B&S, or Service type may also contain the Operation Mode
information (bidirectional arrow) which can be Revertive or not Revertive.
N.B. The Path Routing View permits to display the actual route of the path. For this purpose the
switch Resource Type indications should be analyzed. In the following Figure 91. are given two
examples:
MAIN
M M M M
M M
MAIN
SPARE
SPARE
ED 01 SC.5:OPERATION
334
not permitted without written authorization from Alcatel.
All rights reserved. Passing on and copying of this
document, use and communication of its contents
Naps view
Clicking on the group icon ’Routing display’ located on the view next to the link connection, it is possible
to display the objects relevant to the Link Connection at higher order .
Clicking on ’Nap view’ button inside the icon bar (see Figure 92. ) it is possible to open the view to display
all path’s terminations (see Figure 87. ).
N.B. For a path crossing a NPE Ring the path routing view displays the Main route: the link
connection label contain a “ R “ or a “ U “ to identfy if the path is a High Priority (HP=Reliable)
or a Low Priority (LP=Unreliable). HP paths make use of the Working capacity; LP paths make
use of the Protection capacity.
1AA 00014 0004 (9007) A4 – ALICE 04.10
For a path crossing a NPE Ring, the user can verify the connections on the traffic map.
ED 01 SC.5:OPERATION
334
3.3.4.4 Path route on SDH netview
The scope of this procedure is to display the path/trail route in the Netview maps. The Highlite button is
present in the Path list/ Trail list and in other drawing windows containing the object to show( Naps view,
Notice that the view is not automatically refreshed after a modification of the protection (Add/Remove
protection) ; in this case the sequence of operations must be executed again.
SEQUENCE
a) From the path list select the path to display and click on Highlight button.
Highlight button
ED 01 SC.5:OPERATION
334
1) If the transport is not protected the dialog box of Figure 94. is presented. The following options
are available:
a) Select the options (multiple selections are allowed) and click on Apply button. The path
is highlighted in the netview maps. See an example in Figure 95.
ED 01 SC.5:OPERATION
334
2) If the transport is protected the dialog box of Figure 96. is presented. The following options are
available:
• Service to display the service spare route, for D & C paths only ( triangular flag )
a) Select the options (multiple selections are allowed) and click on Apply button. The path
is highlighted in the netview maps. See an example in Figure 97.
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED 01 SC.5:OPERATION
334
All rights reserved. Passing on and copying of this
document, use and communication of its contents
not permitted without written authorization from Alcatel.
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED
01
957.130.872 H
SC.5:OPERATION
Figure 97. Locate display ( protected path )
334
3AL 61259 AA AA
103 / 334
3.4 Path /TrailConstraints
This procedure allows to set–up constraints on a path or trail, i.e. to get/exclude the use of certain
resources for a path or trail.
Trail Constraints can be always issued but they will be taken into account during the trail setup phase:
so if the trail is set, the operator must deimplement and deallocate it and subsequently issue a new
allocation.
In order to create a new constraint, select the path from Path List and click on the Path Constraints tool
button.
The Path Constraints dialog box is opened. Two possibilities are available:
Path/Trail drop area
Constraint drop area
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED 01 SC.5:OPERATION
334
1) From Browser select the object to utilize as a constraint. The objects available are:
– ctp
All rights reserved. Passing on and copying of this
document, use and communication of its contents
– routing link
– lc
– path
– trail
2) From the map (Netview) create the constraint by selecting the object to utilize as a constraint
and the Path: Constraint pull–down menu .
After having added the constraint/constraints, for each constraint the selection is done between Use
Main and Use Spare for an unprotected path.
– Use Main
– Use Spare
– Not use Main
– Not use Spare
– Use Main and Spare
– Not use
– Use Service (for a D&C protected path)
– Not use Service (for a D&C protected path)
– Overlapped if the object utilized as a constraint is a path
– Disjointed if the object utilized as a constraint is a path
– Use Main as A. This constraint can be applied only to a CTP, used as constraint to a unidirectional
or broadcast path. See Figure 99.
NAP
source
CTP CTP CTP CTP CTP
A Z A Z A Z
– Use Main as Z. This constraint can be applied only to a CTP, used as constraint to a unidirectional
or broadcast path. See Figure 99.
– Use Main and Spare as A, if the main and spare route are using the same CTP as A termination.
ED 01 SC.5:OPERATION
334
The values Use Service Forwards and Use Service Backwards are significant for paths crossing a
Dual Node SNCP network.
The user drops as constraint one of the Physical connections between the two D& C nodes, or a link
If the user selects Use Service Backwards, the object dropped as constraint will be used as service
route/termination to protect the backward transmission direction (from Z to A or from the right to the
left or the RX). See Figure 100. herebelow.
FORWARD
BACKWARD
Figure 100. Use Service Forward/Backward for Dual Node SNCP network
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED 01 SC.5:OPERATION
334
3.5 Adding a leg to a path
b) Enter the command Add: Leg either by selecting the relevant tool button or by using the menu
All rights reserved. Passing on and copying of this
document, use and communication of its contents
Actions: Boadcast Path Modify: Add Leg . See Figure 101. The Add Leg dialog box opens. The path
icon is contained in the path drop area. See Figure 102.
c) Select the node from the node list or the NAPfrom the nap list and enter the command Add: Leg either
by selecting the relevant tool button or by using the menu Actions: Broadcast Path Modify: Add Leg
as shown in Figure 103. The selected node now appears in the Leg drop area of the Add Leg dialog
box.
d) Click on button Add Leg. See Figure 104. The leg is allocated and implemented.
Add Leg
ED 01 SC.5:OPERATION
334
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED
01
957.130.872 H
Leg drop area
Path drop area
SC.5:OPERATION
Figure 102. Add Leg dialog box.
334
3AL 61259 AA AA
108 / 334
All rights reserved. Passing on and copying of this
document, use and communication of its contents
not permitted without written authorization from Alcatel.
All rights reserved. Passing on and copying of this
document, use and communication of its contents
not permitted without written authorization from Alcatel.
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED
01
Add Leg
957.130.872 H
SC.5:OPERATION
Figure 104. Add Leg button.
334
3AL 61259 AA AA
109 / 334
3.6 Path in NPE ring
For a path crossing a NPE ring the following attribute has been added:
• Normal (default)
When crossing 4 Fibers MS–Spring, the path uses only working (high priority) resources,
except for primary and secondary nodes of the double interconnection with another ring,
because these nodes are characterized by the Drop & Continue protection.
as a result, in the segment between service nodes:
– if the path is bidirectional (Figure 106. ), the used resource (nodes E, D, H, I) can be only
the protection one: a bidirectional D&C IC on protection is performed in the primary nodes
(D, H);
– if a path is unidirectional point–to–point (Figure 107. ), the used resource is:
• protection if the signal flows into the service nodes (B, C): a unidirectional D&C IC
on protection is performed in the primary node (B);
• working if the signal flows out of the service nodes (E, D): a multipoint connection
is performed in the primary node (E); this allows the user to perform subsequent add
leg operation;
it is possible to use the protection resource instead of the working (nodes E, D), e.g. forced
by a constraint (Figure 108. );
– if a path is broadcast (Figure 109. ), the used resource is:
• protection if the signal flows into the service nodes (B, C) like in a unidirectional
point–to–point path: a unidirectional D&C IC on protection is performed in the primary
node;
• working if the signal flows out of the service nodes (E, D): a multipoint connection
is performed in the primary node);
it is not possible to use the protection resource instead of the working one.
As a result of the previous rules defined for unidirectional and broadcast paths, a unidirectional
point–to–point path can become broadcast only if the working resources are used between
service nodes (nodes E, D in Figure 109. ).
N.B. The procedure used to create a path crossing a NPE Ring is the same as described at
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED 01 SC.5:OPERATION
334
working
protection
not permitted without written authorization from Alcatel.
All rights reserved. Passing on and copying of this
document, use and communication of its contents
A B C
NPE
F E D
G H I
NPE
N M L
working
protection
SNCP
A B C
NPE
F E D
SNCP
1AA 00014 0004 (9007) A4 – ALICE 04.10
Figure 107. unidirectional protected path (using working resource between nodes E and D)
ED 01 SC.5:OPERATION
334
working
protection
SNCP
Figure 108. unidirectional protected path (using protection resource between nodes E and D)
working
protection
SNCP
A B C
NPE
F E D
SNCP
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED 01 SC.5:OPERATION
334
3.7 Drop and Continue path
(see Figure 110. on page 114, Figure 111. on page 115, Figure 112. on page 116, Figure 113. on page
116.)
Drop and Continue is a way of protecting a path crossing a number of sub–networks, e.g., rings.
The sub–networks should be connected through at least two nodes (so realizing two independent
connections).
The resulting architecture affords protection against multiple failures (evenly distributed one per
subnetwork) tolerated without traffic loss (node failure or single cable cut).
The traffic entities interconnected by the drop and continue feature can be TU12, TU3 and AU–4.
The Drop and Continue feature improves traffic availability as compared with the simple ”end–to–end
SNCP/I”. More subnetworks are connected the further is availability increased.
The Drop and Continue features simultaneously realizes the following on one node:
• unidirectional pass–through
• protected drop
• D/C–W INS–W
• D/C–E INS–W
• D/C–E INS–E
• D/C–W INS–E
D/C stands for ”Drop and Continue”, the letter after it (W=West, E=East) indicates the ”drop protected” side
(e.g., W means West main side, and spare side is the EAST one).
The end letter (INS–E or INS–W) indicates the insert side.
1AA 00014 0004 (9007) A4 – ALICE 04.10
The ”Unidirectional pass–through” is always in the direction opposite to that of the ”insert” side (e.g., when
”INS E” the pass–through is from East to West).
ED 01 SC.5:OPERATION
334
For further information refer to Figure 110. on page 114 which shows the D/C–W INS–W configuration.
Tx Rx
TRIBUTARY
Tx Rx
The ”Drop and Continue” featuring two connected rings (with dual connection) is indicated in
Figure 111. on page 115.
SNCP/I protection is enabled throughout the equipment. When in normal condition, the unidirectional way
of traffic from 1 to 8 is supposed to be:1, 2, 3, 6, 7, 8.
After a failure on the 1st ring between nodes 2 and 3 (see Figure 112. on page116 ), the link direction
is: 1 , 5 , 4 , 3 , 6 , 7, 8.
After a second failure on the 2nd ring between nodes 6 and 7 (see Figure 113. on page 116) the selected
direction on the link is : 1 , 5 , 4 , 10 , 9 , 8.
The operative switch is on node 8 and the previous pass through between nodes 4 and 3 is no more used.
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED 01 SC.5:OPERATION
334
All rights reserved. Passing on and copying of this
document, use and communication of its contents
not permitted without written authorization from Alcatel.
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED
2
01
W
W
W
INS
D/CW
D/CW
6
3
957.130.872 H
INSW
INSW
W
INS
TRIB
SC.5:OPERATION
E
E
8
1
E
INS
D/CE
334
D/CE
3AL 61259 AA AA
4
10
INSE
INSE
E
INS
TRIB
E
E
9
5
115 / 334
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED
01
957.130.872 H
2
2
7
7
SC.5:OPERATION
6
3
6
3
8
1
1
8
4
10
10
Figure 112. Drop and Continue – 1st failure
5
5
334
3AL 61259 AA AA
116 / 334
All rights reserved. Passing on and copying of this
document, use and communication of its contents
not permitted without written authorization from Alcatel.
3.7.1.1 Path create in D & C network with ADMs (4–node D & C network)
a) With reference to the network shown in Figure 114. , select nodes 13 and 17 and issue Tools: Create
Path.
not permitted without written authorization from Alcatel.
All rights reserved. Passing on and copying of this
document, use and communication of its contents
b) In the path create dialog box of Figure 115. select protection = D & C SNCP. Click on Create button.
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED 01 SC.5:OPERATION
334
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED
c)
d)
01
957.130.872 H
SC.5:OPERATION
Allocate the path, as per Figure 116.
The path is created and its NAP view is displayed.
Figure 115. D & C path create.
334
3AL 61259 AA AA
118 / 334
All rights reserved. Passing on and copying of this
document, use and communication of its contents
not permitted without written authorization from Alcatel.
All rights reserved. Passing on and copying of this
document, use and communication of its contents
not permitted without written authorization from Alcatel.
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED
e)
01
957.130.872 H
SC.5:OPERATION
Figure 116. D & C path allocate.
334
3AL 61259 AA AA
Click on Routing view button. The path routimg view is displayed. See Figure 117.
119 / 334
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED
01
957.130.872 H
SC.5:OPERATION
Active=Main
334
3AL 61259 AA AA
D & C connInTopol
Service connection
120 / 334
All rights reserved. Passing on and copying of this
document, use and communication of its contents
not permitted without written authorization from Alcatel.
All rights reserved. Passing on and copying of this
document, use and communication of its contents
not permitted without written authorization from Alcatel.
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED
01
ET–2
957.130.872 H
SC.5:OPERATION
3.7.2 D & C path in a 2–Node SNCP network
ET–3
ET–1
334
3AL 61259 AA AA
Figure 118. Network submaps of the 3 Meshed ETs for 2 Node D & C
121 / 334
not permitted without written authorization from Alcatel.
2–N D&C
tpAZ tpZA
tpAZ tpZA
tpA tpZ
The path create procedure described at para 3.7.2.1 herebelow refers to the example network of
Figure 118. and Figure 119.
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED 01 SC.5:OPERATION
334
3.7.2.1 D & C path create in a 2–Node SNCP network
The Path Create procedure is the same as described at paragraph 3.2 on page 88, with the following
exceptions:
not permitted without written authorization from Alcatel.
All rights reserved. Passing on and copying of this
document, use and communication of its contents
– Rate=140 Mb,
ED 01 SC.5:OPERATION
334
3.7.2.2 D & C path allocate in a 2–Node SNCP network
Upon path allocation, the system evaluates, as in case of basic D & C ( see Figure 122. )
– main route
Figure 121. on page 124 shows the locate view of the D & C path on the ET–2 submap.
ED 01 SC.5:OPERATION
334
not permitted without written authorization from Alcatel.
All rights reserved. Passing on and copying of this
document, use and communication of its contents
If you click on the icon of the Switch status, the system opens a subwindow which displays the switch
status. Figure 123. shows the subwindows relevant to the routing display view of Figure 122.
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED 01 SC.5:OPERATION
334
not permitted without written authorization from Alcatel.
All rights reserved. Passing on and copying of this
document, use and communication of its contents
Z
Z ZA ZA
A AZ AZ
A
ED 01 SC.5:OPERATION
334
Z ZA
not permitted without written authorization from Alcatel.
All rights reserved. Passing on and copying of this
document, use and communication of its contents
A AZ
N.B. The drawing of the switch shows the main switch position (line) and spare switch position (
dashed line). The actual switch position is marked by a M ( switch turned on main ) or S ( switch
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED 01 SC.5:OPERATION
334
not permitted without written authorization from Alcatel.
All rights reserved. Passing on and copying of this
document, use and communication of its contents
BOARD
CTP NAME DETAIL NODE NAME
SUBRACK PORT
RACK Channel (N.A.)
PAYLOAD POSITION
N.B. The CTP name ( see above figure ) contains the port name; then from the CTP issue Display:
Related items: Ports. From the Port issue Display: Related items: Physical Connection.
– tp A: comprises a switch for the connections coming from tp Z and tp ZA, one point to point from tp
A to tp Z, one point to point from tp A to tp AZ
– tp Z: comprises a switch for the connections coming from tp A and tp AZ, one point to point from tp
Z to tp A, one point to point from tp Z to tp ZA
– tp ZA: comprises one point to point from tp ZA to tp A, one point to point from tp Z to tp ZA
– tp AZ: comprises one point to point from tp AZ to tp Z, one point to point from tp A to tp AZ
The default switch type is NOT revertive.
N.B. As in the case of the normal D&C, it is not possible from the User Interface to select the TPs
involved in the D&C but they are automatically selected by the algorithm. The TPs can be
selected from the command mode because this is needed to support the “redo–log”
functionality.
It is also possible to add or to remove the D&C protection to path without or with D&C protection by either
pointing to the topology where the interconnection NE’s are included (e.g. the ET2 of the figure) or to the
whole path.
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED 01 SC.5:OPERATION
334
All rights reserved. Passing on and copying of this
document, use and communication of its contents
not permitted without written authorization from Alcatel.
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED
01
957.130.872 H
SC.5:OPERATION
Figure 126. Path: Add Protection menu.
334
3AL 61259 AA AA
129 / 334
3.7.3 Path Constraints in a 2–Node SNCP network
The values Use Service Forwards and Use Service Backwards are significant for paths crossing a
Dual Node SNCP network.
If the user selects Use Service Forwards, the object dropped as constraint will be used as service
route/termination to protect the forward transmission direction (from A to Z or from the left to the right
or the TX). See Figure 128.
If the user selects Use Service Backwards, the object dropped as constraint will be used as service
route/termination to protect the backward transmission direction (from Z to A or from the right to the
left or the RX). See Figure 128.
FORWARD
BACKWARD
Figure 128. Use Service Forward/Backward for Dual Node SNCP network
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED 01 SC.5:OPERATION
334
3.7.4 D & C path in a 1–Node Enhanced SNCP network
This connection is usefull to increase the protection level when a single NE is interconnecting multiple
rings.
not permitted without written authorization from Alcatel.
All rights reserved. Passing on and copying of this
document, use and communication of its contents
In fact, a path supported by a single virtual ring between the end points A and Z, is not able to survive to
a double failure. See Figure 129. herebelow.
A Z
A A Z Z
The Path Create procedure is the same as described at paragraph 3.2 on page 88, with the following
exceptions:
– Rate=140 Mb,
If you click on the icon of the Switch status, the system opens a subwindow which displays the switch
status. shows the subwindows relevant to the routing display view of Figure 122.
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED 01 SC.5:OPERATION
334
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED
01
957.130.872 H
SC.5:OPERATION
Figure 130. Path routing view ( one node D & C )
334
3AL 61259 AA AA
132 / 334
All rights reserved. Passing on and copying of this
document, use and communication of its contents
not permitted without written authorization from Alcatel.
not permitted without written authorization from Alcatel.
All rights reserved. Passing on and copying of this
document, use and communication of its contents
Z Z
A
A
N.B. Figure 131. shows the involved connections . The default switch type is NOT revertive
N.B. The drawing of the switch shows the main switch position (line) and spare switch position
(dashed line). The actual switch position is marked by a M ( switch turned on main ) or S ( switch
1AA 00014 0004 (9007) A4 – ALICE 04.10
The implementation of the enhanced SNCP causes the creation of 4 unidirectional SNCP in the NE: .
ED 01 SC.5:OPERATION
334
– tp A: comprises a switch for the connections coming from tp Z and tp ZA, one point to point from tp
A to tp Z, one point to point from tp A to tp AZ
– tp Z: comprises a switch for the connections coming from tp A and tp AZ, one point to point from tp
– tp AZ: comprises one point to point from tp AZ to tp Z, one point to point from tp A to tp AZ
N.B. As in the case of the normal D&C, it is not possible from the User Interface to select the tp’s
involved in the D&C but they are automatically selected by the routing algorithm. The tp’s can
be selected from the command mode because this is needed to support the “redo–log”
functionality.
It is also possible to add or to remove the D&C protection to path without or with D&C protection by either
pointing to the topology where the interconnection NE’s are included (e.g. the ET which contains the Cross
connect equipment) or to the whole path.
– the enhanced SNCP is automatically inserted at path/trail allocation time for protected paths/trails
when the main and the spare are crossing the same NE and the equipment supports this type of
protection.
– The user can add / remove the enhanced SNCP protection in two different ways:
• applying the add/remove service to the whole path/trail: the enhanced SNCP protection is also
removed
• applying the add/remove service to the connection in topology at NE level: the enhanced SNCP
protection is modified only at NE level.
• No limitation should be present on the NE support of the connection since the result in this case
is the failure in implementing the protected path
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED 01 SC.5:OPERATION
334
3.8 Add / Remove Protection
The Add / Remove Protection command can be executed on a path/trail or directly on the connections in
topology.
not permitted without written authorization from Alcatel.
All rights reserved. Passing on and copying of this
document, use and communication of its contents
The resources needed for a successful command completion could be used by other paths; it is
advisable to create protected paths instead of adding subsequently the protection; namely in
this case the allocation algorithm makes the reservation of non–overlapped routes.
In case of overlapping of an existing route with the new protection route required by the Add
Protection command, it is possible to find the existing route by using the Paths in trail view
invoked on the trails terminated to the nodes where terminates the path to be protected.
Paragraph 3.8.1.2 at page 142 describes the Add Protection in a nested topology.
The procedure which follows deals about the display of an unprotected path ( see also paragraph 3.3.4.2).
PATH
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED 01 SC.5:OPERATION
334
a) From the path list select an unprotected path.
1) If you click on routing view button, the routing display is presented. See Figure 133.
Naps view
ED 01 SC.5:OPERATION
334
All rights reserved. Passing on and copying of this
document, use and communication of its contents
not permitted without written authorization from Alcatel.
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED
01
957.130.872 H
SC.5:OPERATION
Figure 134. Netview locate (unprotected path)
334
3AL 61259 AA AA
137 / 334
3.8.1 Add Protection ( path )
a) Select the path from the path list and issue the command Actions: Add protection. The option items
are:
– Service. This item is selectable only if the path protection type is D & C. The service route is allocated
and implemented.
– Service (only allocation). This item is selectable only if the path protection type is D & C. The service
route is allocated.
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED 01 SC.5:OPERATION
334
b) Select option item Spare. The spare route is allocated and implemented. See locate view in
Figure 136. and routing display in Figure 137.
not permitted without written authorization from Alcatel.
All rights reserved. Passing on and copying of this
document, use and communication of its contents
main route
is used
main route
is used
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED 01 SC.5:OPERATION
334
3.8.1.1 Remove Protection ( Path )
a) Select the path icon from the routing display and move the mouse to Remove protection menu item.
Two options are selectable:
• Keeping main. If the actual route corresponds to the main one, the protection route ( the spare
one ) is removed and the path remains on the main route .
• Keeping spare. If the actual route corresponds to the spare one, the protection route ( the main
one ) is removed and the path remains on the spare route .
• Service. If the actual route corresponds to the main/spare route, the service route is removed
and the path remains on the main/spare route.
• Keeping main. The protection route ( main or spare one ) is removed and the path remains/is
routed on the main route .
• Keeping spare. The protection route ( main or spare one ) is removed and the path remains/is
routed on the spare route .
• Service. The service route is removed and the path remains/is routed on the main/spare route.
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED 01 SC.5:OPERATION
334
b) Select (this is an example) Remove Protection (no check).
Figure 133. and Figure 134. show respectively the routing display and the locate display.
not permitted without written authorization from Alcatel.
REFRESH button
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED 01 SC.5:OPERATION
334
3.8.1.2 Add protection in a nested topology
In this example a protected path can be furthermore protected in its nested topology. The locate display
of the path is shown in Figure 139. and the routing display is shown in Figure 140.
The routing display is updated, showing the additional spare route within the topology. See
Figure 141.
MAP OF RING R1
nested topology
ED 01 SC.5:OPERATION
334
All rights reserved. Passing on and copying of this
document, use and communication of its contents
not permitted without written authorization from Alcatel.
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED
01
957.130.872 H
SC.5:OPERATION
connection in topology of the nested topology
334
3AL 61259 AA AA
Figure 140. Routing display: protected path: nested ring.
143 / 334
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED
01
957.130.872 H
SC.5:OPERATION
334
3AL 61259 AA AA
Figure 141. Routing display; path protected in its nested topology.
144 / 334
All rights reserved. Passing on and copying of this
document, use and communication of its contents
not permitted without written authorization from Alcatel.
3.9 OS driven restoration for HO paths & trails
Create a restoration rule means enable the restoration function for the selected transport ( path or trail )
according to the rule being created.
a) From the path list or trail list select an HO path or an HO trail and issue the command
Actions:Restoration:Create Restoration Rule. See Figure 142. The Create Restoration Rule is
displayed. See Figure 143. on page 146
ED 01 SC.5:OPERATION
334
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED
01
957.130.872 H
SC.5:OPERATION
Figure 143. Create: Restoration Rule.
334
3AL 61259 AA AA
146 / 334
All rights reserved. Passing on and copying of this
document, use and communication of its contents
not permitted without written authorization from Alcatel.
b) Select the following attributes:
– optimized add protection (for point to point transports only) .This strategy does not cause
All rights reserved. Passing on and copying of this
document, use and communication of its contents
a complete path rerouting but only finds a spare route inside the lowest level topology
( e.g. a ring ) affected by the fault.
– end to end add protection. (for point to point and broadcast transports) This strategy
causes a complete path rerouting by allocating the path spare route.
– remove protection + end to end add protection (for point to point transports only). It
removes the protections and adds one end to end spare route. For paths protected by the
D&C mechanism both spare and spare+service connections are removed; only one end
to end spare route is allocated.
2) Hold Off Time (sec) . This time is the waiting time before starting the restoration subprocess.
– all objects. This option will successfully restore the transport upon repair of the related
resources.
– use default constraints. This option sets the usage of the ”spare” constraints for the
transport restoration. The ”spare” constraints are added by means of the Path Constraints
application.
c) Click on the functional button Create. The restoration rule is created. Its name coincides with the
transport name.
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED 01 SC.5:OPERATION
334
3.9.2 Display a restoration rule
a) From the browser point to the network domain and issue the command Display: Related Items. Select
Restoration Rules. The icon of the restoration domain is displayed in the browser window ( see
ED 01 SC.5:OPERATION
334
The displayed attributes are:
b) You can display other attributes by selecting the transport and issuing the command
Actions:Details:Show/Set Attributes. The dialog box of Figure 146. is presented.
ED 01 SC.5:OPERATION
334
For trail or path the attribute Restoration state can assume one of the following values:
ED 01 SC.5:OPERATION
334
3.10 Join/Split Path
Join/Split path are used to merge a pair of paths into one single path or to slit a path into a pair of paths.
not permitted without written authorization from Alcatel.
All rights reserved. Passing on and copying of this
document, use and communication of its contents
SCOPE The scope of this procedure is to merge a pair of paths into one single path.
CONDITIONS
a) In the example which follows a path crossing RING1 must be merged to a path crossing RING2.
RING R1 2
SUBNETWORK S1
RING R2
SUBNETWORK S2
b) By clicking twice on the icons of RING1 and RING2 it is possible to display the two ring submaps.
See Figure 148.
c) Both RING1 and RING2 are crossed respectively by path P1 and path P2 which physically are the
same path. Namely both P1 and P2 are terminated to virtual nodes NE_V1 and NE_V2. The Path
List containing P1 and P2 is shown in Figure 149. To display the Path List, from the browser, point
to the Network icon and issue Actions: Display: Related items: Paths in Topology + No Filter.
ED 01 SC.5:OPERATION
334
not permitted without written authorization from Alcatel.
All rights reserved. Passing on and copying of this
document, use and communication of its contents
RING R1
RING R2
d) Select path P1 and click on Highlight button. In the Locate Objects dialog box choose the desired
options (see detailed description at paragraph xxxx and click on Apply button. The path is displayed
in the map. See Figure 150. Execute the same operation for path P2. See Figure 150.
HIGHLIGHT
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED 01 SC.5:OPERATION
334
All rights reserved. Passing on and copying of this
document, use and communication of its contents
not permitted without written authorization from Alcatel.
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED
01
RING R1
957.130.872 H
PATH P1 DISPLAY
SC.5:OPERATION
RING R2
334
3AL 61259 AA AA
153 / 334
SEQUENCE
a) Create a virtual SDH port ( via menu command Construction: Create Virtual: Port ) in node NE–V1
and NE–V2.
2) In the Virtual Port create dialog box ( see below figure) enter the required values to create the
virtual port.
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED 01 SC.5:OPERATION
334
b) Select from the map virtual node NE–V1 and issue Construction: Upload EML(s) info...: Available NE
PORTs.
Select from the map virtual node NE–V2 and issue Construction: Upload EML(s) info...: Available NE
not permitted without written authorization from Alcatel.
c) From the submaps of NE–V1 and NE–V2 select the virtual ports which have just been created and
issue Construction: Create Connection ( F12 button). See below figure.
ED 01 SC.5:OPERATION
334
d) In the Create Connection dialog box enter the connection name and click on Create button. The
connection is created in all related submaps. See Figure 156. on page 156.
N.B. If the paths to merge are protected, two virtual Physical connections must be created at above
steps a) to d). The redundant SDH virtual ports must be created accordingly.
e) Execute the implementation of the virtual physical connection. Select the virtual physical connection
from the map and issue Supervision: Implement Object
f) Execute the payload configuration of the virtual physical connection: select the object from the map
1AA 00014 0004 (9007) A4 – ALICE 04.10
and issue Tools: Modify Payload. The payload structure must be congruent with the configuration of
R1 and R2.
ED 01 SC.5:OPERATION
334
All rights reserved. Passing on and copying of this
document, use and communication of its contents
not permitted without written authorization from Alcatel.
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED
01
957.130.872 H
SC.5:OPERATION
Figure 158. Path Create between virtual nodes.
334
3AL 61259 AA AA
Figure 157. Payload configuration of the virtual physical connection
157 / 334
not permitted without written authorization from Alcatel.
All rights reserved. Passing on and copying of this
document, use and communication of its contents
Figure 159. Path Create between the two virtual nodes.
g) Create a “virtual” path PV between the virtual nodes. This path should have the same attributes as
the two paths P1 and P2 to join. The Path Create dialog box is shown in Figure 159.
h) Allocate and the implement path PV (e.g. selecting the path from the path list and issuing Actions:
Configuration: Allocate and then Actions: Configuration: Implement.
i) From the path list (see Figure 160. herebelow) join first paths P1+PV. Select the paths and issue
Actions: Manage paths: Join path.
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED 01 SC.5:OPERATION
334
not permitted without written authorization from Alcatel.
All rights reserved. Passing on and copying of this
document, use and communication of its contents
j) In the Join path dialog box enter the name of the joined path (e.g. P3 ) and click on the functional
button Join path. After a few seconds paths P1 and PV are deleted and the new path P3 is created
and implemented.
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED 01 SC.5:OPERATION
334
k) From the path list join paths P2+P3. Select the paths and issue Actions: Manage paths: Join path.
l) In the Join path dialog box enter the name of the the joined path, e.g. P and click on the functional
button Join path. After a few seconds paths P2 and P3 are deleted and the new path P is created
and implemented. See Figure 163.
ED 01 SC.5:OPERATION
334
All rights reserved. Passing on and copying of this
document, use and communication of its contents
not permitted without written authorization from Alcatel.
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED
01
957.130.872 H
SC.5:OPERATION
Figure 164. Locate path P1 on the map.
334
3AL 61259 AA AA
161 / 334
3.10.2 Split path
SCOPE
a) Select the path P to split from the path list and issue Actions: Manage path: Split path
b) In the Split path dialog box enter the names of the two paths which are replacing the path to split and
click on Split path button. The system presents to the user the list of the nodes along the path route.
c) Select the node where the path must be split and confirm. Path P is deleted and the new paths are
created and implemented.
ED 01 SC.5:OPERATION
334
All rights reserved. Passing on and copying of this
document, use and communication of its contents
not permitted without written authorization from Alcatel.
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED
01
957.130.872 H
SC.5:OPERATION
Figure 167. Node selection.
Figure 166. Split path dialog box.
334
3AL 61259 AA AA
163 / 334
3.11 Join–Split Trail
Two HO–Trails entering in a given NE can be joined in order to reduce the LO usage of resources or an
HO–Trail crossing at HO a Node can be split in order to perform crossing at LO.
A given HO–Trail crossing at HO a Node can be split in order to perform crossing at LO. This enables the
usage of LO resources in the splitting Node.
The operation reproduces in the splitting node the same payload structure of the starting trail.
From the user point of view, the split trail operation consists of 2 phases:
a) the user specifies the trail to split: RM checks in which nodes of the trail the split can be performed
(i.e. nodes where LO capability is available, nodes not belonging to protected parts of the trail ...) and
prompts to the user the list of these nodes; no other action is accomplished by RM neither in RM MIB
nor in the NEs;
b) the user selects the splitting node and the operation can be executed.
ED 01 SC.5:OPERATION
334
All rights reserved. Passing on and copying of this
document, use and communication of its contents
not permitted without written authorization from Alcatel.
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED
01
957.130.872 H
SC.5:OPERATION
Figure 170. Path list.
Figure 169. Common node selection.
334
3AL 61259 AA AA
165 / 334
As a consequence of the operation:
– the old HO–Trail is deleted
– two new HO–Trails are created
– The LO–Paths ”crossing” the splitting Node are modified by adding LO pass–through connection.
The operation reduces the impacts on the existing traffic: the LO–Paths client of the involved HO trails are
disconnected only for the time necessary to perform the operation: only the segment of network between
the end nodes of the involved HO trails is affected.
Two HO–Trails entering in a given NE can be joined in order to reduce the LO usage of resources.
SEQUENCE
a) From the trail list select the HO–Trails to join. See Figure 171.
b) Select the command Actions:Manage Trails: Join trail. The Join trail dialog box is presented,
containing the two selected trails, as per Figure 172.
c) Click on button Join trail to start the operation. A confirmation is required. See Figure 173.
The payload structure and the LO connections of the 2 nodes at the end of the involved HO trails are not
modified during the operations: modifications to connections and payload structure are applied only to the
intermediate node.
The operation reduces the impacts on the existing traffic: LO–Paths client of the involved HO trails are
disconnected only for the time necessary to perform the operation and only in the segment of network
between the end nodes of the involved HO trails.
Figure 174. and Figure 175. show the joinig of the two trails.
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED 01 SC.5:OPERATION
334
All rights reserved. Passing on and copying of this
document, use and communication of its contents
not permitted without written authorization from Alcatel.
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED
01
957.130.872 H
SC.5:OPERATION
Figure 171. Actions: Manage Trails: Join trail.
334
3AL 61259 AA AA
167 / 334
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED
01
957.130.872 H
SC.5:OPERATION
Figure 174. Trail joining phase.
Figure 173. Confirmation dialog box.
334
3AL 61259 AA AA
168 / 334
All rights reserved. Passing on and copying of this
document, use and communication of its contents
not permitted without written authorization from Alcatel.
All rights reserved. Passing on and copying of this
document, use and communication of its contents
not permitted without written authorization from Alcatel.
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED
01
957.130.872 H
SC.5:OPERATION
Figure 175. Joined trail.
334
3AL 61259 AA AA
169 / 334
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED
01
957.130.872 H
SC.5:OPERATION
334
3AL 61259 AA AA
170 / 334
All rights reserved. Passing on and copying of this
document, use and communication of its contents
not permitted without written authorization from Alcatel.
4 PROTECTION MANAGEMENT
The SNCP switch management commands can be applied to SNCP paths (see Figure 176. ) or to Bridge
& Switch connections in topologies ( see Figure 176. on page 171 )
ED 01 SC.5:OPERATION
334
not permitted without written authorization from Alcatel.
All rights reserved. Passing on and copying of this
document, use and communication of its contents
Figure 177. Connection in topology:Manage SNCP menu.
Events which manage the switch position have a priority mark; in particular Forced SNCP commands have
priority greater than failure events, while failure events have priority greater than Manual SNCP
commands.
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED 01 SC.5:OPERATION
334
SEQUENCE
a) From the browser window, e.g. from the Routing display, point with the mouse at the path icon and
open the Manage SNCP pop–up menu. It is possible to obtain this menu by selecting the path icon
not permitted without written authorization from Alcatel.
and selecting the Actions:Manage SNCP pull–down menu. The Manage SNCP menu allows to
All rights reserved. Passing on and copying of this
document, use and communication of its contents
• Synchronize. This command retrieves the actual switch status of the B & S connections from
EML.
• Release. This command clears the previously issued lockout/forced/manual command. This
command is available for all types of Network Element.
• Lockout. This command either locks( forces ) the path/switch to the main route if a Set
Revertive command has been previously entered or locks the path/switch to the actual position
if a Set not Revertive command has been previously entered.
• Force Main . This command forces the path on the main route. The path will remain on the main
route even in case of failure. This condition can be modified only by means of the Release
command.This command is available for all types of Network Element.
• Force Spare . This command forces the path on the spare route. The path will remain on the
spare route even in case of failure. This condition can be modified only by means of the Release
command. This command is available for all types of Network Element.
• Manual Main . This command switches the path to the main route. The switch is rejected in case
of failure and if a previously issued Force/Lockout command is active. The Force/Lockout
condition can be cancelled by means of the Release command.
• Manual Spare . This command switches the path to the spare route. The switch is rejected in
case of failure and if a previously issued Force/Lockout command is active. The Force/Lockout
condition can be cancelled by means of the Release command.
• Set Revertive. This command causes the path to revert to the main route after the repair of the
involved objects. The Wait to restore time parameter is managed at Equipment layer. This
command is available for all types of Add and Drop Multiplexers; it is not applicable to 1641SX
cross connect.
• Set not Revertive. ( default ) The path does not revert to the main route after the repair of the
involved objects. This command is available for all types of Add and Drop Multiplexers; it is not
applicable to 1641SX cross connect.
switch status
B & S connection in topology Revertive
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED 01 SC.5:OPERATION
334
The switch status can assume the values:
The last operation executed on the switch can assume the values:
The Revertive operation mode icon is present if the switch has been set to Revertive.
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED 01 SC.5:OPERATION
334
b) After the execution of a Manage SNCP command a report is forwardedto the operator.
See Figure 179. An example of Connection in topology attributes is shown in Figure 180.
not permitted without written authorization from Alcatel.
All rights reserved. Passing on and copying of this
document, use and communication of its contents
ED 01 SC.5:OPERATION
334
N.B. For a SNCP path the attribute SNCP status can be:
N.B. For a SNCP trail the same commands apply. Notice that The trail can be terminated with an
SNCP connection only in case of 1661SMC equipment with Enhanced connectivity (able to
create an SNCP connection with grooming). Otherwise the trail must utilize an unprotected
physical connection and create the SNCP connection in another NE.
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED 01 SC.5:OPERATION
334
not permitted without written authorization from Alcatel.
SPARE
LO–LCs
LO–CTPs
LO–CTPs
MAIN
SPARE
LO–LCs
LO–CTPs LO–CTPs
MAIN
ED 01 SC.5:OPERATION
334
4.2 Multiplex Section Layer switch management
In case of fiber breaks, the APS for 2F MS–SPRING uses a synchronized sequence of ’bridge’ and ’switch’
operations that modify the internal connections of the two NEs adjacent to the failure.
The ’bridge’ operation on the East (West) side has the effect of routing the outgoing high priority
West (East) traffic also to the outgoing protection East (West) capacity.
When a ’switch’ operation is in effect on the East (West) side, all of the connections that have
as a source an Au4 belonging to the West (East) working capacity are replaced by connections
that have as a source the incoming East (West) protection traffic.
when one end of a connection is modified from working traffic to protection traffic, the Au4 of the protection
traffic that replaces the Au4 of the working traffic has an index that is always (n/2) greater (i.e., in case of
Stm16 aggregates, the Au4 #2, is substituted by the Au4 #10, where 10 = 2 + (16/2) ).
Note that the ’bridge’ and ’switch’ operations on the same side can co–exist (this is the typical case,
indeed): since they affect different class of connections, the final configuration is given by the sum of the
two.
W E W E
W E W E
protection
BEFORE working AFTER
ED 01 SC.5:OPERATION
334
not permitted without written authorization from Alcatel.
All rights reserved. Passing on and copying of this
document, use and communication of its contents
W E W E
W E W E
protection
BEFORE working AFTER
W E W E
W E W E
protection
BEFORE working AFTER
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED 01 SC.5:OPERATION
334
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED
01
W
957.130.872 H
BEFORE
SC.5:OPERATION
E
working
protection
W
334
3AL 61259 AA AA
AFTER
E
180 / 334
All rights reserved. Passing on and copying of this
document, use and communication of its contents
not permitted without written authorization from Alcatel.
4.2.1.2 Steps of a ring switch
In case of failure of a span, the failed span is replaced with the capacity of the protection traffic of the spans
not affected by the failure (note that the protection switching can also be triggered by a command issued
not permitted without written authorization from Alcatel.
by the OS, as will be described in the following). This situation is the result of the following sequence of
All rights reserved. Passing on and copying of this
document, use and communication of its contents
steps, synchronized via a protocol that uses the byte K1–K2 of the MSOH;
1) The node that detects the failure (Tail End), sends a Bridge Request to the node that is adjacent
along the direction where the failure is present (that becomes the Head End): this Bridge
Request is sent on both the long and the short path.
2) The intermediate nodes substitute all of the connections pertaining the low priority traffic with
bypasses among the two aggregates.
3) When the Head End receives the Bridge Request on the short path, it sends back to the tail end
a Reverse Request on the short path and a Bridge Request on the long path.
4) When the Head End receives the Bridge Request also on the long path, it performs a ring Bridge
and sends to the Tail End, on both paths, the notification of this new status
5) When the tail end receives, on the long path, the bridge request from the Head End it performs
a ring bridge and sends the notification of this new status to the head end, using both paths.
6) When the tail end receives, on the long path, the notification of the execution of the bridge on
the head end, it performs a ring bridge and switch and sends the notification of this new status
to the head end, using both paths.
7) When the head end is aware of the bridge and switch activated on the tail end, via the report
of the bridge status on the long path, it performs a switch, so that both ends are now in bridge
and switch
When a protection switch is in effect, all of the protection capacity is used to recover the working traffic;
in this situation no low priority connections can be established on the protection capacity and it is required
that, in order to avoid mis–connections, all of the tributaries that terminate a low–priority connection output
an AIS signal (this operation is called ’squelching’).
After the failure has been removed, a similar sequence of operations is performed by the head and tail
end; if the failure was single, the reverse procedure can starts after a specified time interval, called Wait
Time to Restore (WTR).
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED 01 SC.5:OPERATION
334
4.2.1.3 Example of ring switch in a 6–nodes 2f MS–SPRING
The following diagrams depict the sequence of operations that occur in a six–nodes ring when a single
failure (signal degrade, in this case) occurs on the fiber that carries the traffic from node ’2’ to node ’3’.
Tributary
e w w
w e
1 2 3
6 5 4
e w
w e w e
Tributary
Working Channels
Protection Channels
ED 01 SC.5:OPERATION
334
not permitted without written authorization from Alcatel.
All rights reserved. Passing on and copying of this
document, use and communication of its contents
Tributary
e w w
w e
1 2 3
6 5 4
e w
w e w e
Bridge
Working Channels Tributary
Switch
Protection Channels
A squence of bridge and switch operations occurs. The final configuration is shown in Figure 187.
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED 01 SC.5:OPERATION
334
4.2.2 Squelching in case of isolated nodes
With some classes of multiple failures, some nodes in a 2f MS–SPRING could be isolated, i.e. unreachable
by the other nodes. When a node is unreachable, it can be demonstrated that, due to the bridge and switch
The squelching technique requires that two different squelching actions are taken on the HVC and on the
LVC. The HVC are squelched only at the switching nodes, i.e. at the nodes that perform bridge and switch,
while the LVC are squelched where they are terminated. Furthermore, a different squelching action is
taken on the HVC according if they are ’accessed at the LVC level’ or not; in detail, if the VC4 is composed
of VC12 that are terminated at different nodes, the squelching performed at the switching nodes must be
removed after the final bridge and switch state has been reached: this is necessary in order not to loose
LVCs that would be otherwise unnecessarily squelched.
When a 2f MS–SPRING is interworked with another ring (either SNC/I or MS–SPRING), the
interconnection of the two is performed by connecting two pair of nodes per ring with HVC connections,
as shown in the following figure.
Each VC4 that has to cross the ring boundary (only HVC level ring interconnections are considered here)
must be output by two nodes, one of which, the primary service node (PSN) drops it and continues to the
secondary service node (SSN). In the opposite direction, the SSN inserts a copy of the VC4 into the ring
and the PSN selects between the VC4 coming from the SSN and the VC4 that can be locally inserted. The
selection is performed on the basis of the path–AIS.
The protection mechanism works on the hypothesis that the other ring selects one of the two version of
the incoming VC4 and transmits two identical copies of the VC4 towards the PSN and the SSN (this is
guaranteed if the other ring is an MS–SPRING or an SNC/I ring).
Note that the PSN and the SSN need not to be adjacent and need not to be the same for all of the VC4
that cross the ring boundary: i.e. each crossing VC4 has two associated nodes that act as PSN and SSN.
It is also possible to connect two rings at more than two points, but this is usually unfeasible with the normal
ring topologies and has not been considered here.
This document does not address the case where the VC4 that crosses the boundary is terminated at its
primary service node.
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED 01 SC.5:OPERATION
334
All rights reserved. Passing on and copying of this
document, use and communication of its contents
not permitted without written authorization from Alcatel.
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED
01
957.130.872 H
Node
Service
Primary
SC.5:OPERATION
2f MS–SPRING
SNCP or MS–SPRING
334
3AL 61259 AA AA
Service
Node
Secondary
185 / 334
4.2.4 Provisioning of the APS Controller
The APS Controller blocks need a set of configuration information for properly execute their functions.
An enabled APS Controller (even when it is inactive) needs to know the ’node identifier’ of the N.E.
where it is operating; the node identifier is a number in the range 0 through 15, and is unique within
the ring.
An enabled and active APS controller must be aware of the topology of the ring, i.e. of the sequence
of nodes (ring map) that is encountered when traversing the ring in a specified direction (e.g.
clockwise); the traversed nodes are identified by their ’node id’ and may not be more that 15 (the total
number of N.E. in a 2F MS–SPRING is 16) neither less than 2.
A final parameter that must be known by the APS Controller is the Wait Time to Restore value; this value
may range from 0 to, at least, 15 minutes (a step of 1 minute is accepted);
The ’HpSq’ block needs to receive two sets of ’squelching tables’ that contain some routing information
that is necessary to properly identifiy where and when inject AIS.
The first set is composed of four tables that will be called, in the following, ’VC4 squelching tables’. There
is a VC4 squelching table for each aggregate input and output of the network element. The structure of
the four tables is identical: for each incoming (or outgoing) High Priority Au4 (i.e. Au4 1..2 for the Stm4
and Au4 1..8 for the Stm16) the table must contain the source and the destination nodes of the transported
VC4; note that, in case of ring interworking, the VC4 can have two source nodes . It is also allowed for a
VC4 to have multiple destination nodes (up to 15 in the worst case). It can be demonstrated that only one
source and one destination node is necessary for the VC4 squelching tables, namely the farthest source
node and the fartherst destination node.
If a VC4 contains LVC that have different source or destination nodes, the VC4 squelching table must
indicate this situation: for this field a binary value is enough.
If a fixed size table is chosen, the size of each row of each VC4 squelching table is 9 bits, where this number
is obtained by adding 4 bits for the source node identifier, 4 bits for the destination node identifier and 1
bit that indicates whether the VC4 is accessed at the LVC level or not. Multiplying the row size and the
number of rows and the number of tables, the final value of
is obtained
The second set of squelching tables contains, for each terminated LVC, the indication of the source node
of the LVC itself. Also in this case an LVC may have two source nodes that musy be indicated in the table,
regardless of which is the primary and which is the secondary). In the worst case (8 VC4 structured as
63 TU12, all with double source) the following total size is obtained:
As said before, the VC4 squelching tables have to be provided to all of the nodes of the ring, while the LVC
tables are required only at the nodes where LVC traffic is terminated.
ED 01 SC.5:OPERATION
334
4.2.4.2 Squelching tables: example
In order to explain with the sufficient detail level, an example of squelching table computation is presented.
not permitted without written authorization from Alcatel.
In the following figure, a 7 node ring is considered, where the node id are represented by capital letters
All rights reserved. Passing on and copying of this
document, use and communication of its contents
from A to G. Five connections are supposed to exist, three regarding VC12 and two regarding VC4:
– VC12 #1 of VC4 #1 is supposed to be inserted at node A into the VC4 #1. The exit point of this VC12
is node G. Due to the connectivity restrictions, the VC12 will have not changed neither the TU12 nor
the Au4 along the path.
– VC12 #2 of VC4 #1 has two sources, due to the ring interworking: node B is the secondary service
node, while node C is the primary. The destination node is F. Vc12 #2 always occupies the TU12 #2
of the VC4 #1 that is transported into the Au4 #1.
– VC12 #63 of VC4 #1 has one source node, E, and two destination nodes, namely F and G: i.e. this
is a point–to–multipoint connection. The Vc12 #63 always occupies the Tu12 #63 of a VC4 that
always occupies the Au4 #1.
– VC4 #8 has two sources, A and B, respectively the secondary and primary service nodes, and has
two destination nodes, E and F.
WEST EAST
A B C D E F G
VC12 #1
VC4 #1 VC12 #2
SSN PSN
VC12 #63
VC4 #2
VC4 #8
SSN PSN
The VC4 squelching tables for the nodes represented in the example are listed in the following. Note that
a VC4 containing LVC is terminated each time an LVC is inserted and or dropped, so that the only node
where the VC4 #1 is not terminated is node D.
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED 01 SC.5:OPERATION
334
Table 1. VC4 squelching table for node A
Node A
VC4 #1 A G YES
VC4 #2
VC4 #8 A F NO
Node A
From:
Node B
VC4 #2
VC4 #8 A F NO A F NO
Node B
From:
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED 01 SC.5:OPERATION
334
Table 5. VC4 squelching table for node C
Node C
not permitted without written authorization from Alcatel.
All rights reserved. Passing on and copying of this
document, use and communication of its contents
VC4 #2
VC4 #8 A F NO A F NO
Node C
From:
Node D
VC4 #2
VC4 #8 A F NO A F NO
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED 01 SC.5:OPERATION
334
Table 8. VC4 squelching table for node E
Node E
VC4 #2 E G NO
VC4 #8 A F NO A F NO
Node E
From:
Node F
VC4 #2 E G NO E G NO
VC4 #8 A F NO
Node F
From:
Vc12 #2 of VC4 #1 B, C
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED 01 SC.5:OPERATION
334
Table 12. VC4 squelching table for node G
Node G
not permitted without written authorization from Alcatel.
All rights reserved. Passing on and copying of this
document, use and communication of its contents
VC4 #1 A G YES
VC4 #2 E G NO
VC4 #8
Node G
From:
Vc12 #1 of VC4 #1 A
ED 01 SC.5:OPERATION
334
4.2.5 Provisioning of the Service Selectors
The Network Element can host a Service Selector per each inserted VC4. The provisioning information
must include:
c) In case of revertive operation, a Wait Time to Restore (WTR) must be specified (a common WTR
vakue can be chosen for all of the selectors contained in the network element).
The default status of the service selector is always on the tributary direction.
The APS Controller may receive explicit commands from the operator; the allowed commands are
mutually exclusive and belong to the following list:
Command Priority
When a command is issued, it remains active until it is explicitly cleared by the operator. When a command
is issued that has a priority higher or equal than the priority of the command that is active at that time, the
new command replaces the old one.
The commands may be overcome by the alarms detected at the N.E. or by bridge requests received on
the K1–K2 bytes: in these situations the command is not deleted, and becomes active again when the
overcoming conditions are removed.
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED 01 SC.5:OPERATION
334
4.2.7 Commands for the Service Selectors
It must be allowed the operator to modify the status of the Service Selectors via commands that include
the ’manual switch’ and the ’forced switch’. As usual, the ’manual switch’ has lower priority than the alarm
not permitted without written authorization from Alcatel.
The APS Controller status must be reported to the Operator Interface, in order to provide a visible feedback
about the ring status.
The main ring status information is represented by the state of the SM block, defined as one of the three
allowed macro–states indicated in [1]: ’Idle’, ’Pass Through’ or ’Switching’. In the following this information
is referred as ’Node Status’.
The ’Switching’ state must be further qualified with the status of the BrSw block (referred as ’Switch Status’
in the following), that can be one of the following: ’idle’, ’bridge East’, ’bridge West’, ’bridge and switch East’
and ’bridge and switch West’.
Note that it is possible to have a ’Switching’ Node status and an ’Idle’ Switch Status at the same time, while
an ’Idle’ or ’Pass Through’ Node Status is always associated with an ’Idle’ Switch Status.
The representation of the Node and of the Switch Status at the operator interface may not be logically
associated with a specific unit of the system, since it reflects a status of the entire Network Element.
Both the Node and the Switch Status information can be provided by the unit that hosts the ’State Machine’.
is reported at each Aggregate interface, Note that the source of the’K1–K2 error’ indication is the State
Machine, if the functional decomposition described in this document is used.
A summary of the reports of the APS Controller is given in the following table:
ED 01 SC.5:OPERATION
334
4.3 Management of switches at RM interface
An MS–SPRING can be created on the map by means of the command Construction: Add Object: Ring:
MS–Spring... Checks are performed during validation and activation phase: only 1661SMC and 1664SM
The payload configuration activity after ring implementation creates only 8 AU4s and any change of the
payload configuration requires the specification of 8 AU4s.
On the protection block, the following operations are available: ( see Figure 192. )
– synchronize
– release
– force east, west
– lockout east, west
– manual east, west
– change Wait To Restore time (5, 300, 600, 900 sec) ( see Figure 194. )
– Switch position (displayed on main view) : unknown, idle, bridge east or west, bridge & switch east
or west, pass through
– Switch cause (displayed on main view) : Failure, Restoration, Operator Request, None, Unknown.
– Active Operator Command : Release, Lockout, Force, Manual, None.
– Pending Operator Command : Release, Lockout, Force, Manual, None, Synchronize. It is the
command under execution. It is set to ”none” when the answer (OK or KO) is received from the EML.
At the beginning all the switch positions and switch causes are set to unknown, the pending is set to none.
After a parametric time T1, the managing process performs a synchronization for a parametric number
N of switches with the position set to unknown (i.e. not yet synchronized manually or through an event).
After another parametric time T2, the operation is repeated with another set of N ”unknown” switches.
During this automatic synchronization, the pending command of the switches under operation is set to
Synchronize.
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED 01 SC.5:OPERATION
334
4.3.1 Display of the Protection blocks
A view of all the MS Protection Blocks in a MS–SPRing is available in the browser. To display this view,
execute the following procedure:
not permitted without written authorization from Alcatel.
All rights reserved. Passing on and copying of this
document, use and communication of its contents
a) From the browser point with the mouse at the MS–Spring and open the pop–up menu. Select item
Display all related items... ( see Figure 190. )
b) From the selection box select item All Protection blocks and click on No Filter button. The Protection
block drawing window is displayed. See Figure 191. on page 196)
ED 01 SC.5:OPERATION
334
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED
01
Protection blocks
957.130.872 H
SC.5:OPERATION
Figure 191. Protection blocks in a MS–Spring.
The figures which follow show the commands available to manage switches.
334
3AL 61259 AA AA
196 / 334
All rights reserved. Passing on and copying of this
document, use and communication of its contents
not permitted without written authorization from Alcatel.
All rights reserved. Passing on and copying of this
document, use and communication of its contents
not permitted without written authorization from Alcatel.
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED
01
957.130.872 H
SC.5:OPERATION
Switch East
Figure 192. Protection block: Manage switch menu.
Switch West
334
Figure 193. Examples of actual position of the switches.
3AL 61259 AA AA
197 / 334
not permitted without written authorization from Alcatel.
All rights reserved. Passing on and copying of this
document, use and communication of its contents
Figure 194. Protection block: Wait to Restore time.
All the HO SbnConn’s belonging to HO–Paths and HO–Trails in MS–SPRING topologies include
squelching Information (4 values : West – Src / West Dst / East Src / East Dst end Nodes Identifiers).
Squelching Info are also set for the connections between HO–TTP and HO–CTP.
For broadcast paths, the squelching information related to legs is evaluated run time during the
implementation (when multiple legs and pass–through are merged into a single broadcast connection).
The management of the protection is done by the EMLs. On RM side, only the presence of the protection
is displayed to the operator.
In addition to the alarm already foreseen in case of failure on both the fibers involved in the linear MS
protection, a new alarm is emitted at SEN–IM level also when a failure on a single fiber will occur. This will
warn the operator on the reduced degree of protection.
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED 01 SC.5:OPERATION
334
4.3.2 4–F NPE RING Switch Management
not permitted without written authorization from Alcatel.
A view of all the MS Protection Blocks in a MS–SPRing is available in the browser. To display this view,
All rights reserved. Passing on and copying of this
document, use and communication of its contents
a) From the browser point with the mouse at the 4–F MS–Spring and open the pop–up menu. Select
item Display all related items...
b) From the selection box select item All Protection blocks in MS Spring 4–F and click on No Filter
button. The Protection block drawing window is displayed. See Figure 195.
Protection blocks
ED 01 SC.5:OPERATION
334
c) From each protection block it is possible to issue the following pop–up commands:
– MS Protection: Synchronize
ED 01 SC.5:OPERATION
334
– Span Switch: Release Forced West
– Span Switch: Release Forced East
– Span Switch: Release Manual West
– Span Switch: Release Manual East
not permitted without written authorization from Alcatel.
ED 01 SC.5:OPERATION
334
The effect of the Span Switch and Ring Switch operations is described in Section NPE. See definitions
at paras 2.2 and 2.3.
The above mentioned commands are mainly used for maintenance purposes. See Section
ED 01 SC.5:OPERATION
334
5 NETWORK MODIFICATIONS
5.1 Introduction
not permitted without written authorization from Alcatel.
All rights reserved. Passing on and copying of this
document, use and communication of its contents
N.B. The execution of the Redo–Log file does not cause the allocation of the path/trail; however
some checks take into account the topological modifications:
– in case of node insertion the passthrough connection is added in the new node.
– in case of node remove the passthrough connection thru the removed node is ignored..
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED 01 SC.5:OPERATION
334
5.1.1 Adding a Network Element in a SCNP network
NE–3
NE–1
a) The upload of the EML info from EML to RM–MIB is automatically performed.
b) In the relevant submap execute Construction: Upload EML(s) info:Available EML(s), then
Construction:UploadEML(s) info:Available NEs and Construction:Upload:NE Ports.
c) Using the Cut and Paste or the Move (drag with left click) operation the new NE is created in the
network maps and in the MIB data base.
e) By means of the command Add Connection, create the connection between the involved
NEs/topologies. (The ports not used must be removed).
f) Execute the Implementation of the new Physical Connection. (This causes also the NE
implementation, i.e. the reset of the NE )
– Payload Configuration
– Path Management
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED 01 SC.5:OPERATION
334
5.1.1.2 Adding a Network Element (NE), case 2
The new Network Element must be inserted in the network as shown in Figure 199.
not permitted without written authorization from Alcatel.
All rights reserved. Passing on and copying of this
document, use and communication of its contents
NE–2
NE–3
NE–1
a) The user must protect paths using the physical connection to be interrupted ( NE–1 Thru NE–3 ).You
can verify by means of the command Physical Connection: ( display ) Paths active in physical
connection which is the path actual route.
From the path list select all paths and protect them by means of Add Protection: Spare.
b) Move all paths from the physical connection to be interrupted (NE–1 thru NE–3)
1) For paths protected at above point a ), select them and use option Remove Protection: Keeping
Spare.
2) For paths previously protected, reroute manually on the main or spare route according to the
route type crossing the physical connection.
e) The upload of the EML info from EML to MIB database is automatically performed.
f) In the relevant map (e.g. submap) execute a Construction: Upload EML(s) info:Available EML(s),
then Construction:UploadEML(s) info:Available NEs and Construction:Upload:NE Ports.
g) Using the Cut and Paste operation the new objects are added to the network maps.
i) Execute the Implementation of the new Physical Connection. (This causes also the NE
implementation, i.e. the reset of the NE )
ED 01 SC.5:OPERATION
334
5.1.1.3 Adding a Network Element (NE) in a NPE Ring
– The NE addition has no impact on the synchronisation sources and settings within the ring and on
attached rings or NE
– The aggregate boards of the NE that will be inserted must be compatible with the ones of the NE in
the ring that will become neighbours of the added NE.
– The optical power budget will not exceed given limits if the new NE is inserted between the ADM
currently connected to each other.
– Optical attenuators for the aggregates must be available if it is necessary to fulfill the optical power
budget.
– The NPE must not be operating in protecting mode when the process is starting. It means that all the
NEs are in idle state.
E 2 3
1 4
6 5
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED 01 SC.5:OPERATION
334
Let’s assume we want to insert a new ADM (NE n. 6) between NE_1 and NE_5.
In the following we will use NE_6 for identifying the ADM to be inserted in the NPE ring.
not permitted without written authorization from Alcatel.
SEQUENCE
All rights reserved. Passing on and copying of this
document, use and communication of its contents
a) ECT : In the following we will use NE_6 for identifying the ADM to be inserted in the NPE ring.
Configure the NE to be added in the ring:
4) Pre–defining the NE Id and the ring map may introduce some additional constraints when the
NPE configuration is computed in RM
5) Define the contents of NPE tables (according to the configuration defined in the ring) (see point
m).
b) 1354RM : Dump of the paths crossing the NPE ring (ET). The dump will be used to restore the paths
keeping the path constraints (see point p).
c) 1354RM: Force the traffic away from the physical connection to be opened for introducing the new
NE. This is obtained by issuing a Forced Switch / Ring (FS–R) command onto the two ADMs (NE_1
and NE_5) that will be adjacent to the new one inserted in the ring.
d) Set download disabled on all the nodes crossed by the paths in the ET.
e) 1354RM: Remove all the paths in the ET (Deimplement / Deallocate / Delete path)
f) 1354RM: Remove the link between the NPE ring and external topologies (if any
g) 1354RM: Remove the NPE ring from 1354RM MIB (Deimplement / Delete ET).
i) 1353SH
Create the new ADM in 1353SH MIB
j) 1353SH
Take in charge NE_6 in 1353SH environment (start supervision of the added NE)
k) 1354RM
Synchronize the EMLIM. This will align the network map with the new ring configuration.
l) 1354RM
Remove the connection between NE_1 and NE_5 from 1354RM map
Add NE_6 in the map.
Define the connections between NE_1, NE_6 and NE_5 in the map.
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED 01 SC.5:OPERATION
334
m ) 1354RM
Recreate the 4f MS–SPRing Interoceanic (NPE) ET in 1354RM MIB (Activate / Implement ET)
When implementing a MS–SPRing topology, 1354RM automatically defines node ids and the related
ring map (node adjacency).
n) 1354RM
Upload the NAPs from the network
o) 1354RM
Restore the connections between the NPE ring and external topologies (see point f).
p) 1354RM
Run the redo log file based on path dump prepared at point b).
The paths crossing the ET are re–created in RM MIB. The pass–through connections in NE_6 are
automatically created as a consequence of the path constraints
q) 1354RM
Perform a consistency audit of the NEs in the ET.
Inconsistencies may be found on cross connections in NE_6 (no cross–connection exist in the ADM)
No inconsistencies must be found on cross–connections in the ADMs already present in the ring.
r) 1354RM
Enable the download on the nodes on which it was disabled (see point d).
s) 1354RM
Perform a consistency download.
At the end of the download phase the 4f NPE ring will be under 1354RM control, the NPE will be
enabled and active.
t) 1354RM
Remove the FS–R command from NE_1 and NE_5 (se point c)
The traffic is now redirected on the main route.
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED 01 SC.5:OPERATION
334
5.1.1.4 Remove an NE from NPE Ring
Initial constraints
not permitted without written authorization from Alcatel.
– The synchronisation source of the ring must not depend on the ADM you want to remove. If it is the
All rights reserved. Passing on and copying of this
document, use and communication of its contents
case, you may modify the position of the synchronization source to have an adequate configuration
after the removal of the ADM.
– The ADM to remove must not be a Gateway Network Element (GNE) and it must not dispatch any
management data to other ADM (using a tributary board for example). If it is the case, take the
necessary measures.
– The aggregate boards of the ADMs connected to the ADM to remove must be compatible.
The correct software is installed and activated on ADMs
– The optical power budget of the two ADM that will be connected after the removal of the ADM must
be sufficient.
– An optical coupler for the fibers after the removal of the ADM must be available.
– Slow restoration is not supervised on HO–Trails or 140Mbit/s paths that are crossing the ADM to
remove.
– Be sure that the Ms–spring is not operating in protecting mode when the process is starting. It means
that all the NEs are in idle state.
Referring to Figure 200. on page 206, let’s assume we want to remove the NE identified with number 6
in the ring map representation
In the following we will use NE_6 for identifying the ADM to be removed from the NPE ring.
SEQUENCE
a) 1354RM
Dump of the paths crossing the NPE ring (ET).
The dump will be used to restore the paths keeping the path constraints (see point n of this procedure.
b) 1354RM
Force the traffic away from the physical connections to be opened for removing the NE.
This is obtained by issuing a Forced Switch / Ring (FS–R) command onto the two ADMs (NE_1 and
NE_5) that are adjacent to the ADM to be removed from the ring
c) 1354RM
Set download disabled on all the nodes crossed by the paths in the ET.
d) 1354RM
Remove all the paths crossing the ADM to be removed (Deimplement / Deallocate / Delete path)
1AA 00014 0004 (9007) A4 – ALICE 04.10
e) 1354RM
Remove the link between the NPE ring and external topologies (if any)
ED 01 SC.5:OPERATION
334
f) 1354RM
Remove the NPE ET from 1354RM MIB (Deimplement / Delete ET).
g) 1353SH
i) Network
Disconnect the fibers between the NE_1 and NE_6.
Disconnect the fibers between the NE_5 and NE_6.
Remove the NE from the ring.
Reconnect NE_1 and NE_5.
j) 1354RM
Remove the connection between NE_6 and the adjacent NEs from 1354RM map
Delete NE_6 in the map.
Define the connections between NE_1 and NE_5 in the map.
k) 1354RM
Recreate the 4f MS–SPRing Interoceanic (NPE) ET in 1354RM MIB (Activate / Implement ET)
When implementing a MS–SPRing topology, 1354RM automatically defines node ids and the related
ring map (node adjacency).
It has to be verified if a possible different definition of the ring map may affect the traffic when it is
downloaded to the NEs composing the NPE ring.
If so it will be necessary to define a procedure/tool assuring that the map ring stored in the ADMs is
compliant with the one generated by RM.
l) 1354RM
Restore the connections between the NPE ring and external topologies (see point e.
m ) 1354RM
Upload the NAPs from the network
n) 1354RM
Run the redo log file based on path dump prepared at point a). The paths crossing the ET are
re–created in RM MIB.
o) 1354RM
Perform a consistency audit of the NEs in the ET.
No inconsistencies must be found on cross–connections.
p) 1354RM
Enable the download on the nodes on which it was disabled (see point c.
q) 1354RM
Perform a consistency download. Activating 4f NPE does not affect the traffic on the paths defined
in the network
At the end of the download phase the 4f NPE ring will be under 1354RM control, the NPE will be
enabled and active.
r) 1354RM
1AA 00014 0004 (9007) A4 – ALICE 04.10
Remove the FS–R command from NE_1 and NE_5 (see point b).
ED 01 SC.5:OPERATION
334
5.1.2 Removing a Network Element (NE) from a SNCP ring
command Supervision:Deimplement Object from the map pull–down menu. A confirmation dialog
box is presented. A message alerts that the system is deimplementing the physical connection. The
deimplemented physical connection is dotted in the map and is brown colored in the Browser.
c) The operator selects Construction:Delete in MIB. A message alerts that the system is deleting the
physical connection. The physical connection is deleted from the MIB database and appears dashed
in the map. Also the TPs supported by the SDH ports at the physical connection ends are removed
(payload).
d) The operator must execute above points a to c for all the physical connections connected to the NE.
e) Select the NE from the map and issue Construction: Delete in MIB.
a) On the relevant NAP List verify that no path is using any trib. port of the board being removed i.e.
the nap idle indicator should be ”Idle”.
b) On the relevant NAP List select the NAP related to the trib. ports to be removed and issue the
command Actions:Remove:Remove NAP. The relevant ports pass from Assigned to Observed.
c) On the 1353SH station delete the relevant board. The board is no longer present in the views.
ED 01 SC.5:OPERATION
334
5.2 Network Modification with existing traffic
This procedure allows to modify the network with the existing traffic.
a) Select the physical connection to be modified and retrieve the crossing paths, by mainly focusing the
implemented paths.
b) (Optional) Unprotect the protected paths keeping the main or the spare one according to the usage
of the physical connection (main or spare on single path basis) and according to Customer’s
requirements.
c) (Optional) Refresh the list of crossing paths in order to verify the remaining ones.
d) Produce the ”.rmList” file describing the remaining (unprotected) paths. See paragraph 5.2.1
This file is the description of the paths or trails in a format allowing the ”play–back” at later time.
e) Put the EML(s) in the download disable mode acting from RM. Starting from this point the network
is not involved in any modifications at RM level.
j) By means of CT, pre–configure the HO pass–through connections inside the NE to be inserted and
insert the NE in the network.
k) Define the NE in the EML (SH) and upload the new NE at RM level.
l) Modify the network at RM level (define and implement) adding the new NE.
m ) Play the HO–Trail file using the RM batch utility. The trails are recreated using exactly the old CTPs.
p) Put EML in download enable mode. The old NEs are downloaded with tables completely equal to the
previous ones while the new NE is configured for the first time.
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED 01 SC.5:OPERATION
334
5.2.1 rmList file create
SCOPE
not permitted without written authorization from Alcatel.
This procedure can be used to create the description of the paths or trails in a format allowing the
All rights reserved. Passing on and copying of this
document, use and communication of its contents
SEQUENCE
a) From the path/trail list select the path/s or trail/s to record and issue View:Report: .rmList file only
selected.
ED 01 SC.5:OPERATION
334
b) In the textline of the dialog box of Figure 202. select the name ( full–name ) of the .rmfile to record
and click on OK. The new .rmfile can be see by means of the file manager, as in Figure 203.
.rmList file
c) Move the mouse to the icon of this file and open the pop–up menu; select option
Create–RM–Command. A dialog box opens, asking for confirmation. Type Y and press Enter button.
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED 01 SC.5:OPERATION
334
d) The command file is created. See the create report in Figure 205. The command file is displayed in
the file manager window.
not permitted without written authorization from Alcatel.
All rights reserved. Passing on and copying of this
document, use and communication of its contents
.rmCmd file
(command file)
ED 01 SC.5:OPERATION
334
5.2.2 rmLCmd file play
SCOPE
SEQUENCE
a) From the path/trail list select the path/s or trail/s to record and issue View:Report: .rmList file only
selected.
b) In the file manager window point with the mouse at the command file to execute and open the pop–up
menu; select option Change Permissions...
c) A dialog box allows the operator to select ”Execute” for this file. Click on OK button.
ED 01 SC.5:OPERATION
334
not permitted without written authorization from Alcatel.
All rights reserved. Passing on and copying of this
document, use and communication of its contents
d) To launch the execution of the command file, in the file manager window ( see Figure 206. ) click twice
on the icon of the command file. A dialog box asks for confirmation. Type Y and click on OK.
ED 01 SC.5:OPERATION
334
e) The command file is executed and the execution report is displayed in the dialog box ( see figure
herebelow.
ED 01 SC.5:OPERATION
334
5.3 Add/Remove Tributary Board
b) Then select Display Related items: Paths in Physical Connection to verify that no path is using that
physical connection.
Should a path been using the involved physical connection, the path should be
deimplemented/deallocated or rerouted, if possible.
d) On the 1353SH station delete the relevant board. The board is no longer present in the views.
e) On the map execute NE:Upload Ports: the port deleted is no longer present.
b) Execute an Upload NAPs for the relevant node. From this point on the ports are available to be used
in a path (NML assigned).
b) On the map execute Upload NE Ports. From this point on you can use the port in the network
construction.
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED 01 SC.5:OPERATION
334
5.4 Configuration of a Transmux board
a) On 1354RM: Remove the VC–4 NAP associated to the 140 Mb port. The detailed sequence is:
1) From browser point to the involved node and issue Actions: Display: Main related Items: NAPs.
2) The NAP list is displayed. Select the VC–4 NAP and issue Actions: Remove NAP.
4) Point to the Node and issue Actions: Display: Main Related Items: Ports. The Port List is
displayed. The 140Mb port assignment status is OBSERVED.
c) On 1354RM: Execute the EML: Synchronize command. The 140 Mb Port (OBSERVED) is replaced
by the 2 Mb ports ( OBSERVED ).
d) On 1354RM: Execute the Upload NAPs command. The detailed sequence is:
1) From browser point to the involved node and issue Actions: Configuration: Upload NAPs.
2) The user can display the uploaded NAPs, e.g. from browser, pointing to the node and issuing
the command Actions: Display: Main Related Items: NAPs. The NAP List now contains the
VC–12 TTPs ( NAPs).
Example which follows covers the configuration of a 140 Mb Port from the 2Mb NAPs to one VC–4
TTP–NAP.
a) On 1354RM: Remove the VC–12 NAPs associated to the 140 Mb port. The detailed sequence is:
1) From browser point to the involved node and issue Actions: Display: Main related Items: NAPs.
2) The NAP list is displayed. Select the VC–12 NAPs and issue Actions: Remove NAP.
3) Point to the Node and issue Actions: Display: Main Related Items: Ports. The Port List is
displayed. The assignment status of the 64 2Mb ports is OBSERVED.
c) On 1354RM: Execute the EML: Synchronize command. The 2Mb Ports (OBSERVED) are replaced
by one 140 Mb port ( OBSERVED )
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED 01 SC.5:OPERATION
334
6 SPECIAL NETWORK VIEWS
– Layered Map
– Connectivity Inventory
The network described using the partitioning concept (network, subnetwork, ring) can be represented also
in a geographical mode. In particular all the network elements are grouped into sites. In the SDH netview
the operator must create a new map. The sequence is the following:
a) Fom the Netview window select Map:Maps:New. In the map create dialog box digit the map name,
select layout=none, compound status=Propagate Most Critical and click on Map Management.
b) The ”SDH Netview configuration” dialog box appears ( see Figure 212. ). The operator must set
TRUE for ”Synchroniz. by site” option and select Synchronize complete map (Map and Alarm
1AA 00014 0004 (9007) A4 – ALICE 04.10
c) Select Verify and then OK. Click on OK in the New Map dialog box. The new map is created. A dialog
box alerts that the new map has been created and asks the operator if he wants to open the new map.
ED 01 SC.5:OPERATION
334
d) Click on OK. The new map is opened as in Figure 213.
ED 01 SC.5:OPERATION
334
e) Since the map is empty, a synchronization activity is required to populate the map. From the
pull–down menu bar select Supervision: Synchronize: Complete Map. The list of the available
networks is presented.
not permitted without written authorization from Alcatel.
f) Select the network to which you want to synchronize the geographical map and click on Synchronize
All rights reserved. Passing on and copying of this
document, use and communication of its contents
button. The message area will contain the message ”Synchronizing... Wait’ and then
”Synchronization ended”. A report log window is also provided. At this point the network icon appears
in the new object holding area as in Figure 214.
g) You can add a graphical background to this submap, simply selecting the command Map:Submap:
Describe/Modify (see Figure 215. ). The submap description dialog box is opened ( left–hand side
of Figure 216. ).
h) Click on Browse... button. The list of the available graphical backgroungs is presented. ( right–hand
side of Figure 216. ).
N.B. To the default list the administrator can previously add any suitable ” .gif” file.
i) Select the file and click on OK. The selected background file is now written in the field ” Background
Graphics” of Figure 217. Click on OK of the submap description dialog box. The selected background
is added to the submap.
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED 01 SC.5:OPERATION
334
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED
01
957.130.872 H
SC.5:OPERATION
Figure 216. Adding a graphical background.
Figure 215. Map: Submap: Describe/Modify.
334
3AL 61259 AA AA
224 / 334
All rights reserved. Passing on and copying of this
document, use and communication of its contents
not permitted without written authorization from Alcatel.
not permitted without written authorization from Alcatel.
All rights reserved. Passing on and copying of this
document, use and communication of its contents
j) By holding the middle button of the mouse, drag the network icon to the center of the window. See
Figure 218.
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED 01 SC.5:OPERATION
334
k) Double click on the network icon. The network submap opens. See Figure 219.
This submap contains in its new objects holding area the icons of the locations belonging to the parent
network. These locations are those uploaded from EML layer during network construction.
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED 01 SC.5:OPERATION
334
l) Drag these icons to the window working area. The connections are automatically displayed. See
Figure 220.
not permitted without written authorization from Alcatel.
All rights reserved. Passing on and copying of this
document, use and communication of its contents
ED 01 SC.5:OPERATION
334
m ) Double click on a location icon. The location submap opens, containing the related nodes in its new
object holding area. Drag the node icons to the window working area. The connections are
automatically displayed. See Figure 221.
N.B. It is possible to open the corresponding logical map, thus displaying logical and geographical
maps at the same time.
ED 01 SC.5:OPERATION
334
6.2 Layered Map
The Supervision: Synchronize allows to select the following SDH layer submenus:
not permitted without written authorization from Alcatel.
Physical
All rights reserved. Passing on and copying of this
document, use and communication of its contents
HO–AU4
LO–TU3
LO–TU12
To synchronize the Netview map to the HO–AU4/LO–TU3/ LO–TU12 layer, execute the following steps:
The map is synchronized to the selected layer. You can navigate through the submaps.
b) A confirmation is required.
c) All the currently displayed connections are removed and the connections relevant to the selected
layer are displayed.
For the physical layer the displayed information concerns the connection user label.
For the HO–AU4, LO–TU3 and LO–TU12 layers is provided the information regarding the layer type, the
number of free link connections and the overall number of link connections.
It is advisable to perform a Save Map as....... operation for each layered map to be managed by
the Network Planner. In this way the different layered maps can be immediately displayed by the
Operator.
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED 01 SC.5:OPERATION
334
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED
01
957.130.872 H
ROOT MAP
RING ICON
SC.5:OPERATION
tion
icon
ICON
External connec-
NETWORK
334
3AL 61259 AA AA
NE icon
230 / 334
All rights reserved. Passing on and copying of this
document, use and communication of its contents
not permitted without written authorization from Alcatel.
All rights reserved. Passing on and copying of this
document, use and communication of its contents
not permitted without written authorization from Alcatel.
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED
01
957.130.872 H
SC.5:OPERATION
ROOT MAP
SUBNETWORK MAP
334
3AL 61259 AA AA
RING MAP
NETWORK MAP
231 / 334
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED
01
957.130.872 H
ROOT MAP
SUBNETWORK MAP
SC.5:OPERATION
Figure 224. View: SDH Layer: HO–TU3
RING MAP
NETWORK MAP
334
3AL 61259 AA AA
232 / 334
All rights reserved. Passing on and copying of this
document, use and communication of its contents
not permitted without written authorization from Alcatel.
All rights reserved. Passing on and copying of this
document, use and communication of its contents
not permitted without written authorization from Alcatel.
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED
01
957.130.872 H
ROOT MAP
SUBNETWORK MAP
SC.5:OPERATION
Figure 225. View: SDH Layer: LO–TU12
334
RING MAP
3AL 61259 AA AA
NETWORK MAP
233 / 334
6.3 Connectivity Inventory
6.3.1 General
The application can also be invoked from the Netview map by means of the pull–down menu Supervision:
Network Connectivity. It is necessary to drag and drop the topology (NTW, SBN, ET) whose connectivity
information is to be analyzed only if started from Browser.
The Connectivity Inventory window which is displayed upon launching the application contains the
following pull–down menus:
• Get topologies, which allows to further select between first level * and all levels**
The View pull–down menu only contains the option Displayed info and the Run pull–down menu allows
to start the browser on the selected object.
(*) It performs a get on topologies just one scope level below the dropped topology in the MIB tree, for
example the node contained in the dropped ET.
(**) It asks for which topology below the dropped one you want to perform the get, for example all nodes
contained in the dropped Network
Pop–up menus are also available on the displayed topologies and connections (generic and specific
actions).
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED 01 SC.5:OPERATION
334
6.3.2 Data Visualization
The purpose of this procedure is to get the topologies and connections useful to represent the connectivity.
not permitted without written authorization from Alcatel.
a) In the Connectivity Inventory window select the Actions:Get Topologies pull–down menu.
If you select the first level you will get the topologies just one level below the dropped ONE (E.g. SBN
for NTW, ET for SBN, NODE for ET); if you select all levels you can select among the following
topologies:
ED 01 SC.5:OPERATION
334
After the get topologies operation it is possible to enter a ”Get Connections” action. An example is shown
herebelow.
ED 01 SC.5:OPERATION
334
7 PERFORMANCE MONITORING
7.1 Introduction
not permitted without written authorization from Alcatel.
All rights reserved. Passing on and copying of this
document, use and communication of its contents
The aim of the Performance Monitoring at RM side is to allow the user to monitor transport objects, i.e.
the objects path and trail. The monitoring activity is executed on the involved tps.
In order to monitor transport objects, the user creates objects called ” Measures ”, which are performance
monitoring work sessions, defined by a set of characteristics according to the Customer’s needs.
After creating the measure, the user must associate (correlate) to it the transport/s to monitor and the
termination points (TPs). See Figure 229. on page 238.
– Stopped. This means that the collection activity is terminated. The collection activity can restart upon
entering the Activate command.
ED 01 SC.5:OPERATION
334
N.B. Only one measure can be active at the same time on a PM termination point for a given
granularity value ( 15 ’, 24 h )
N.B. For a path terminated to all virtual objects, the relevant tps cannot be automatically correlated.
PATH PATH
CORRELATE
pmtp
N.B. PM transport view and PM TP view are described in Section GRAPHICAL INTERFACE.
ED 01 SC.5:OPERATION
334
7.2 Creating the Measure
a) From the Browser select the PM domain and open the pop–up menu. Select the command Create:
Measure. The object creation dialog box is presented.
not permitted without written authorization from Alcatel.
All rights reserved. Passing on and copying of this
document, use and communication of its contents
ED 01 SC.5:OPERATION
334
b) Enter the following attributes:
– measure name. The measure name can be modified, by means of the SHOW/Set Attributes
command, only if the measure status is PLANNED.
• TRUE. The PM transport is created with some default TPs automatically correlated ( for each
of them a PMTP instance is created )
– One pmtp ( NAP/CAP type ) for a bidirectional transport is enough because the NE
provides the information relevant to both ends (NEAR END + FAR END).
– If the path is broadcast all sink ends are monitored. (Only real ends are considered.).
Virtual NAPs or CAPs are not automatically monitored; the closest real CTP ( boundary
CTP ) will be monitored.
– TP layer. You can specify the layer of the objects monitored by the measure:
• LO – low order
• HO – high order
• LO&HO – you monitor transports belonging to all the path layer network ( HO / LO )
– granularity type. The granularity is the monitoring frequency, i.e. the frequency of historical data
counters grouping. You can select:
• TRUE, the counters belonging to granularity periods will be collected, when the measure is
activated
• FALSE, the historical data counters will not be collected, even when the measure is activated.
This implies that the goal of the measure is to set Threshold Crossing Alarm profiles on the
termination points only.
– DEFAULT TCA. If TRUE, the default TCA will be associated to the measure, when associating the
TP to the measure.
d) To verify the successful creation of the measure, check on the Measure Create report window.
1AA 00014 0004 (9007) A4 – ALICE 04.10
e) You can now navigate from the pmDomain, in order to find the new measure icon.( from the Browser
pmDomain select Display related items : Measures. The Measure List is presented).
ED 01 SC.5:OPERATION
334
All rights reserved. Passing on and copying of this
document, use and communication of its contents
not permitted without written authorization from Alcatel.
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED
01
957.130.872 H
SC.5:OPERATION
Figure 232. Measure list
Figure 231. PM domain related items
334
3AL 61259 AA AA
241 / 334
7.3 Transport object Correlation to the Measure
INTRODUCTION
SEQUENCE
a) Select the Measure from the list. The Measure must be planned.
b) Select the menu Actions: Correlate/Merge. You can further select among:
• Correlate paths/trails
• Correlate reports
• Uncorrelate reports
• Merge measures
ED 01 SC.5:OPERATION
334
c) Select Correlate: paths/trails. The Object Correlation window is presented. The measure is already
contained in the window . Drag and drop the paths/ trails to correlate to the window drop area.
not permitted without written authorization from Alcatel.
All rights reserved. Passing on and copying of this
document, use and communication of its contents
e) To verify that the correlation has been properly entered, navigate the browser in order to find the icon
of the PMtransport which has been just created. From the browser point with the mouse to the
measure icon and issue Display: Related items: PMTransports. The PMTransport icon/s are
displayed in the browser window.
N.B. The correlation Measure–Transport can be also executed starting from the transport (path /trail)
by using the relevant pop–up menu.Figure 234. shows the Object Correlation dialog box. The
user will drag and drop the measure from the browser.
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED 01 SC.5:OPERATION
334
7.4 Tp’s correlation to the Measure
INTRODUCTION
LIMITATIONS
– A TP can be correlated to a measure ( and so a PMTP can be created under a measure ) only if the
transport the TP belongs to is already correlated to that measure
– A TP can be monitored by at most 2 ( two ) activated measures at the same time, and the measures
must have different pm–Granularity values.
SEQUENCE
a) Select from Browser view the ctp / nap / cap to correlate. They must belong to a transport which is
already correlated to at least one Measure.
c) The tp is correlated to the Measure which is already correlated to the relevant path. By using the
Browser you can verify the tp correlation to the Measure, looking for the newly created pmTP.
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED 01 SC.5:OPERATION
334
All rights reserved. Passing on and copying of this
document, use and communication of its contents
not permitted without written authorization from Alcatel.
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED
01
957.130.872 H
SC.5:OPERATION
334
3AL 61259 AA AA
Figure 235. Performance Monitoring: Correlate to Measure
245 / 334
not permitted without written authorization from Alcatel.
All rights reserved. Passing on and copying of this
document, use and communication of its contents
Figure 236. TPs correlated to measure
N.B. If the transport object the TP belongs to ( e.g. a path ) is correlated to many measures and you
issue the command to correlate the tp to a Measure, the system provides a measure selection
dialog box ( see Figure 237. ), in order to select which measures you want to correlate the tp
to.
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED 01 SC.5:OPERATION
334
7.5 PMTP Attributes
If you issue a Show/Set attributes of a PMTP object, you will get the dialog box of Figure 238.
not permitted without written authorization from Alcatel.
All rights reserved. Passing on and copying of this
document, use and communication of its contents
ED 01 SC.5:OPERATION
334
The PMTP main attributes are:
• REQUIRED SIDE. The REQUIRED SIDE is the direction of the signal to monitor. It can be set
by the 1354RM to one of the following values:
• ACTIVE SIDE. It represents the actual direction monitored on equipment for the specified TP.
• REQUIRED MODE. It represents the required mode to start the monitoring on the PMTPs.
The Mode (UNI or BIDI) determines the type of UAS counter to be collected by EML (SH/WX)
for a certain tp. The possible values are:
– unidirectional, RM will receive the values of two counters: Near End UAS (Unavailable
seconds) and FEUAS (Far End Unavailable Seconds)
– bidirectional, RM will receive the values of only one counter BID–UAS which represents
the logical OR function of the Near End UAS (Unavailable seconds) and FEUAS (Far End
Unavailable Seconds) counters.
• ACTIVE MODE. It represents the actual mode monitored on equipment for the specified TP.
REQ SIDE and REQ MODE are automatically selected by RM after executing the command
” Correlation of the tp to the measure ”. They are chosen taking into account:
• ACTIVE PM. This attribute is set to TRUE if the RM wants to have PM available on that TP, e.g.
when the measures passes from the status planned to the status activated. This attribute is
set to FALSE if the RM does not want to have PM available on that TP, e.g. in case of transport
rerouting.
• sink/source REQUIRED TCA. This attribute is the name of the desired Threshold Crossing
Alarm profile on the termination point.
• sink/source ACTIVE TCA. This attribute is the name of the actual Threshold Crossing Alarm
profile on the termination point.
N.B. ACTIVE SIDE/ACTIVE MODE are not meaningful when the measure is planned.
After activating the measure it is possible to show the actual ACTIVE SIDE and the actual
ACTIVE MODE of the tp in the PMtp show/set attributes window. These attributes show the
situation present on the equipments. If the PMTP is not consistent, this means that at least
one difference between Required and Active attributes is present.
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED 01 SC.5:OPERATION
334
7.5.1 Examples of assignement of the attribute SIDE
An example of assignement of the attribute REQUIRED SIDE for a bidirectional path is shown in
Figure 239. and Figure 240. Notice that for a bidirectional path the involved CTPs ( if correlated ), become
not permitted without written authorization from Alcatel.
PMTPs marked both as sink and source. Figure 241. shows an example of assignement of the attribute
All rights reserved. Passing on and copying of this
document, use and communication of its contents
NE–A NE–B
ctp ctp
MAIN
sink
B&S
B&S
ctp ctp source
ctp
SPARE
sink
Figure 239. Side of the pmctps in a b&s connection ( signal from NE–A to NE–B )
NE–A NE–B
ctp ctp
MAIN source
sink
B&S
ctp ctp
SPARE source ctp
Figure 240. Side of the pmctps in a b&s connection ( signal from NE–B to NE–A )
ctp ctp
nap nap
ED 01 SC.5:OPERATION
334
7.6 Counter Report Profile Creation
INTRODUCTION
The document name derives from the measure userlabel by adding the character ” _ ”( underscore ) as
prefix and the characters ”_CO ” as suffix. As an example, the document name of the counter report
associated to the measure ”MEASURE1” will be ”_MEASURE1_CO”.
First of all, the counter Report Profile instance has to be created, then it must be correlated to all the
measures that require the generation of documents; only when the measures will be activated, the
document will be periodically generated and sent.
A counter report profile can be associated to more than one measure at the same time.
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED 01 SC.5:OPERATION
334
SEQUENCE
a) To create a counter report, from the browser, point to the PM domain and issue the command PMdom:
Create: Counter Report. Enter:
not permitted without written authorization from Alcatel.
All rights reserved. Passing on and copying of this
document, use and communication of its contents
• type (on file/ printer / mail). The generated reports can be stored on file, printed or sent by Email.
• frequency (15’/ 1 h / 1 Day / 1 Week / 1 Month / 1 Year). This attribute means that the counter
reports for the activated measures will be generated each quarter of hour / each hour / each
day...
ED 01 SC.5:OPERATION
334
b) Confirm the creation by selecting the button Create.
Now the counter report profile can be correlated to the measure. ( see paragraph 7.8 herebelow )
c) To verify the correlation, point at the measure and issue Display: Related items: counter Reports. See
Figure 243. and Figure 244.
ED 01 SC.5:OPERATION
334
not permitted without written authorization from Alcatel.
All rights reserved. Passing on and copying of this
document, use and communication of its contents
An example of the document that will be generated by a counter report profile is shown in Figure 245.
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED 01 SC.5:OPERATION
334
not permitted without written authorization from Alcatel.
All rights reserved. Passing on and copying of this
document, use and communication of its contents
Figure 245. Example of generated counter report
N.B. The environmental variable PM_FORMAT can be set by the administrator to:
ED 01 SC.5:OPERATION
334
7.7 Threshold Report Profiles Creation
INTRODUCTION
not permitted without written authorization from Alcatel.
Threshold report profiles are objects which allow the automatic generation and sending of documents
All rights reserved. Passing on and copying of this
document, use and communication of its contents
( Threshold reports).
These documents contain only the values collected by the measure which exceed some user specified
threshold values.
As in the case of the counter report profiles, first you must create the threshold report profile object; then
it can be correlated to each measure you want the threshold reports to be generated for; threshold reports
will be sent only after measure activation.
SEQUENCE
– type (on file/ printer / mail). The threshold report can be stored on file, printed or sent by Email.
– window (15’/ 1 h / 1 Day / 1 Week / 1 Month / 1 Year). This attribute means that the reports for the
activated measures will be generated each quarter of hour / each hour / each day...
– The threshold values which will determine the contents of the generated documents.
N.B. The environmental variable PM_FORMAT can be set by the administrator to:
ED 01 SC.5:OPERATION
334
not permitted without written authorization from Alcatel.
All rights reserved. Passing on and copying of this
document, use and communication of its contents
Figure 246. Create: Threshold Report dialog box
To execute a correlation, Measure granularity and Threshold report granularity must be the
same. The granularity value and the Report window must be compatible, i.e. the window must
be a multiple of the granularity, according to the following table:
granularity window
15m 15m / 1h / 1day
24h 1 day / 1 week / 1 month / 1 year
b) You can verify, by using the browser, that the Threshold Report Profile has been created. See
Figure 247.
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED 01 SC.5:OPERATION
334
All rights reserved. Passing on and copying of this
document, use and communication of its contents
not permitted without written authorization from Alcatel.
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED
01
report
Threshold
957.130.872 H
SC.5:OPERATION
Now measure and Threshold report profiles can be correlated.
Figure 247. Threshold Report Profile list.
334
3AL 61259 AA AA
257 / 334
7.8 Report Profile Correlation
SCOPE
a) From Browser issue a Display Related items: Counter Reports or Threshold Reports on the PM
domain.
b) Select the measure from the Measure List, navigate it to the browser and select the command
Correlations: Correlate Reports. A dialog box is presented.
c) From Browser drag and drop the report profiles ( counter and threshold ) to the Correlation dialog
box drop area and click on button Create.
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED 01 SC.5:OPERATION
334
not permitted without written authorization from Alcatel.
All rights reserved. Passing on and copying of this
document, use and communication of its contents
d) To verify the correlation, in the browser, from the measure issue Display: Related Items: Counter
reports/ Threshold Reports.
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED 01 SC.5:OPERATION
334
7.9 Measure Activation, Stop and Consistency
– the user activates manually the measure. Stopped measures can be only manually reactivated.
Only when activated, the measure realizes the goal it has been created for: data collection from Network
Elements, automatic generation and sending of counters / thresholds reports (if they have been
correlated), generation of threshold crossing alarm ( in case TCA profiles have been correlated to pmTPs
belonging to the measure).
The activity period of a measure terminates manually ( by means of a Measure: Stop command ) or
automatically ( when the measure end time is reached ).
SEQUENCE
a) Select from the browser the measure and issue the Specific: Start / Consistency / Stop : Start
command. The icon of the measure becomes green and the icon of the transport ( path or trail ) is
marked by an indication of the measure granularity.
granularity
After the activation of the measure, if the measure is marked as ”consistent”, this means that the
activation command has been successfully completed for all the correlated points. This means that
the NEs have started the monitoring action and the EMLs will provide the required data.
If the measure is displayed as ”not consistent”, it means that the activation command has failed for
at least one of the tps actually correlated to the measure. It is required to execute a Consistency
activity on the measure.
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED 01 SC.5:OPERATION
334
7.9.2 Measure Stop
INTRODUCTION
not permitted without written authorization from Alcatel.
– Automatically, when the end time of the actually activated measure expires.
When Stopped, the measure will no longer collect data from the Network Elements and will not generate
reports or threshold crossing alarms.
After being stopped, the measure can be either Consistent or Not–consistent
SEQUENCE
a) Select from the browser the measure and issue the Specific: Stop command. The icon of the measure
becomes light–blue.
INTRODUCTION
A Measure with Consistency attribute equal to Not consistent can be set consistent by means of the
Consistency action.
A measure is said consistent if all monitored TPs will provide the expected data to the measure.
SEQUENCE
a) Select from the browser the measure and issue the Actions: Start/Consistency/Stop: Consistency
command.
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED 01 SC.5:OPERATION
334
7.10 Threshold Crossing Alarm (TCA) Profile creation
INTRODUCTION
SEQUENCE
a) From the browser, point with the mouse at the PM Domain and issue the command Create: TCA
Profile. Specify the high threshold value, the low threshold value and the severity for the counters
listed in the following. The list contains the values suggested for ADMs ( 1641SM, 1651SM, 1661SM,
1664SM ).
15 m granularity
24h granularity
N.B. At least one threshold value must be specified since default values are not present.
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED 01 SC.5:OPERATION
334
All rights reserved. Passing on and copying of this
document, use and communication of its contents
not permitted without written authorization from Alcatel.
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED
01
957.130.872 H
SC.5:OPERATION
Figure 250. TCA Profile creation.
334
3AL 61259 AA AA
263 / 334
7.11 Threshold Crossing Alarm (TCA) Profile Correlation to the PMTP
SEQUENCE
1) The correlation is executed if in the RM exists only one TCA profile with granularity and rate
compatible with the PMTPs to correlate.
2) If in the RM exists more than one TCA profile with granularity and rate compatible with PMTPs
to correlate, a dialog box is presented. The operator has to select the specific TCA to correlate.
4) To verify the successful correlation, from the browser point with the mouse to the involved PMTP
and issue the Display: Main Related items: TCA Profile.
N.B. In the QB3*ADMs all TPs with same rate and granularity must have the same TCA profile, then
if you try to associate to a certain PMTP a TCA profile different from the TCA profile already
1AA 00014 0004 (9007) A4 – ALICE 04.10
assigned to another TP, a dialog box is presented, asking the user either to force or not the TCA
profile on that NE.
The above limitation does not apply to QB3 ( INFO MODEL ) new cross connect equipment.
ED 01 SC.5:OPERATION
334
7.12 Merging of several Measures
INTRODUCTION
not permitted without written authorization from Alcatel.
The merging of more measures (input measures) into another one (target measure) is a complex action
All rights reserved. Passing on and copying of this
document, use and communication of its contents
which allows to put together more monitored objects (paths, trails and their termination points) into one
measure. For more detailed information refer to Section DESCRIPTIONS
SEQUENCE
a) From the measure list select one of the measures to merge and click on button Merge. The Merge
dialog box is displayed. It contains in the upper area the previously selected measure, whose name
will be the name of the merged measure being created. See Figure 251.
b) Drag to the drop area the measures to merge and select the button Merge measure. The measures
are merged into a new one. The dropped measures are deleted from MIB.
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED 01 SC.5:OPERATION
334
7.13 Displaying PM data
INTRODUCTION
1) ”Graphical counters”: the values are displayed as histograms, with True on the ABSCISSA
SEQUENCE
a) Select the measure from the browser and select the functional button Show Performance Monitoring
Data. A dialog box is presented ( See Figure 252. )
b) You can select the Select button, thus obtaining the Request Control Transport selection dialog box.
Enter the suitable selections. See Figure 253.
c) Select the counters you want to display and click on the add counters arrow. Click on Apply. The PM
graphical counter report opens. Figure 254. to Figure 256. show examples of counter reports.
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED 01 SC.5:OPERATION
334
All rights reserved. Passing on and copying of this
document, use and communication of its contents
not permitted without written authorization from Alcatel.
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED
01
957.130.872 H
SC.5:OPERATION
add counters
Report Request Control Transport selection
334
3AL 61259 AA AA
remove counters
267 / 334
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED
01
957.130.872 H
SC.5:OPERATION
Figure 254. Graphical Counters Report
334
Figure 253. Report Request Control Transport selection
3AL 61259 AA AA
268 / 334
All rights reserved. Passing on and copying of this
document, use and communication of its contents
not permitted without written authorization from Alcatel.
not permitted without written authorization from Alcatel.
All rights reserved. Passing on and copying of this
document, use and communication of its contents
If you select the button Select TP, you will get a TP selection dialog box. See Figure 257.
N.B. The upper right–hand side of the graphical report contains the legend of the displayed counters,
in particular:
•
1AA 00014 0004 (9007) A4 – ALICE 04.10
• Not measured=the user issued a command which affected the monitoring activity, such as path
deimplementation.
ED 01 SC.5:OPERATION
334
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED
01
957.130.872 H
SC.5:OPERATION
Figure 257. TP selection.
Figure 256. PM Counter Report
334
3AL 61259 AA AA
270 / 334
All rights reserved. Passing on and copying of this
document, use and communication of its contents
not permitted without written authorization from Alcatel.
7.14 The pmNE
A pmNE object is automatically created the first time the user executes the correlation of a TP belonging
to a certain NE.
not permitted without written authorization from Alcatel.
All rights reserved. Passing on and copying of this
document, use and communication of its contents
Starting from the PM domain, you can navigate, by means of the Display: Related Items command, to the
Monitored NEs. See figure below.
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED 01 SC.5:OPERATION
334
The Show/Set attributes from this object contains the following attributes:
– userlabel
– working status. This attribute is usually set to normal. It changes to Synchronizing when the attribute
On going activity is in one of the following states:
ED 01 SC.5:OPERATION
334
7.15 Archive Performance Monitoring data
INTRODUCTION
not permitted without written authorization from Alcatel.
To Archive Monitoring data means to memorize PM data on a storing support ( tape / file )
All rights reserved. Passing on and copying of this
document, use and communication of its contents
– measures
– PM transport
– pmTPs
– historical data
The result of the Archive procedure is to obtain a series of mag–tapes, each one storing data relevant to
a certain period.
The Archive procedure must be executed to avoid memory disk saturation, with the objective of maintain
hystorical data and transfer them to tape.
The Archive procedure is not executed automatically but must be launched by the 1354RM user.
It is strongly recommended to execute Archive and Delete procedures of the PM hystorical data with the
following time periods:
ED 01 SC.5:OPERATION
334
7.15.1 Archive Performance Monitoring data
SEQUENCE
A confirmation is requested. If the user chooses to continue, the archive process starts and when
finished, presents an Archive Report ( See Figure 259. and Figure 262. )
ED 01 SC.5:OPERATION
334
7.15.2 Retrieve Performance Monitoring data
INTRODUCTION
not permitted without written authorization from Alcatel.
To Retrieve Monitoring data means to memorize on RM_MIB data stored on archived tape.
All rights reserved. Passing on and copying of this
document, use and communication of its contents
SEQUENCE
a) In the browser window select the button Retrieve Performance Monitoring Data.
A confirmation is requested. If the user chooses to continue, the retrieve process starts ( see
Figure 261. )
ED 01 SC.5:OPERATION
334
7.15.3 Display Performance Monitoring data
INTRODUCTION
a) In the browser window select the button Display Performance Monitoring Data. A dialog box is
presented, containing the list of the measures you may display.
b) Select the measure and click on OK. A dialog box containing all the allowed selections is presented.
c) Enter the suitable selections and click on OK or Apply. The PM graphical window is opened.
ED 01 SC.5:OPERATION
334
7.15.4 Delete Monitored data
INTRODUCTION
not permitted without written authorization from Alcatel.
To Delete Monitored data means to delete from RM–MIB all archived data. Only historical data are deleted.
All rights reserved. Passing on and copying of this
document, use and communication of its contents
SEQUENCE
a) In the browser window select the button Delete Monitored Data. A confirmation box is presented. If
the user selects OK, PM data are deleted.
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED 01 SC.5:OPERATION
334
7.16 Archive Session
INTRODUCTION
SEQUENCE
Starting from the PM domain, you can navigate, by means of the Display: Related Items command, to the
Archive Session. The list of the Archive sessions is presented. For each item of the list the Show/Set
attributes dialog box contains the following attributes:
• user label, automatically built on from date and the granularity (e.g.: an archive performed on
15 min data from the 15/06/1998 will be given the following user label: “15 minutes counters
1998/06/15”)
An instance of archive session, concerning the next archive session, is automatically generated at the
end of each archive operation.
The only attribute which can be set by the user is the attribute to date, in order to anticipate or postpone
the next archive operation.
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED 01 SC.5:OPERATION
334
7.17 Uncorrelate the transport from planned measures
INTRODUCTION
not permitted without written authorization from Alcatel.
This is the action opposite to the ”Correlate Transport to planned Measures”; by uncorrelating a transport
All rights reserved. Passing on and copying of this
document, use and communication of its contents
from a planned Measure the user indicates that the termination points belonging to that transport will not
have to be monitored by the Measure.
SEQUENCE
a) From the browser point at the transport icon and issue the Performance Monitoring: Uncorrelate
from Measure command.
1) More than one measure is correlated. The system provides the list of the planned measures
which are monitoring the involved transport object.The user selects the measure to uncorrelate
and clicks on the confirmation button.
INTRODUCTION
This is the action opposite to the ”Correlate tp to planned Measures”; by uncorrelating a tp from a planned
Measure, the user indicates that data concerning that tp are no more interesting for him: they will not be
collected when the measure will enter the activated state.
SEQUENCE
a) From the browser point at the tp icon and issue the Performance Monitoring: Uncorrelate from Mea-
sure pop–up menu.
1) More than one measure is correlated. The system provides the list of the planned measures
which are monitoring the involved tp object.The user selects the measure to uncorrelate and
clicks on the confirmation button.
ED 01 SC.5:OPERATION
334
7.19 Remove from RM menu
INTRODUCTION
– PM transport
– Measure
The object containment tree is shown in Figure 263. , i.e. if you remove an object, all the contained objects
are automatically removed.
N.B. The Remove from RM action applies only to stopped or planned measures.
MEASURE
REPORT
COUNTER/
THRESHOLD
PM TRANSPORT
PMTP
HISTORICAL
DATA
ED 01 SC.5:OPERATION
334
7.20 Uncorrelate the counter/threshold report profile from the measure
INTRODUCTION
not permitted without written authorization from Alcatel.
This is the action opposite to the ”Correlate Counter/threshold report to planned Measures”, by
All rights reserved. Passing on and copying of this
document, use and communication of its contents
SEQUENCE
a) From the browser, point at the measure icon and issue the Performance Monitoring: Uncorrelate
from Measure command. The list of the associated reports is presented.
ED 01 SC.5:OPERATION
334
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED
01
957.130.872 H
SC.5:OPERATION
334
3AL 61259 AA AA
282 / 334
All rights reserved. Passing on and copying of this
document, use and communication of its contents
not permitted without written authorization from Alcatel.
8 OPERATOR ADMINISTRATION
8.1 Introduction
not permitted without written authorization from Alcatel.
All rights reserved. Passing on and copying of this
document, use and communication of its contents
This function is used to perform operator management. It can be invoked in the following way:
a) Select icon SMF from the 1354RM menu palette. The SMF first level window opens.
ED 01 SC.5:OPERATION
334
b) From the SMF first level window select (double click or selection + OK button) the Operator
Administration feature. The Operator Administrator menu is displayed. You can select the function
from the following:
1) List of Current login. This menu can be used to retrieve the currently connected operator.
2) List of Successful login. This menu can be used to obtain the list of the Successful login
operations.
3) List of Unsuccessful login. This menu can be used to obtain the list of the Unsuccessful login
operations.
4) List of Operators. This menu can be used to obtain the list of defined operators.
5) Add Operator. This menu can be used to add a new operator. See paragraph 8.1.1.
7) Change password.
8) Change Initiator.
9) Initiator Management
12 ) Forced Logout
ED 01 SC.5:OPERATION
334
8.1.1 Add Operator
a) From the Operator Administration menu select Add Operator. The Add User window is presented.
This window contains:
not permitted without written authorization from Alcatel.
All rights reserved. Passing on and copying of this
document, use and communication of its contents
– If you select the button Select WS, you can then select the WS/ WSs from a list displayed
on the right–hand side of the window.
– If you select the button All WS, the operator that is being created will be able to access
all specified WSs.
– LookOnly
– Path Builder
– Constructor
– OS Administrator ( HP Term included )
– Administrator ( HP Term not included )
– cnm_pb . He is like a normal VPN ( virtual private network, but he can manage only NAPs
and PATHS.
– cnm_lo. He can only visualize resources belonging to his NAD, communication alarms and
performance data.
• A list of initiatotors is also available from which you can optionally select the initiator.
b) Select the type and press Add. The new operator is added.
Chapter 4 of Section System Management Features describe in detail the available initiators.
Figure 266. gives a block diagram og the objects involved in the operator definition.
N.B. A certain profile can be associated to more initiators, while obviously a initiator refers to only
one profile.
N.B. Figure which follows refers to the case of one initiator which manages one NAD;
ED 01 SC.5:OPERATION
334
default mapping
PROFILE INITIATOR
FAD
(FUNCTIONS)
RULE1 RULE2
(No.)
NAD
NAD
( OBJECTS ) RESOURCE1 RESOURCE2
ED 01 SC.5:OPERATION
334
8.1.2 Remove Operator
a) From the main level function selection window select: Remove Operator. The relevant window is
presented. This window contains:
not permitted without written authorization from Alcatel.
All rights reserved. Passing on and copying of this
document, use and communication of its contents
– If button WS is selected, you can then select the WS/ WSs from a list displayed on the
right–hand side of the window.
– If button All WS is selected, the operator that is being removed will not be able to access
all specified WSs.
The detailed procedures relevant to the Operator Administration are described in the Handbook: System
Management Features, Chapter 4.
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED 01 SC.5:OPERATION
334
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED
01
957.130.872 H
SC.5:OPERATION
334
3AL 61259 AA AA
288 / 334
All rights reserved. Passing on and copying of this
document, use and communication of its contents
not permitted without written authorization from Alcatel.
9 RESTRICTED OPERATORS
CNM operators are defined in order to use a restricted interface. This interface is able to manage only
NAPs and PATHs belonging to the specified NAD ( Network Access Domain )
not permitted without written authorization from Alcatel.
All rights reserved. Passing on and copying of this
document, use and communication of its contents
9.1 Configuration
SEQUENCE
a) Many Initiators ( two per each restricted network domain and with NAD>300) can be defined with
the same prefix:
• restr_pb
• restr_lo
The description of the procedure of Add Initiator can be found at Section System Management
Features, Chapter 4. Operator Administration.
1) Select the NAP(s) from the Nap list and issue the command NAD (Network Assignment
Domain): Change.
2) In the dialog box select the icon dictionary. The NAD selection box opens. Select the domain
1354NN and confirm by clicking on OK. Click again on OK of the dialog box.
1) Select the path(s) from the Path list and issue the command Actions: NAD (Network
Assignment Domain): Change.
2) In the dialog box select the icon dictionary. The NAD selection box opens. Select the relevant
NAD and confirm by clicking on OK. Click again on OK of the dialog box.
The description of the procedure of Add Operator can be found at Section System Management
Features, Chapter 4. Operator Administration.
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED 01 SC.5:OPERATION
334
9.2 Access of the operator with Initiator restr_pb1
This user cannot open a RM terminal and the vertical palette contains only the browser icon.
– Enable AS link
The Specific menu contains items which depend on the selected object.
The Windows menu contains the list of opened windows (views and multicolumn lists).
Iconified windows can be deiconified; deiconified windows can be iconified.
ED 01 SC.5:OPERATION
334
The Help menu contains the following selectable item.
Help: On Help....
– Help: On 1354RM....
not permitted without written authorization from Alcatel.
– Help: On Browser....
All rights reserved. Passing on and copying of this
document, use and communication of its contents
All above mentioned menus are described in Section Graphical Interface, Chapter 12.
In addition, for each object class the pop–up menu contains object specific commands.
FUNCTIONAL BUTTONS
– Paths tool. If you click on this button a submenu is opened. It includes the following buttons:
• go to parent menu
• go to home menu
• Create a new path
• Add leg to a path
• Show the queued job
– Alarms tool. If you click on this button a submenu is opened. It includes the following buttons:
• go to parent menu
• go to home menu
• show communication alarms
– PM. It shows the performance monitoring tools. If you click on this button a submenu is opened. It
includes the following buttons:
• go to parent menu
• go to home menu
• Create a new measure
• Correlate path/trail to a measure
• Merge measure
• Show Performance Monitoring Data
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED 01 SC.5:OPERATION
334
9.2.2 Browser navigated objects
– NAPs
– Paths in Topology
– Paths in Topology ( with Source/Sink)
– Create a path
– Add Leg
– Alarm Tools: it contains the only function Show Communication Alarms
– Correlate path/trail to a measure
– Show the queued jobs
– Nap list: the only option remove Nap is not included
– Measure list. The functional buttons are:
• Create a new measure
• Correlate path/trail to a measure
• Merge measure
• Show Performance Monitoring Data
– Measures
– Counter Reports
– Threshold Reports
From the PM domain the operator with Initiator cnm_pb1 can create:
– Measures
– Counter Reports
– Threshold Reports
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED 01 SC.5:OPERATION
334
9.3 Access of the operator with Initiator restr_lo1
This user cannot open a RM terminal and the vertical palette contains only the browser icon.
not permitted without written authorization from Alcatel.
All rights reserved. Passing on and copying of this
document, use and communication of its contents
ED 01 SC.5:OPERATION
334
The View menu contains the following selectable items:
– Enable AS link
The Specific menu contains items which depend on the selected object.
The Windows menu contains the list of opened windows (views and multicolumn lists).
Iconified windows can be deiconified; deiconified windows can be iconified.
Help: On Help....
– Help: On 1354RM....
– Help: On Browser....
– Help: On This Window....
– Help: About This Version....
– Help: On Index
All above mentioned menus are described in Section Graphical Interface, Chapter 12.
– Alarms tool. If you click on this button a submenu is opened. It includes the following buttons:
• go to parent menu
• go to home menu
• show communication alarms
– PM. It shows the performance monitoring tools. If you click on this button a submenu is opened. It
includes the following buttons:
• go to parent menu
• go to home menu
•
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED 01 SC.5:OPERATION
334
9.3.2 Browser navigated objects
– Network
All rights reserved. Passing on and copying of this
document, use and communication of its contents
– NAPs
– Paths in Topology
– Paths in Topology ( with Source/Sink)
– Measures
– Counter Reports
– Threshold Reports
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED 01 SC.5:OPERATION
334
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED
01
957.130.872 H
SC.5:OPERATION
334
3AL 61259 AA AA
296 / 334
All rights reserved. Passing on and copying of this
document, use and communication of its contents
not permitted without written authorization from Alcatel.
10 EXPORT OF RESOURCES
The global export procedure described in this paragraph refers to NN startup phase and covers the export
of all resources to be assigned to 1354NN.
As an alternative, during normal operation of the national network, to export a part of the resources to NN,
it is possible to execute a manual export procedure. .
The export mechanism is based on changing the resource network access domain.
In practice, the NAD (network access domain) of the necessary RM resource objects are changed so that
they belong to the Qnn Agent NAD. Then at Qnn Agent startup the Qnn Agent discovers its resources and
creates the appropriate Qnn objects. In order to be able to change NAD values for the relevant resources,
the operator must login as RM Administrator.
– requires some prior planning effort to decide in advance which free NAPS are for export
– NAD global change for the Physical connections terminating to virtual nodes
ED 01 SC.5:OPERATION
334
10.1.1 NAD global change for the Physical connections terminating to virtual nodes
SEQUENCE
ED 01 SC.5:OPERATION
334
2) In the dialog box of Figure 269. select the icon dictionary. The NAD selection box opens.Select
the domain 1354NN and confirm by clicking on OK. Click again on OK of the dialog box.
not permitted without written authorization from Alcatel.
All rights reserved. Passing on and copying of this
document, use and communication of its contents
dictionary
ED 01 SC.5:OPERATION
334
10.1.2 NN assignment of the NAPs
Paragraph 10.1.2.1 describes the usage of the command to export the NAP(s) to 1354NN.
If the NAP(s) to be assigned to 1354NN is involved in a path, the relevant path must be
subsequently exported to 1354NN.
SEQUENCE
1) Select the NAP(s) from the Nap list and issue the command NAD (Network Assignment
Domain): Change.
2) In the dialog box of Figure 270. ( left–hand side ) select the icon dictionary. The NAD selection
box opens. Select the domain 1354NN and confirm by clicking on OK. Click again on OK of the
dialog box.
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED 01 SC.5:OPERATION
334
10.1.2.2 Export of idle NAPs
The procedure which follows describes an example of export of the idle NAPs belonging to a certain node;
the correct usage of the browser filter to select the idle NAPs of a certain rate is described.
not permitted without written authorization from Alcatel.
All rights reserved. Passing on and copying of this
document, use and communication of its contents
SEQUENCE
a) From the browser point the mouse to the network icon and issue the command Display: Main Related
Items...( See Figure 271. )
b) In the selection box select option All Nodes and click on No Filter button. The Node list is displayed.
See Figure 272.
ED 01 SC.5:OPERATION
334
c) From the Node list select the Node and isuue Display: Main Related items...
d) In the selection box of Figure 273. select option NAPs and click on Filter button. The Filter dialog box
is displayed. Figure 274. shows the usage of the filter to select the rate (in this example Set Equal
to VC12) and the Idle Indicator ( Set Equal to Idle ). Click on Apply button to end the selection. The
filtered NAP list is shown in Figure 275.
e) You can select the NAP/s to export ( multiple selection is allowed ) and issue the command Actions:
NAD Change. See Figure 275. on page 304
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED 01 SC.5:OPERATION
334
All rights reserved. Passing on and copying of this
document, use and communication of its contents
not permitted without written authorization from Alcatel.
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED
01
957.130.872 H
SC.5:OPERATION
Figure 274. Filter options: rate and idle indicator.
334
3AL 61259 AA AA
303 / 334
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED
01
957.130.872 H
SC.5:OPERATION
334
3AL 61259 AA AA
Figure 275. NAP List:NAD:Change of the selected Naps.
304 / 334
All rights reserved. Passing on and copying of this
document, use and communication of its contents
not permitted without written authorization from Alcatel.
f) Change the NAD from Free Pool to 1354NN. See description at 10.1.2.1
The Event Report dialog box opens telling that the Change NAD action has been correctly started.
not permitted without written authorization from Alcatel.
After a few seconds you can verify the successful change operation of the NAD attribute in the NAP
All rights reserved. Passing on and copying of this
document, use and communication of its contents
NAD attribute
ED 01 SC.5:OPERATION
334
10.1.2.3 Export NAPs belonging to paths terminated within RM domain
The procedure which follows describes an example of export of NAPs belonging to a certain path,
terminated within RM domain.
a) From the browser point the mouse to the network icon and issue the command Display: Main Related
Items...( See Figure 271. )
b) In the selection box select option Paths in topology. If you click on No Filter button, you will get the
complete Path list. If you select option Filter, thus choosing a filtered list, you will set filter parameters,
such as rate, path userlabel...
c) Select the path and click on button Naps View. The relevant Naps view is displayed. See Figure 278.
d) For each NAP do the following: select the NAP icon and issue Specific: NAD : Change pull down
menu.
e) Change the NAD from Free Pool to 1354NN. See description at 10.1.2.1
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED 01 SC.5:OPERATION
334
All rights reserved. Passing on and copying of this
document, use and communication of its contents
not permitted without written authorization from Alcatel.
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED
01
957.130.872 H
SC.5:OPERATION
Figure 278. Naps View: NAD change of the NAPs.
334
3AL 61259 AA AA
307 / 334
10.1.2.4 Export of the nap belonging to a path terminated outside RM domain
The procedure which follows describes an example of export of the NAP belonging to a path terminated
outside the RM domain, i.e. a path terminated to a virtual node.
a) From the browser point the mouse to the network icon and issue the command Display: Main Related
Items...( See Figure 271. on page 301)
b) In the selection box select option All Nodes. If you click on No Filter button, you will get the complete
Node list. If you select option Filter, thus choosing a filtered list, you will be able to set filter
parameters, such as userlabel, site..
Figure 279. Node list: display main related items...of a virtual node.
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED 01 SC.5:OPERATION
334
c) Select the Virtual Node and issue Actions: Display: Main Related Items.
d) In the selection box ( see Figure 280. ) select option Paths starting ( ending ) from (to) node. Click
on No Filter. The list of the paths terminated to the previously selected virtual node is presented. See
not permitted without written authorization from Alcatel.
Figure 281.
All rights reserved. Passing on and copying of this
document, use and communication of its contents
e) Select the path and click on button Naps View. The relevant Naps view is displayed. See Figure 282.
f) For the REAL NAP do the following: select the NAP icon and issue Specific: NAD : Change pull down
menu item.
g) Change the NAD from Free Pool to 1354NN. See description at paragraph 10.1.2.1.
ED 01 SC.5:OPERATION
334
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED
01
NAPs VIEW button
957.130.872 H
VIRTUAL NAP
SC.5:OPERATION
Figure 282. Export of the real NAP.
Figure 281. List of paths terminated to a node.
334
3AL 61259 AA AA
REAL NAP
310 / 334
All rights reserved. Passing on and copying of this
document, use and communication of its contents
not permitted without written authorization from Alcatel.
10.1.3 NN assignment of the path(s)
SEQUENCE
not permitted without written authorization from Alcatel.
1) Select the path(s) from the Path list and issue the command Actions: NAD (Network
All rights reserved. Passing on and copying of this
document, use and communication of its contents
2) In the dialog box of Figure 284. ( left–hand side ) select the icon dictionary. The NAD selection
box opens. Select the domain 1354NN and confirm by clicking on OK. Click again on OK of the
dialog box.
ED 01 SC.5:OPERATION
334
10.2 Manual export procedure
As an alternative to the Global Export procedure, as far it concerned about exporting HO and LO link
connections, MS trail and HO trails, it is possible to execute a ” manual ” procedure, whose advantage is
a) export of HO and LO link connections. See details at para 10.2.1 at page 312
SEQUENCE
a) From the browser point the mouse to the network icon and issue the command Display: Main Related
Items...( See Figure 271. )
b) In the selection box of select option All Nodes and click on No Filter button. The Node list is displayed.
See Figure 272.
c) Select from the list the virtual node and issue Actions:Display:Main related items...( See
Figure 285. ).
d) From the selection box select option Ports in node. Click on Filter button.
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED 01 SC.5:OPERATION
334
All rights reserved. Passing on and copying of this
document, use and communication of its contents
not permitted without written authorization from Alcatel.
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED
01
957.130.872 H
SC.5:OPERATION
Figure 285. Virtual Node:display:main related items.
334
3AL 61259 AA AA
313 / 334
not permitted without written authorization from Alcatel.
All rights reserved. Passing on and copying of this
document, use and communication of its contents
e) In the Filter dialog box choose settings: Technology: Equal to SDH and Assignment status Equal to
Assigned . See Figure 286. Click on Apply button. The filtered Port list is displayed as in Figure 287.
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED 01 SC.5:OPERATION
334
All rights reserved. Passing on and copying of this
document, use and communication of its contents
not permitted without written authorization from Alcatel.
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED
01
957.130.872 H
SC.5:OPERATION
Figure 287. Filtered ( SDH and Assigned ) port list.
334
3AL 61259 AA AA
315 / 334
f) Select the ( virtual ) port and issue Actions: Display: Main related items...
g) From the selection box select option Physical Connection and click on No Filter. The Physical
Connection icon is displayed in the browser window. See Figure 289.
ED 01 SC.5:OPERATION
334
h) Point with the mouse to the Physical Connection icon and issue the Display: All related items pop–up
menu item. See Figure 290.
not permitted without written authorization from Alcatel.
All rights reserved. Passing on and copying of this
document, use and communication of its contents
ED 01 SC.5:OPERATION
334
i) From the selection box of Figure 291. select option Link Connections in Physical Connections. Click
on No Filter button. The Link Connection list is displayed.
ED 01 SC.5:OPERATION
334
j) From the pull–down menu bar select the command Actions: Select: Select All. All object instances
appear selected. See Figure 292.
not permitted without written authorization from Alcatel.
All rights reserved. Passing on and copying of this
document, use and communication of its contents
ED 01 SC.5:OPERATION
334
k) From the pull–down menu bar select the command Actions: NAD: Change. See Figure 293.
ED 01 SC.5:OPERATION
334
l) Change the NAD attribute to 1354NN.
In the dialog box of Figure 269. on page 299 select the icon dictionary. The NAD selection box
opens.Select the domain 1354NN and confirm by clicking on OK. Click again on OK of the dialog box.
not permitted without written authorization from Alcatel.
All rights reserved. Passing on and copying of this
document, use and communication of its contents
m ) From the Link Connection list you can verify the successful NAD change operation.
( See Figure 294. )
NAD
ED 01 SC.5:OPERATION
334
10.2.2 Export of MS trails
SEQUENCE
ED 01 SC.5:OPERATION
334
b) From the selection box select option MS trail. Click on No Filter button. The MS trail is displayed in
the browser window. See Figure 296. on page 323
not permitted without written authorization from Alcatel.
All rights reserved. Passing on and copying of this
document, use and communication of its contents
ED 01 SC.5:OPERATION
334
c) Point with the mouse at the MS trail to export and issue the command NAD: Change.
In the dialog box of Figure 269. on page 299 select the icon dictionary. The NAD selection box
opens.Select the domain 1354NN and confirm by clicking on OK. Click again on OK of the dialog box.
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED 01 SC.5:OPERATION
334
e) To verify the successful change of the NAD execute a Show/Set Attributes (lens) of the trail. The
dialog box is displayed in Figure 298.
not permitted without written authorization from Alcatel.
All rights reserved. Passing on and copying of this
document, use and communication of its contents
301=1354NN
A resource is assigned to the Qnn Agent when NAD value is 1354NN in display (numeric value 301 in filter)
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED 01 SC.5:OPERATION
334
10.2.3 Export of HO trails
SEQUENCE
b) From the selection box select option HO trail. Click on No Filter button. The HO trail list is displayed.
See Figure 299.
c) Select all trails and issue the command Actions: Nad: Change from the pull–down menu bar.
In the dialog box of Figure 269. select the icon dictionary. The NAD selection box opens.Select the
domain 1354NN and confirm by clicking on OK. Click again on OK of the dialog box.
e) You can verify the successful change of the NAD simply by observing the NAD attribute in the HO
trail list. See Figure 300. on page 327.
ED 01 SC.5:OPERATION
334
All rights reserved. Passing on and copying of this
document, use and communication of its contents
not permitted without written authorization from Alcatel.
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED
01
957.130.872 H
SC.5:OPERATION
Figure 300. HO trail: NAD change verify.
334
3AL 61259 AA AA
327 / 334
10.3 Export of resources on ISN interface for 1355VPN
10.3.1 Introduction
• Add operator
ED 01 SC.5:OPERATION
334
10.3.1.1 Adding a VPN initiator
SEQUENCE
not permitted without written authorization from Alcatel.
• two textlines: RM Initiator and Initiator Name where the ”Administrator” operator can digit the
RM Initiator ( integer ) and the Initiator Name (it must be unique in the file).
The Initiator Name is added to the possible values of the NAD attribute. The NAD attribute
is used to “mark” Network Resources (using the change NAD command) and to evaluate
Access Rules.
d) Enter the suitable RM Initiator and Initiator Name and select the rules to be associated. Click on
the Rule button. The list of the available rules opens. Each item of the list has a toggle button, i.e.
you can select many rules per each Initiator. The following rules can be selected:
ED 01 SC.5:OPERATION
334
10.3.1.2 Add Operator
SCOPE
SEQUENCE
– VPN Operator name. It is the same name which will be inserted by the VPN Administrator while
executing the VPN Handling procedure.
– Initiator: the Initiator Name previously specified at paragraph 10.3.1.1 on page 329.
e) A subsequent confirmation box containing all data relevant to the New Operator being created is
presented. If you press OK the Operator is created. This dialog box also contains the button Abort
to abort the procedure.
f) you can confirm the Operator creation by pressing button Add.
ED 01 SC.5:OPERATION
334
10.3.1.3 VPN assignment of the end points
SCOPE
All rights reserved. Passing on and copying of this
document, use and communication of its contents
The scope of this procedure is to assign the desired NAP to a certain NAD ( Initiator Name ), which
corresponds to a certain RM Operator, which in turn will correspond to a certain VPN.
CONDITIONS This assignment is required for all VPN types ( Standard / Enhanced / Restricted )
SEQUENCE
1) Select the NAP(s) from the Nap list and issue the command NAD (Network Assignment
Domain): Change.
2) In the Change NAD dialog box select the icon dictionary. The NAD selection box opens. Select
the domain corresponding to the previously specified NAD ( the Initiator Name mentioned at
paragraph10.3.1.1 and confirm by clicking on OK. Click again on OK of the dialog box.
SCOPE
The scope of this procedure is to assign the desired CTP to a certain NAD ( Initiator Name ), which
corresponds to a certain RM Operator, which in turn will correspond to a certain VPN. To do so, it is required
to change the NAD of the link connection toward the virtual node.
CONDITIONS This assignment can be executed for VPN types Standard and Enhanced
SEQUENCE
1) Select the link connection from the lc list and issue the command NAD (Network Assignment
Domain): Change.
2) In the Change NAD dialog box select the icon dictionary. The NAD selection box opens. Select
the domain corresponding to the previously specified NAD ( the Initiator Name mentioned at
paragraph 10.3.1.1 and confirm by clicking on OK. Click again on OK of the dialog box.
As a result of this operation, the boundary CTP is assigned to the above NAD.
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED 01 SC.5:OPERATION
334
10.3.1.5 VPN assignment of the bandwidth
The scope of this procedure is to assign the desired link connection to a certain NAD ( Initiator Name ),
which corresponds to a certain RM Operator, which in turn will correspond to a certain VPN.
CONDITIONS This assignment can be executed for all VPN types ( Standard / Enhanced /
Restricted )
SEQUENCE
1) Select the NAP(s) from the Nap list and issue the command NAD (Network Assignment
Domain): Change.
2) In the Change NAD dialog box select the icon dictionary. The NAD selection box opens. Select
the domain corresponding to the previously specified NAD ( the Initiator Name mentioned at
paragraph 11.2 and confirm by clicking on OK. Click again on OK of the dialog box.
SEQUENCE
1) Select the path(s) from the Path list and issue the command Actions: NAD (Network
Assignment Domain): Change.
2) In the Change NAD dialog box select the icon dictionary. The NAD selection box opens. Select
the domain corresponding to the previously specified NAD ( the Initiator Name mentioned at
paragraph 10.3.1.1 on page 329 and confirm by clicking on OK. Click again on OK of the dialog
box.
SEQUENCE
1) Select the path(s) from the Path list and issue the command Actions: NAD (Network
Assignment Domain): Change.
2) In the Change NAD dialog box select the icon dictionary. The NAD selection box opens. Select
the domain corresponding to the previously specified NAD ( the Initiator Name mentioned at
paragraph 11.2 and confirm by clicking on OK. Click again on OK of the dialog box.
The NAP and the boundary CTP are not assigned automatically: the operator must execute the
procedures described at paragraphs 10.3.1.3.1 and 10.3.1.4 on page 331.
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED 01 SC.5:OPERATION
334
INDEX
C P
not permitted without written authorization from Alcatel.
E
Q
ET, 24
Export, 297 Qnn Interface, 297
I R
L S
M
T
Map, 18
Measure, 239 Trail, 74
Multipath, 92
U
N
Upload, 81
NAP, 81
NE, 26
Operator, 283
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED 01 SC.5:OPERATION
334
1AA 00014 0004 (9007) A4 – ALICE 04.10
ED
01
957.130.872 H
SC.5:OPERATION
END OF DOCUMENT
334
3AL 61259 AA AA
334 / 334
All rights reserved. Passing on and copying of this
document, use and communication of its contents
not permitted without written authorization from Alcatel.