Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
V100R001C02
Configuration Guide
Issue 04
Date 2010-12-10
and other Huawei trademarks are trademarks of Huawei Technologies Co., Ltd.
All other trademarks and trade names mentioned in this document are the property of their respective holders.
Notice
The purchased products, services and features are stipulated by the contract made between Huawei and the
customer. All or part of the products, services and features described in this document may not be within the
purchase scope or the usage scope. Unless otherwise specified in the contract, all statements, information,
and recommendations in this document are provided "AS IS" without warranties, guarantees or representations
of any kind, either express or implied.
The information in this document is subject to change without notice. Every effort has been made in the
preparation of this document to ensure accuracy of the contents, but all statements, information, and
recommendations in this document do not constitute the warranty of any kind, express or implied.
Website: http://www.huawei.com
Email: support@huawei.com
Related Versions
The following table lists the product versions related to this document.
Intended Audience
This document describes the key functions of the equipment in terms of the basic information,
availability and configuration methods. A configuration example is used to illustrate each
function.
Symbol Conventions
The symbols that may be found in this document are defined as follows.
Symbol Description
Symbol Description
GUI Conventions
The GUI conventions that may be found in this document are defined as follows.
Convention Description
Change History
Updates between document versions are cumulative. Therefore, the latest document version
contains all updates made to previous versions.
Compared with the third release, the updated contents are as follows:
Compared with the second release, the updated contents are as follows:
Contents
2 Creating Network.......................................................................................................................2-1
2.1 Creating NEs...................................................................................................................................................2-3
2.1.1 Creating NEs in Batches........................................................................................................................2-3
2.1.2 Creating a Single NE..............................................................................................................................2-5
2.2 Creating an NE User.......................................................................................................................................2-6
2.3 Switching a Logged-In NM User....................................................................................................................2-7
2.4 Configuring NE Data......................................................................................................................................2-8
2.5 Adding Boards.................................................................................................................................................2-9
2.6 Creating Fibers for Equipment Manually......................................................................................................2-10
2.7 Creating Radio Links by Searching for the Radio Links..............................................................................2-10
2.8 Creating a Topology Submap........................................................................................................................2-11
2.9 Configuring Inband DCN..............................................................................................................................2-12
2.10 Configuring Clocks.....................................................................................................................................2-13
2.10.1 Setting the Frequency Selection Mode...............................................................................................2-14
2.10.2 Setting the PTP Clock........................................................................................................................2-15
2.10.3 Configuring the NE Clock Source.....................................................................................................2-15
2.10.4 Configuring the Clock Source Protection..........................................................................................2-16
2.10.5 Configuring Switching Conditions for Clock Sources.......................................................................2-16
2.10.6 Configuring the Clock Source Reversion...........................................................................................2-17
A Glossary.....................................................................................................................................A-1
A.1 0-9..................................................................................................................................................................A-2
A.2 A-E................................................................................................................................................................A-2
A.3 F-J................................................................................................................................................................A-11
A.4 K-O..............................................................................................................................................................A-16
A.5 P-T...............................................................................................................................................................A-22
A.6 U-Z..............................................................................................................................................................A-30
Figures
Tables
1 Getting Started
The following topices introduce some preparation operations that will ensure a smooth, trouble-
free launch of the U2000.
Background Information
l You are recommended to start the computer and the U2000 application in the following
sequence: Start the computer, start the U2000 server, and then start the U2000 client.
l You are recommended to shut down the U2000 application and the computer in the
following sequence: Exit the U2000 client, stop the U2000 server, and then shut down the
computer.
1.1.1 Starting the Computer
To avoid equipment damage or data loss, strictly follow the procedure provided, to start the
computer. The startup procedures of the workstation are different from that of a normal PC.
Perform the startup procedure according to the actual situation.
1.1.2 Starting the U2000 Server
For network management first start the U2000 server, and then start the U2000 server
application.
1.1.3 Viewing the U2000 Process Status
If the process status of the U2000 server is abnormal, the U2000 client may fail to be logged in
or may run abnormally. In this event, you can view the status of each process of the U2000 server
in the user interface of the System Monitor client.
1.1.4 Logging In to the U2000 Client
To manage networks through the U2000 client graphical user interface, you need to use the
U2000 client to log in to the U2000 server.
1.1.5 Exiting a U2000 Client
Before shutting down the U2000 server, you must exit the U2000 client.
1.1.6 Shutting Down the U2000 Server
When the U2000 server is managing the system normally, do not perform this operation. In
special circumstances, for example, when modifying the system time of the computer where the
U2000 resides, or when upgrading the version, you can use the System Monitor Client to shut
down the U2000 server.
1.1.7 Shutting Down the Computer
Normally, do not shut down the computer where the U2000 resides. In special situations, for
example, when the computer becomes faulty, shut down the computer in the correct sequence.
Prerequisite
l The U2000 must be installed successfully.
l The power cable of the workstation or the computer, the power cable of the monitor, data
line and Ethernet line must be connected correctly.
l If there is printer, modem or other peripherals, their power line and data line must be
connected correctly.
l If there is disk array, start the disk array first.
Background Information
The U2000 supports Windows, Solaris and SUSE Linux operating systems.
Procedure
l On Windows
1. Power on the display, printer, modem and other peripherals.
2. Power on the computer and the Windows is automatically started. The Login dialog
box is displayed.
3. Enter the Username and the Password in the Login dialog box.
4. Click OK to open the Windows user interface.
l On Solaris
NOTE
In the case of a distributed system, you need to start the master server, slave servers, and then slave
protection servers.
1. Power on the printer, modem and other peripherals.
2. Power on the workstation and the Solaris is automatically started. The Prompt dialog
box is displayed.
3. Enter the Username and the Password in the Login dialog box.
4. Click OK to open the Desktop Environment window.
l On SUSE Linux
NOTE
In the case of a distributed system, you need to start the master server, slave servers, and then slave
protection servers.
1. Power on the printer, modem and other peripherals.
2. Power on the workstation and the SUSE Linux is automatically started. The
Prompt dialog box is displayed.
3. Enter the Username and the Password in the Login dialog box.
4. Click OK to open the Desktop Environment window.
----End
Prerequisite
l The computer time must be set correctly.
l The computer where the U2000 is installed must be started correctly.
l The operating system of the U2000 server must be running correctly and the database must
be started normally.
l The U2000 license must be in the server directory.
l In the case of the distributed system, the slave server and slave protection server (optional)
must be started and the communication among the master server, slave server, and slave
protection server (optional) must be normal.
l In the case of the distributed system, the server of the network management system
maintenance suite on the U2000 server, including the master server, slave server, and slave
protection server (optional), must be started.
l The instance must be deployed.
Procedure
Step 2 In the Login dialog box, set the username (admin, by default)and the password(admin, by
default), and click Login.
NOTE
Periodically change the password and memorize it.
----End
Procedure
Step 1 Start and log in to the System Monitor.
Step 2 In the user interface of the System Monitor, click the Process tab, and view whether the status
of each process is Running.
NOTE
When the Sybase database is used and the number of CPUs configured for the U2000 server exceeds eight,
the database management tool automatically increases the number of engines configured for the Sybase
database to enhance the performance of the Sybase database. The number of CPUs configured for the
Sybase database is increased according to the principle of 1/4 of total number of CPUs (the value down
to a nearest integer). For example, if the number of CPUs is 9, the database management tool automatically
configures two engines for the Sybase database. In this case, the System Monitor of the U2000 displays
two database processes.
l If the process status is Stopped, right-click on the process, and choose Start Process from
the shortcut menu. In this way, the status of the process is Running.
l If the manual startup fails, it indicates that the process is abnormal.
l To save resources, you can close unwanted processes. Set the startup mode of the desired
process to Manual, and then select Stop Process.
----End
Prerequisite
The U2000 server must be started correctly.
Procedure
Step 1 Double-click U2000 Client shortcut icon.
Step 2 In the Login dialog box, set the username (admin, by default) and the password(admin, by
default), and click Login.
NOTE
If you log in to the System Monitor for the first time, the system prompts you to change the password of
the admin user. If you have changed the password in an earlier login operation, you need to use the new
password to log in.
----End
Prerequisite
The U2000 client must be started normally.
Procedure
Step 1 Choose File > Exit from the Main Menu.
----End
Prerequisite
All the U2000 clients connected to the U2000 server must be shut down.
Procedure
Step 1 From the Main Menu of System Monitor Client, choose System > Stop Server to close all
processes of the U2000 server.
Step 2 Click OK in the confirmation dialog box. Wait until the U2000 core process, and the processes
that are optional according to the actual situation are in the Stopped state. Now the U2000 server
is shut down successfully.
Now you cannot shut down the MDP process or initialize the database.
----End
Follow-up Procedure
Viewing the U2000 Process Status, and make sure the U2000 server is shutdown successfully.
Prerequisite
The U2000 server and client applications must be stopped.
Background Information
CAUTION
To avoid equipment damages or data loss, perform the following step one by one to shut down
the workstation.
Procedure
l On Windows platform
1. Choose Start > Shut down from the Windows desktop.
2. Choose Shut down and click OK in the dialog box.
The computer shuts down automatically.
3. Turn off the monitor and the peripheral equipment.
l On Solaris platform
1. Enter the following commands in the terminal window:
% su root
Password: Password_of_user_root
# sync;sync;sync;sync;sync
# shutdown -y -g0 -i5
NOTE
To restart the Sun workstation, the last command is # shutdown -y -g0 -i6.
The workstation shuts down automatically.
2. Turn off the monitor and the peripheral equipment.
l On SUSE Linux platform
1. Enter the following commands in the terminal window:
% su root
Password: Password_of_user_root
# sync;sync;sync;sync;sync
# shutdown -y -g0 -i5
NOTE
To restart the Sun workstation, the last command is # shutdown -y -g0 -i6.
The workstation shuts down automatically.
2. Turn off the monitor and the peripheral equipment.
----End
Prerequisite
You must be a Network Management (NM) user with "NE and network monitor" authority or
higher.
Procedure
l To open the Main Topology, log in to the U2000 client.
l Choose Window > Main Topology from the Main Menu.
----End
Prerequisite
You must be an NM user with "NE and network monitor" authority or higher.
Background Information
You can open a maximum of five NE Explorer windows at the same time.
Procedure
l Right-click an NE on the Main Topology and choose NE Explorer from the shortcut menu.
NOTE
If the NE belongs to a certain subnet, you need to double-click the subnet icon and enter the subnet
where the NE is located.
----End
2 Creating Network
NEs and fibers or cables can be managed on the U2000 only after their topologies are created.
By searching for a radio link, the NMS can obtain the information about the radio link to which
the specified IF interface is connected, and thus can create the radio link quickly. Generally, the
search-and-create method is used to create radio links.
2.8 Creating a Topology Submap
The submap created here is based on a topological concept to facilitate management. In the case
of topology objects in the same network area or with similar attributes, you can allocate them
in one topology submap.
2.9 Configuring Inband DCN
The inband DCN refers to a DCN solution in which the service channels provided by the managed
equipment are used to complete the network equipment management. When inband DCN is
applied, the U2000 information is transported through service channels of the equipment. When
the inband DCN is used for networking, no exclusive DCN channels are required. Hence, much
network construction cost is saved.
2.10 Configuring Clocks
The stable clock is the basis to normal functioning of an NE. You must configure clocks for all
NEs prior to configuring services. In addition, you need to configure clock protection for
complex networks.
2.11 Configuring Linear MSP
In a chain network, you can configure a linear multiplex section protection (MSP) to protect
services in the link.
Prerequisite
You must be an NM user with "NE administrator" authority or higher.
The U2000 must communicate properly with the GNE.
The NE Explorer instance of the NEs must be created.
Procedure
Step 1 Choose File > Discovery > NE... from the Main Menu. The Auto Discovery window is
displayed.
Step 2 Click the Transport NE Search tab.
Step 3 Click Add and the Input Search Domain dialog box is displayed.
Step 4 Set Address type to IP Address Range of GNE, IP Address of GNE, or NSAP Address, and
enter Search Address, User Name, and Password. Then, click OK.
NOTE
You can repeat Steps 3 through 4 to add more search domains. You can delete the system default search
domain.
l If you use IP address to search for NEs:
l Usually, the broadcast function is disabled on the routers on a network, to avoid network broadcast
storm. Therefore, by using the IP Address Range of GNE method, only the NEs in the same
network segment can be searched out.
l To search the network segments across routers, the IP Address of GNE method is recommended.
Through a gateway NE, you can search out the NEs in the network segment of the gateway NE.
NOTE
You can select all options in the Search for NE area to search for NEs, create NEs, and upload the NE
data at a time.
Step 7 Optional: If you select Search for NE only, you can select the NEs, which are not yet created,
in the Result list after the search for NEs is complete. Click Create and then the Create dialog
box is displayed. Enter User Name and Password in the Create dialog box, and then click
OK.
Step 8 Optional: Click Change NE ID. Then, the Change NE ID dialog box is displayed. Users can
check against the Bar Code List by the value of Bar Code, and then modify the NE Name,
Extend NE ID, Base NE ID, and IP Address fields accordingly.
NOTE
The Bar Code List is provided by the hardware installation personnel to the software commissioning personnel.
The list contains the bar codes of stations.
----End
Follow-up Procedure
After an NE is created, if you fail to log in to the NE, possible causes are listed as follows:
l The password for the NE user is incorrect. Enter the correct password for the NE user.
l The NE user is invalid or the NE user is already logged in. Change to use a valid NE user.
Prerequisite
You must be an NM user with "NE operator" authority or higher.
The license must be installed and the license must support creating the NE of the type.
Background Information
First create a GNE, and then create a non-gateway NE.
If the NE is not created properly or the communication between the NE and the U2000 is
abnormal, the NE is displayed in gray color.
Procedure
Step 1 Choose File > Create > Device... from the Main Menu. The Add Object dialog box is displayed.
Step 3 Complete the following information: ID, Extended ID, Name and Remarks.
Step 4 To create a GNE, proceed to Step 5. To create a non-gateway NE, proceed to Step 6.
Step 5 Select Gateway from the Gateway Type drop-down list and set the IP address.
Step 6 Select Non-Gateway from the Gateway Type drop-down list. Select the GNE to which the NE
is associated to from the Affiliated Gateway drop-down list.
----End
Result
After an NE is successfully created, the system automatically saves the information, such as the
IP address, subnet mask, and NE ID to the U2000 database.
Follow-up Procedure
After an NE is created, if you fail to log in to the NE, possible causes are listed as follows:
l The communication between the U2000 and the NE is abnormal. Check the settings of
communication parameters, such as the IP address of the NE and NE ID.
l The password for the NE user is incorrect. Enter the correct password for the NE user.
l The NE user is invalid or the NE user is already logged in. Change to use a valid NE user.
Prerequisite
l You must be an NM user with "NE and network administrator" authority or higher.
l The NE must be successfully created.
Background Information
The default NE user has the system level authority. To guarantee NE data security, it is
recommended that you assign NE users with different authorities as required.
Procedure
Step 1 Choose Administration > NE Security Management > NE User Management from the Main
Menu.
Step 6 In the NE User Flag field, select a user type according to the type of the terminal through which
the user logs in to the NE.
Step 7 Enter the password in the New Password field and enter it again in the Confirm Password
field.
Step 8 In the NE Name field, select the NEs that this NE user is allowed to manage.
Step 10 Optional: In the Detailed Description field, enter more information about the NE user as
required.
----End
Prerequisite
You have already logged in to the U2000.
Procedure
Step 1 Choose File > Log out from the Main Menu. The Confirm dialog box is displayed. Click
OK.
Step 2 The Save Coordinates dialog box is displayed. Click OK.
NOTE
This step is to executed when the view deploy is changed.
Step 3 Enter the user name and password in the Login dialog box.
----End
Prerequisite
l You must be an NM user with "NE operator" authority or higher.
l The NE must be created successfully.
Background Information
In the case of NE data copy, copy the configured NE data to the unconfigured NE so that the
NE enters the configuration status. Then, you can manage the configuration of the NE by using
the NMS. In the case of data upload, upload the user-side NE data to the NMS so that you can
manage the configuration of the NE by using the NMS.
Procedure
l To copy the NE data, do as follows:
NOTE
The NE type, NE software version and hardware configuration of the source NE must be consistent
with those of the copied NE.
Prerequisite
l You must be an NM user with "NE operator" authority or higher.
l The NE must be created.
l There must be idle slot on the NE Panel.
Background Information
The physical boards are the actual boards inserted in the subrack. A logical board refers to a
board that is created on the U2000. After a logical board is created, you can configure the relevant
services. If the corresponding physical board is online, the configured services can be available.
Procedure
Step 1 Right-click the selected idle slot. Select the board you want to add from the drop-down list.
----End
Prerequisite
l You must be an NM user with "NE maintainer" authority or higher.
l The boards to be connected with fibers or cables must be created.
l You must create a REG before creating a fiber that passes the REG.
l The dynamic port must be created.
Procedure
Step 1 Choose File > Create > Link... from the Main Menu. The Add Object dialog box is displayed.
Step 3 Click the button in Source NE. Select the source board and port in the Select Fiber/Cable
Source dialog box.
Step 4 Click OK and the cursor changes to a + sign.
Step 5 Click the sink NE of the fiber or cable on the Main Topology.
Step 6 Click the button in Sink NE. Select the sink board and port in the Select Fiber/Cable Sink
dialog box.
TIP
When selecting a wrong source or sink NE, right-click and click OK in the Coordinate Selection dialog
box to exit.
Step 7 Click OK. Enter the information of the fiber or cable in the Add Object dialog box.
Step 8 Click OK. The created fiber or cable appears between the source and sink NEs on the Main
Topology.
Step 9 Select the fiber you create, right-click and choose Detect Link from the shortcut menu.
The Operation Result dialog box is displayed indicating the fiber connection information.
----End
Prerequisite
l You must be an NM user with "NE maintainer" authority or higher.
l The IF board for each NE must be created on the U2000.
Background Information
The radio frequency wireless signals within the frequency range of 300 MHz to 300 GHz are
called radio signals. The links that transmit radio signals are called radio links.
Procedure
Step 1 Choose File > Discovery > Fiber from the Main Menu.
Step 2 In the left-hand pane, select IF interfaces for one or multiple radio NEs. Click Search. A progress
bar is displayed.
NOTE
l If you check the Do not search for ports with fiber/cable created on NMS check box, the system
does not search for the ports at which radio links are already created.
l If you need to check consistency between the created radio links and the actual radio links, do not check
this check box.
l If you check this check box and if all the selected ports radio links are created, a dialog box is displayed
after the search is complete, telling that the search domain is empty.
Step 3 After the search is complete, a dialog box is displayed, telling that the operation was successful.
Click Close.
Step 4 In Physical Fiber/Cable Link List, select one or multiple radio links, and then click Create
Fiber/Cable.
NOTE
l When you select one or multiple radio links in Physical Fiber/Cable Link List, the radio links that
conflict with the selected ones are automatically displayed in Logical Fiber/Cable Link List. In this
case, see Step 5 to delete the conflicting links before creating new radio links.
l During the creation of radio links, if the selected ones are all in the Already created state, the system
prompts No fiber to create.
Step 5 In Logical Fiber/Cable Link List, select one or multiple conflicting radio links (the Conflict
with logical link value of which in the Misconnected Fiber list is displayed as Yes), Click
Delete Fiber/Cable.
----End
Subsequent Handling
When the information about the radio link that is created through search is incomplete, you can
supplement the information about the radio link by modifying the fiber/cable information.
Prerequisite
You must be an NM user with "NM operator" authority or higher.
Background Information
A topology submap is created only to simplify the user interface and has no impact on the NEs.
Procedure
Step 1 Choose View > Create > Subnet... from the Main Menu.
Step 2 Click the Properties tab in the Add Object dialog box. Enter the attributes of the subnet.
Step 3 Click the Select Object tab. Select the created NEs or subnet from the Available Objects pane.
Click .
NOTE
Step 4 Click OK. Click in the blank space of the Main Topology, the icon appears in the position
where you clicked.
----End
the inband DCN is used for networking, no exclusive DCN channels are required. Hence, much
network construction cost is saved.
Background Information
The RTN equipment can distinguish service channels and network management channels
according to the MPLS labels or VLAN IDs. See Configuring an Inband DCN to configure
inband DCN in Feature Description.
The NE obtains their quality information automatically for clock sources that are allocated to
an NE. You should define the quality level of clock sources only during test and maintenance.
2.10.9 Configuring the SSM Output
If the standard SSM or extended SSM protocol is enabled, the clock signals carry SSM messages
automatically. You can prevent clock sources from sending SSM messages to other clock
subnets. This helps you to ensure that the equipment of different clock subnets do not affect each
other at the edge of clock networks.
2.10.10 Viewing the Clock Trace Search
Correct clock trace relations are critical to ensure the clock synchronization within the entire
network. Using the U2000, you can monitor the clock trace status of each NE.
2.10.11 Switching a Clock Source
When the traceable clock source in a network deteriorates, NEs may not be able to execute a
switch on the clock source. You need to manually switch the clock source to prevent clock
deterioration from affecting the normal running of NEs.
Prerequisite
You must be an NM user with "NE operator" authority or higher.
Procedure
Step 1 In NE Explorer, choose Configuration > Clock > Frequency Selection Mode from the
Function Tree.
Step 2 In Select Frequency Source Mode, you can select one of the clock synchronization mode.
CAUTION
l When the external time interface is set to the external time input interface, the NE can run
in only the physical synchronization mode. That is, the frequency selection mode of the
equipment that accesses the external clock must be set to the physical synchronization mode.
l When the NE is running in the PTP synchronization mode, the external interface cannot be
set to the external time input interface.
l The IF board only support the physical synchronization mode.
----End
Background Information
For details of configuring the PTP clock , refer to PTP Clock in the Feature Description.
Prerequisite
You must be an NM user with "NE operator" authority or higher.
Background Information
To implement clock protection, you must configure at least two traceable clock sources for the
equipment. Usually, the tributary clock is not used as the clock source for the equipment.
After you set the clock sources for all the NEs, query the networkwide clock trace status again.
Procedure
Step 1 In the NE Explorer, select an NE and choose Configuration > Clock > Physical Clock > Clock
Source Priority from the Function Tree.
Step 3 Click Create. In the Add Clock Source dialog box, select a new clock source and click OK.
Step 4 Optional: If an external clock source is selected, select External Clock Source Mode according
to the type of external clock signals. For 2 Mbit/s clocks, specify the Synchronous Status
Byte to deliver SSM message.
Step 5 Select a clock source, and click or to adjust its priority level. The clock
sources are arranged in the descending order. The clock source on top is the preferred one for
the NE.
NOTE
Internal clock sources have the lowest priority because of their low precision.
Step 6 Click Apply. In the Operation Result dialog box, click Close.
NOTE
If the clock trace relation changes because of the clock source change, the Prompt dialog box is displayed,
asking you whether to refresh the clock trace relation. Usually you can click OK. If you select Disable
Prompting Next Time, the Prompt dialog box is not displayed even when the clock trace relation changes.
----End
Prerequisite
You must be an NM user with "NE operator" authority or higher.
Procedure
Step 1 In the NE Explorer, select an NE and choose Configuration > Clock > Physical Clock > Clock
Subnet Configuration from the Function Tree.
Step 2 Click the Clock Subnet tab. Click Query to query the existing parameter settings.
Step 3 Select Start Standard SSM Protocol or Start Extended SSM Protocol.
NOTE
The same SSM protection protocol must be used within the same clock protection subnet.
Step 4 Set the subnet number of the clock subnet to which the NE is associated.
NOTE
Allocate the same subnet number to NEs tracing the same clock source.
Step 5 Optional: If the extended SSM protocol starts, set the clock ID of the clock source.
Step 6 Click Apply. In the Operation Result dialog box, click Close.
Step 7 Optional: If the clock ID is specified for the line clock of an NE, click the Clock ID Status tab,
and set the Enabled Status to Enabled. Click Apply. In the Operation Result dialog box, click
Close.
----End
Prerequisite
You must be an NM user with "NE operator" authority or higher.
Procedure
Step 1 In the NE Explorer, select an NE and choose Configuration > Clock > Physical Clock > Clock
Source Switching from the Function Tree. Click the Clock Source Switching Condition tab.
Step 2 Click Query to query the existing parameter settings.
Step 3 Double-click the parameter column and set the alarms and performance events that are to be
used as the clock source switching conditions to Yes.
Step 4 Click Apply. In the Operation Result dialog box, click Close.
----End
Prerequisite
You must be an NM user with "NE operator" authority or higher.
Procedure
Step 1 In the NE Explorer, select an NE and choose Configuration > Clock > Physical Clock > Clock
Source Switching from the Function Tree. Click the Clock Source Reversion Parameter tab.
Step 2 Double-click and set the reversion mode and the WTR time.
NOTE
Do not set Clock Source WTR Time(min) to 0 to avoid repeated switching when the clock is unstable.
Step 3 Click Apply. In the Operation Result dialog box, click Close.
----End
Prerequisite
You must be an NM user with "NE operator" authority or higher.
Procedure
Step 1 In the NE Explorer, select an NE and choose Configuration > Clock > Physical Clock > Phase-
Locked Source Output by External Clock from the Function Tree.
Step 2 Click Query to query the existing parameter settings.
Step 3 Set the external clock attributes of the 2M phase-locked source. Set the parameters manually
such as External Clock Output Mode, External Clock Output Timeslot and so on.
Step 4 Click Apply.
----End
Example
As shown in Figure 2-1, n NEs comprise a long transmission chain and the external BITS1
equipment is used as the clock synchronization source. After the transmission over several NEs,
the BITS1 clock signals are degraded to a certain degree. In this case, you can output the BITS1
signals from NEm that requires clock quality compensation to the local BITS2 equipment for
compensating the signals. Then, after the compensation, the clock signals are transmitted from
the BITS2 equipment to NEm, to function as the clock synchronization source of the downstream
equipment. The 2M phase-locked source of NEm should be the input clock source of the west
line board, and the clock synchronization source should be the BITS2 PRC input externally.
To make sure that the BITS2 equipment receives clock signals from NEm correctly, you need
to set the output external clock of NEm. Perform the settings according to parameters of the
BITS2 equipment and make sure that the settings on NEm are consistent with the settings on
the BITS2 equipment.
Prerequisite
You must be an NM user with "NE operator" authority or higher.
Procedure
Step 1 In the NE Explorer, select an NE and choose Configuration > Clock > Physical Clock > Clock
Subnet Configuration from the Function Tree. Click the Clock Quality tab.
Step 3 Click the Clock Source Quality tab and set Configuration Quality to a desired level.
NOTE
Step 4 Click Apply. In the Operation Result dialog box, click Close.
Step 5 If the quality level of a clock source is zero, you can specify the level manually. Click the Manual
Setting of 0 Quality Level tab and set Manual Setting of 0 Quality Level to a desired level.
Step 6 Click Apply. In the Operation Result dialog box, click Close.
----End
Prerequisite
You must be an NM user with "NE operator" authority or higher.
Procedure
Step 1 In the NE Explorer, select an NE and choose Configuration > Clock > Physical Clock > Clock
Subnet Configuration from the Function Tree. Click the SSM Output Control tab.
Step 3 Click Apply. In the Operation Result dialog box, click Close.
----End
Prerequisite
You must be an NM user with "NE operator" authority or higher.
Procedure
Step 1 In the left-hand pane of the Clock View, select the subnet or NE to be queried and click
. In the right-hand pane, right-click in the blank space and choose Clock Trace
Search from the shortcut menu.
NOTE
You can also select one of the selected NEs to query the clock trace relation of the NE. That is, in the right-
hand pane, select one or more NEs from the selected NEs, right-click, and then choose Clock Trace
Search from the shortcut menu.
Step 3 If the clock trace relation changes, the Prompt dialog box is displayed, asking you whether to
refresh the clock trace relation. Click Yes. When the search for the clock trace relation is
complete, the Clock View displays the refreshed clock trace status.
NOTE
If you right-click in the Clock View and choose Disable Clock Status Change Prompting from the
shortcut menu, the Prompt dialog box is not displayed even when the clock trace relation changes.
Step 4 In the Clock View, right-click and choose Query Networkwide Clock Synchronization
Status from the shortcut menu, to refresh the clock tracing relation.
----End
Prerequisite
l You must be an NM user with "NE operator" authority or higher.
l The clock source has been created.
Background Information
CAUTION
Performing clock source switching may cause signal jitter and bit errors.
Procedure
Step 1 In the NE Explorer, select an NE and choose Configuration > Clock > Physical Clock > Clock
Source Switching from the Function Tree. Click the Clock Source Switching tab.
Step 2 Click Query to query the current switching status of a clock source.
Step 3 Optional: If the Lock Status is Lock, right-click and choose Release Lockout.
Step 4 Right-click the clock source that you want to switch and choose a switching operation.
NOTE
Before switching the clock source, make sure that the new clock source that is not locked and that is of a
good quality is created in the priority table.
Step 5 Optional: To restore the automatic clock source selection mode, right-click the switched clock
source and choose Clear Switching.
----End
Implementation Principle
Linear multiplex section protection (MSP) includes 1+1 linear MSP and 1:1 linear MSP, which
use the protection channel to protect services transmitted in the working channel. When a fault
of the working channel occurs, services are switched to the protection channel. The linear MSP
applies to POS interface and structured STM-N interface.
The APS protocol of the MSP is transmitted by using the protection channel, and the two NEs
at the two ends of an MS transmit the protocol status and switching status to each other. The
NEs perform a switching of services according to the protocol status and switching status.
NOTE
In the case of the linear MSP, do not configure any extra service on the protection path.
Prerequisite
You must be an NM user with "NE operator" authority or higher.
Procedure
Step 1 In the NE Explorer, select an NE and choose Configuration > Linear MS from the Function
Tree.
Step 2 Click Create. The Create a Linear Multiplex Section dialog box is displayed.
Step 3 Set parameters, such as Protection Type, Switching Mode and Revertive Mode for the newly
created linear MSP.
----End
For the RTN equipment, the configurable QoS polices include the port policy, V-UNI ingress
policy, ATM policy, scheduling policy and discarding policy.
Background Information
For details on how to configure the port policy, refer to Creating the Port Policy in the Feature
Description.
For details on how to configure the V-UNI ingress policy, refer to Creating the V-UNI Ingress
Policy in the Feature Description.
For details on how to configure the ATM policy, refer to Creating the ATM Policy in the Feature
Description.
For details on how to configure the WFQ scheduling policy, refer to Creating the WFQ
Scheduling Policy in the Feature Description.
4 Configuring Interfaces
This section describes how to set the interface attributes of the boards. In the case of the RTN
equipment, the attributes of SDH interfaces, PDH interfaces, Ethernet interfaces, Serial
interfaces and MP Group can be set.
Context
The settings of the interface attributes of an interface depends on the application scenario. For
details, refer to Table 4-1.
Ethe Layer Mix Non Ethernet The interface works as an NNI interface to access
rnet e board L2VPN services. If a VLAN sub-interface is
inter created, the interface can carry tunnels.
face
Layer 2 Phys Ethernet l When the encapsulation type is null or
attributes/ ical board 802.1Q, the interface works as a UNI
Null, port interface to access Ethernet services.
802.1Q, l When the encapsulation type is QinQ, the
QinQ interface works as an NNI interface to access
Ethernet services.
Layer 3 Phys Ethernet When the port mode is Layer 3 and the IP address
attributes/ ical board is set for the interface, the interface works as an
802.1Q port NNI interface to carry tunnels.
Seria Layer 2 Logi Channelize The serial interfaces at the 64K timeslot level are
l attributes/ cal d STM-1 created and bound as an IMA group, which
inter ATM port board or works as an UNI interface to access ATM IMA
face E1 board services.
Layer 3 Logi Channelize The serial interfaces at the VC-12 level are
attributes/ cal d STM-1 created. When the PPP protocol is enabled,
PPP port board multiple serial interfaces are added to an MP
group, which works as an NNI interface to carry
tunnels.
settings of the interface attributes. The attributes of the Ethernet interface include the general
attributes, Layer 2 attributes, Layer 3 attributes, advanced attributes and flow control.
4.4 Configuring Serial Interfaces
This topic describes how to set the attributes of serial interfaces. Currently, serial interfaces
have two levels, which are VC12 level and 64 kbit/s timeslot level. If you create a serial interface
at the VC12 level, you can use a certain E1 timeslot in a channelized STM-1 frame to carry
tunnels. If you create a serial interface at the 64 kbit/s timeslot level, you can bind certain
timeslots in an E1 frame to a path. Timeslots 0 and 16 in the E1 frame are used to transmit control
words, signaling, and other information. You can bind 10 timeslots to form an ATM path to
transmit ATM services or bind five timeslots to form a CES path to transmit CES services. In
this way, an E1 signal can carry both CES and ATM services.
4.5 Configuring Microwave Interfaces
This section describes how to configure the IF 1+1 protection of the IF board, the IF/ODU
information of the radio link, microwave interface attributes, and ODU interface parameters.
4.6 Configuring ML-PPP
This section describes how to configure Multilink PPP (MP) group. MP is a technology used to
bind multiple PPP links to increase the bandwidth. MP is applied to the interface that supports
PPP. MP supports fragmented packets. The fragmented packets are transmitted on multiple PPP
links in the MP group to the same destination.
4.7 Configuring Ethernet Link Aggregation Group
The link aggregation makes the output and input load shared by the members of an LAG to
increase the bandwidth. In the meantime, the members of the LAG can dynamically back up
each other to enhance the connection reliability.
4.8 Configuring the IMA
The inverse multiplexing for ATM (IMA) technology is used to break up the stream of ATM
cells and transport them over multiple lower-rate links, and to reconstruct these lower-rate links
at the destination to recover the stream of ATM cells. In this way, the multiple lower-rate links
are multiplexed in a flexible and convenient manner.
4.9 Parameter Description
This section describes the parameters related to the interface configuration.
Background Information
The attributes vary with the application scenarios of SDH interfaces. Table 4-2 lists the
application scenarios.
Prerequisite
You must be an NM user with "NE operator" authority or higher.
Procedure
Step 1 In the NE Explorer, select an NE and choose Configuration > Interface Management > SDH
Interface from the Function Tree.
Step 3 Set the parameters as required.For details on the parameters for general attributes of an SDH
interface, see Table 4-7.
Step 4 Click Apply. The Operation Result dialog box is displayed indicating that the operation is
successful.
----End
Prerequisite
You must be an NM user with "NE operator" authority or higher.
Procedure
Step 1 In the NE Explorer, select an NE and choose Configuration > Interface Management > SDH
Interface from the Function Tree.
Step 3 Select the board to be configured and set the parameters as required. For details on the parameters
for advanced attributes of the SDH interface, see Table 4-8.
Step 4 Click Apply. The Operation Result dialog box is displayed indicating that the operation is
successful.
----End
Prerequisite
You must be an NM user with "NE operator" authority or higher.
You must set the frame format and frame mode before you configure a service. You cannot
change the frame format and frame mode of a port that is already configured with services.
Procedure
Step 1 In the NE Explorer, select a board and choose Configuration > Interface Management > Path
Configuration from the Function Tree.
Step 4 Click Apply. The Operation Result dialog box is displayed indicating that the operation is
successful.
----End
Background Information
The application scenario of a PDH interface depends on the setting of the interface attributes.
For details, refer to Table 4-3.
NOTE
When the E1 interface is used to carry the CES service, set the general attributes and an advanced attribute, that
is, frame format, to ensure that the frame format is the same as the service encapsulation format. When the
emulation mode of a CES service is CESoPSN, it is recommended that you set the frame format at the interface
to CRC-4 multiframe. When the emulation mode of a CES service is SAToP, the frame format at the interface
should be set to non-framing.
When the E1 interface is used to carry the ATM service, the Layer 2 attributes should be set. In addition, the
IMA group should be created. When setting the layer 2 attributes of the E1 interface, set Port Mode to Layer
2 in 4.2.1 Setting General Attributes of PDH Interfaces.
When the E1 interface is used to carry the tunnels, the Layer 3 attributes should be set. In addition, create the
ML-PPP group, and configure the interface as an ML-PPP member.
Before you run PPP on a PDH interface, you need to set the layer 3 attributes of the PDH interface.
The layer 3 attributes of a PDH interface define the related attributes of the network layer.
4.2.3 Setting the Advanced Attributes of PDH Interfaces
The advanced attributes of PDH interfaces include frame format, line encoding format and
loopback mode.
Prerequisite
You must be an NM user with "NE operator" authority or higher.
Procedure
Step 1 In the NE Explorer, select an NE and choose Configuration > Interface Management > PDH
Interface from the Function Tree.
Step 2 Select the desired board.
Step 3 Set the parameters as required. For details on the parameters for general attributes of the PDH
interface, see Table 4-9.
NOTE
Step 4 Click Apply. The Operation Result dialog box is displayed indicating that the operation is
successful.
Step 5 Click Close.
----End
Prerequisite
l You must be an NM user with "NE operator" authority or higher.
l In General Attributes, Port Mode must be set to Layer 3.
l In General Attributes, Encapsulation Type must be set to PPP.
Procedure
Step 1 In the NE Explorer, select an NE and choose Configuration > Interface Management > PDH
Interface from the Function Tree.
Step 3 Select the desired board and set the parameters as required. For details on the parameters for
layer 3 attributes of the PDH interface, see Table 4-10.
Step 4 Click Apply. The Operation Result dialog box is displayed indicating that the operation is
successful.
----End
Prerequisite
You must be an NM user with "NE operator" authority or higher.
Procedure
Step 1 In the NE Explorer, click an NE and choose Configuration > Interface Management > PDH
Interface from the Function Tree.
Step 3 Select the board to be configured and set the parameters as required. For details on the parameters
for advanced attributes of the PDH interface, see Table 4-11.
NOTE
In the case of the OptiX RTN 950, Frame Mode of the packets at the PDH interface can be set to 30 or
31. In hybrid networking, make sure that the frame modes of the local port and opposite port should be the
same.
l 30: In the E1 frame format, timeslots 1-15 and 17-31 are used to transport service data.
l 31: In the E1 frame format, timeslots 1-31 are used to transport service data.
Step 4 Click Apply. The Operation Result dialog box is displayed indicating that the operation is
successful.
Step 5 Click Close.
----End
Background Information
The application scenario of an Ethernet interface depends on the setting of the interface attributes.
For details, refer to Table 4-4.
NOTE
When the Ethernet interface is used to carry the QinQ Link, the configuration procedure is similar to the
configuration procedure when the Ethernet interface is used to carry the Ethernet service. In this case, however,
the encapsulation types are different. For details, see 4.3.2 Setting the Layer 2 Attributes of Ethernet
Interfaces.
Start Start
End End
Required
Optional
The routine maintenance parameters can be set through setting the advanced attributes of
Ethernet interfaces.
4.3.5 Configuring Flow Control
In the case that the flow control function is enabled, if congestion occurs on the link, the Ethernet
interface sends a PAUSE frame to the opposite end, and then the opposite end stops transmitting
Ethernet packets. As a result, congestion is avoided.
4.3.6 Creating VLAN Sub Interface
A VLAN tag can be stuck onto the services at a VLAN sub-interface so that the services can
traverse a third-party Layer 2 network.
Prerequisite
You must be an NM user with "NE operator" authority or higher.
Procedure
Step 1 In the NE Explorer, select an NE and choose Configuration > Interface Management >
Ethernet Interface from the Function Tree.
Step 2 Click the General Attributes tab.
Step 3 Select the desired board and set the parameters as required. For details on the parameters for
general attributes of the Ethernet interface, seeTable 4-12.
NOTE
l When Port Mode is set to Layer 2, the Encapsulation Type support Null, 802.1Q and QinQ.
l When Port Mode is set to Layer 3, the Encapsulation Type support 802.1Q, and then the interface
can be used by tunnel.
l To create a VLAN sub-interface, set the port mode to Layer Mix.
l Before changing Layer Mix to Layer 3, make sure that no VLAN tag is added to the port and no Layer
2 service is configured on the port.
l In the case an NNI interface,Max Data Packet Size(byte) must be larger than 960. A DCN packet
contains a maximum of 960 bytes. If Max Data Packet Size(byte) is smaller than 960, the DCN packets
in the receive direction may be lost.
Step 4 Click Apply. The Operation Result dialog box is displayed indicating that the operation is
successful.
Step 5 Click Close.
----End
Prerequisite
l You must be an NM user with "NE operator" authority or higher.
l In General Attributes, Port Mode must be set to Layer 2.
Procedure
Step 1 In the NE Explorer, select an NE and choose Configuration > Interface Management >
Ethernet Interface from the Function Tree.
Step 3 Select the desired board and set the parameters as required. For details on the parameters for
layer 2 attributes of the Ethernet interface, seeTable 4-13.
NOTE
Step 4 Click Apply. Click OK, The Operation Result dialog box is displayed indicating that the
operation is successful.
----End
Prerequisite
l You must be an NM user with "NE operator" authority or higher.
l In General Attributes, Port Mode must be set to Layer 3.
Procedure
Step 1 In the NE Explorer, select an NE and choose Configuration > Interface Management >
Ethernet Interface from the Function Tree.
Step 3 Select the desired board and set the parameters as required. For details on the parameters for
layer 3 attributes of the Ethernet interface, see Table 4-14.
NOTE
Step 4 Click Apply. The Operation Result dialog box is displayed indicating that the operation is
successful.
Step 5 Click Close.
----End
Prerequisite
You must be an NM user with "NE operator" authority or higher.
Procedure
Step 1 In the NE Explorer, click an NE and choose Configuration > Interface Management >
Ethernet Interface from the Function Tree.
Step 2 Click the Advanced Attributes tab.
Step 3 Select the board to be configured and set the parameters as required. For details on the parameters
for advanced attributes of the Ethernet interface, see Table 4-15.
Step 4 Click Apply. The Operation Result dialog box is displayed indicating that the operation is
successful.
Step 5 Click Close.
----End
Prerequisite
You must be an NM user with "NE operator" authority or higher.
Procedure
Step 1 In the NE Explorer, select an NE and choose Configuration > Interface Management >
Ethernet Interface from the Function Tree.
Step 2 Click the Flow Control tab.
Step 3 Select the desired board and set the parameters as required. For details on the parameters for
flow control, see Table 4-16.
Step 4 Click Apply. The Operation Result dialog box is displayed indicating that the operation is
successful.
Step 5 Click Close.
----End
Prerequisite
You must be an NM user with "NE operator" authority or higher.
Port mode must be set to Layer mix.
Context
A VLAN sub-interface is similar to a Layer 3 port. Hence, a tunnel can be created to carry
services by setting the Layer 3 attributes of the VLAN sub-interface. The OptiX RTN equipment
on the access layer accesses multiple services and maps the services into the tunnel. At the VLAN
sub-interfaces, different VLAN tags can be stuck onto the services according to the configuration
requirements of the third-party Layer 2 network. In this manner, the services can be correctly
forwarded when traversing a third-party network. The OptiX RTN equipment on the
convergence layer distinguishes the services according to the VLAN sub-interfaces.
Procedure
Step 1 In the NE Explorer, select an NE and choose Configuration > Interface Management >
Ethernet Virtual Interface from the Function Tree.
Step 2 Click New in the General Attributes tab and the Create Ethernet Virtual Interface dialog
box is displayed.
Step 3 Set the parameters as required in the Create Ethernet Virtual Interface displayed. For details
on the parameters for VLAN sub-interface, see Table 4-19.
----End
Background Information
Table 4-5 lists the application scenario of serial interfaces.
Follow the procedure shown in Figure 4-4 to configure the serial interface attributes.
In a PSN network, the serial interfaces are used to transport the PPP-encapsulated packet data.
The layer 3 attributes of a serial interface define the related attributes of the network layer.
Prerequisite
You must be an NM user with "NE operator" authority or higher.
Procedure
Step 1 In the NE Explorer, select an NE and choose Configuration > Interface Management > Serial
Interface from the Function Tree.
Step 2 Click New in the General Attributes tab and the New Serial Interface dialog box is displayed.
Step 3 Set the parameters as required. For details on the parameters for the serial interface, seeTable
4-17.
NOTE
l In the case of the serial interface at the VC12 level, currently a serial interface can be bound to only
one timeslot.
l In the case of the serial interface at the 64 Kbit/s level, when the E1 frame mode is 30, timeslots 0 and
16 are unavailable. When the E1 frame mode is 31, timeslot 0 is unavailable.
l In the case of the serial interface at the 64 Kbit/s level, the number of bundled timeslots ranges from
3 to 30.
Step 4 Click Apply. The Operation Result dialog box is displayed indicating that the operation is
successful.
----End
Prerequisite
l You must be an NM user with "NE operator" authority or higher.
l A serial interface must be created.
Procedure
Step 1 In the NE Explorer, select an NE and choose Configuration > Interface Management > Serial
Interface from the Function Tree.
Step 2 Set the parameters as required.For details on the parameters for general attributes of the serial
interface, seeTable 4-17.
NOTE
l When you set Port Mode to Layer 2, Encapsulation Type is ATM. The serial interface supports IMA
binding.
l In the case an NNI interface,Max Data Packet Size (byte) must be larger than 960. A DCN packet
contains a maximum of 960 bytes. If Max Data Packet Size (byte) is smaller than 960, the DCN
packets in the receive direction may be lost.
Step 3 Click Apply. The Operation Result dialog box is displayed indicating that the operation was
successful.
----End
Prerequisite
l You must be an NM user with "NE operator" authority or higher.
l In General Attributes, Encapsulation Type must be set to PPP.
Procedure
Step 1 In the NE Explorer, select an NE and choose Configuration > Interface Management > Serial
Interface from the Function Tree.
Step 2 Click the Layer 3 Attributes tab and set the parameters as required.For details on the parameters
for layer 3 attributes of the serial interface, see Table 4-18.
NOTE
Step 3 Click Apply. The Operation Result dialog box is displayed indicating that the operation was
successful.
----End
Background Information
The application scenario of an microwave interface depends on the setting of the interface
attributes. For details, refer to Table 4-6.
NOTE
When the microwave interface is used to carry the QinQ Link, the configuration procedure is similar to the
configuration procedure when the microwave interface is used to carry the Ethernet service. In this case, however,
the encapsulation types are different. For details, see 4.5.5 Setting the Layer 2 Attributes of Microwave
Interfaces.
Start Start
End End
Required
Optional
of an microwave interface define the physical-layer information, such as the port mode,
encapsulation type, and maximum frame length.
4.5.4 Setting the IF Attributes of Microwave Interfaces
The IF information of the microwave interface specifies the relevant information of the IF board,
including the AM attribute and ATPC attribute.
4.5.5 Setting the Layer 2 Attributes of Microwave Interfaces
After the layer 2 attributes of an microwave interface are set, the interface can be used for
connecting to the client-side equipment at the edge of a PSN network or for forwarding Ethernet
packets within the PSN network. The Layer 2 attributes of an microwave interface define the
related information of the data link layer.
4.5.6 Setting the Layer 3 Attributes of Microwave Interfaces
The layer 3 attributes of an microwave interface define the related attributes of the network layer.
4.5.7 Setting the Advanced Attributes of Microwave Interfaces
The routine maintenance parameters can be set through setting the advanced attributes of
microwave interfaces.
4.5.8 Setting the Parameters of ODU Ports
This section describes how to set the parameters of ODU ports, including the RF attributes,
power attributes, and advanced attributes of the ODU.
Prerequisite
l You must be an NM user with "NE operator" authority or higher.
l The IF boards and their corresponding ODUs that form the IF 1+1 protection must be
included in the NE Panel.
Background Information
In the case of the OptiX RTN 950, it is recommended that you install a pair of main and standby
IF boards in slots 3 and 5 (the IF board in slot 3 is the main board), slots 4 and 6 (the IF board
in slot 4 is the main board), or slots 1 and 2 (the IF board in slot 1 is the main board), even though
the 1+1 HSB/FD/SD protection has no restriction on the slot of the IF board.
Procedure
Step 1 Select the NE from the Object Tree in the NE Explorer. Choose Configuration > IF 1+1
Protection from the Function Tree.
Step 3 Set the parameters of the IF 1+1 protection group. For detail, see Table 4-26.
NOTE
The parameters Working Mode, Revertive Mode, WTR Time (s), and Enable Reverse Switching must
be set to the same values at both ends of a radio link hop.
----End
Follow-up Procedure
l In the case of the 1+1 HSB protection and 1+1 SD protection, you need to configure the
IF/ODU information of the active microwave link later. The standby microwave link
automatically copies the related information of the active microwave link except the
transmission status of the ODU.
l In the case of the 1+1 FD protection, you need to configure the IF/ODU information of the
active microwave link and the information of the standby ODU later. The standby
microwave link automatically copies the IF information of the active microwave link.
NOTE
The default transmission status of an ODU is Unmute. Hence, you do not need to configure the transmission
status of the standby ODU after you create an IF 1+1 protection group.
Prerequisite
You must be an NM user with "NE monitor" authority or higher.
The IF board and the ODU that connects to the IF board must be added.
Precautions
l In 1+1 HSB/SD protection mode, one protection group corresponds to one radio link. In
this case, you need configure only the IF/ODU information of the main equipment.
l In 1+1 FD protection mode, one protection group corresponds to one radio link. In this
case, you need configure the IF/ODU information of the main equipment and the ODU
information of the standby equipment.
Procedure
Step 1 Select the NE from the Object Tree in the NE Explorer. Choose Configuration > Link
Configuration from the Function Tree.
Step 2 Click IF/ODU Configuration.
Step 3 Click IF board icon or ODU icon.
Then, the system displays the IF/ODU information of the radio link to which the IF board or
ODU belongs.
Step 4 Set the corresponding IF information of the radio link. For detail, see Table 4-27.
NOTE
Step 6 Set the corresponding ODU information of the radio link. For detail, see Table 4-28.
NOTE
Click Apply after you set the IF information of the radio link and after you set the ODU information of the radio
link.
----End
Prerequisite
You must be an NM user with "NE monitor" authority or higher.
The IF board and the ODU that connects to the IF board must be added.
Procedure
Step 1 Select the NE from the Object Tree in the NE Explorer. Choose Configuration > Interface
Management > Microwave Interface from the Function Tree.
Step 2 Click the General Attributes tab.
Step 3 Select the desired board and set the parameters as required. For detail, see Table 4-21.
NOTE
l When Port Mode is set to Layer 2, the Encapsulation Type support Null, 802.1Q and QinQ.
l When Port Mode is set to Layer 3, the Encapsulation Type support 802.1Q, and then the interface
can be used by tunnel.
Step 4 Click Apply. The Operation Result dialog box is displayed indicating that the operation is
successful.
Step 5 Click Close.
----End
Prerequisite
You must be an NM user with "NE monitor" authority or higher.
The IF board and the ODU that connects to the IF board must be added.
Procedure
Step 1 Select the NE from the Object Tree in the NE Explorer. Choose Configuration > Interface
Management > Microwave Interface from the Function Tree.
Step 2 Click the IF Attributes tab.
Step 3 Select the desired board and set the parameters as required. For detail, see Table 4-22.
NOTE
l When you set Guaranteed Capacity Modulation Format and Full Capacity Modulation Format,
note the following points:
This parameter is valid only when Enable AM is set to Enable.
l When you set Manually Specified Modulation Format, note the following points:
This parameter is valid only when Enable AM is set to Disable.
l When you set ATPC Upper Threshold(dBm) and ATPC Lower Threshold(dBm), note the
following points:
Set the central value between the ATPC upper threshold and the ATPC lower threshold to be the
required value of the receive power. It is recommended that you set ATPC Upper Threshold(dBm)
to the required value of the receive power plus 10 dB and set ATPC Lower Threshold(dBm) to the
required value of the receive power minus 10 dB.
Ensure that the difference between the value of ATPC Upper Threshold(dBm) and the value of ATPC
Lower Threshold(dBm) is not less than 5 dB.
Step 4 Click Apply. The Operation Result dialog box is displayed indicating that the operation is
successful.
----End
Prerequisite
You must be an NM user with "NE monitor" authority or higher.
The IF board and the ODU that connects to the IF board must be added.
Procedure
Step 1 Select the NE from the Object Tree in the NE Explorer. Choose Configuration > Interface
Management > Microwave Interface from the Function Tree.
Step 3 Select the desired board and set the parameters as required. For detail, see Table 4-23.
NOTE
When you set QinQ Type Domain, note the following points:
QinQ Type Domain can be set only when Encapsulation Type is QinQ.
Step 4 Click Apply. The Operation Result dialog box is displayed indicating that the operation is
successful.
----End
Prerequisite
You must be an NM user with "NE monitor" authority or higher.
The IF board and the ODU that connects to the IF board must be added.
Procedure
Step 1 Select the NE from the Object Tree in the NE Explorer. Choose Configuration > Interface
Management > Microwave Interface from the Function Tree.
Step 3 Select the desired board and set the parameters as required. For detail, see Table 4-24.
NOTE
Step 4 Click Apply. The Operation Result dialog box is displayed indicating that the operation is
successful.
----End
Prerequisite
You must be an NM user with "NE monitor" authority or higher.
The IF board and the ODU that connects to the IF board must be added.
Procedure
Step 1 Select the NE from the Object Tree in the NE Explorer. Choose Configuration > Interface
Management > Microwave Interface from the Function Tree.
Step 3 Select the desired board and set the parameters as required. For detail, see Table 4-25.
NOTE
When you set Radio Link ID, note the following points:
l If this parameter is different from Received Link ID, the NE reports the MW_LIM alarm and inserts
the AIS into the downstream.
l Set this parameter according to the planning. Each radio link of an NE should have a unique Link ID,
and the Link IDs at both the ends of a radio link should be the same.
l Before performing the loopback operation for the IF board, disable the AM function at the two ends
of a link.
Step 4 Click Apply. The Operation Result dialog box is displayed indicating that the operation is
successful.
----End
Prerequisite
You must be an NM user with "NE monitor" authority or higher.
Procedure
Step 1 Select the ODU from the Object Tree in the NE Explorer. Choose Configuration > ODU
Interface from the Function Tree.
Step 2 Click the Radio Frequency Attributes tab. For detail, see Table 4-29.
l When you set Transmission Frequency (MHz), note the following points:
l The parameter specifies the channel center frequency.
l This parameter cannot be set to a value that is less than the minimum TX frequency supported by
the ODU + 50% channel spacing or more than the maximum TX frequency supported by the ODU
- 50% channel spacing.
l The difference between the TX frequencies of both the ends of a radio link is a T/R spacing.
l Set this parameter according to the planning.
l When you set T/R Spacing (MHz), note the following points:
l This parameter indicates the spacing between the TX power and receive power of the ODU. If
Station Type of the ODU is TX high, the TX power is one T/R spacing higher than the receive
power. If Station Type of the ODU is TX low, the TX power is one T/R spacing lower than the
receive power.
l If the ODU supports only one T/R spacing, set this parameter to 0, indicating that the T/R spacing
supported by the ODU is used.
l The T/R spacing of the ODU should be set to the same value at both the ends of a radio link.
----End
Background Information
Follow the procedure shown in Figure 4-6 to configure an MP group.
Prerequisite
l You must be an NM user with "NE operator" authority or higher.
l Multiple serial interfaces or E1 interfaces on which PPP is enabled must be created.
l The E1 Frame Format or VC12 Frame Format of the local MP group and the opposite
MP group should be consistent.
Context
NOTE
The MP group can be bound only with the E1 interfaces of the same board, or the serial interfaces of the
same physical interface.
Procedure
Step 1 In the NE Explorer, select an NE and choose Configuration > Interface Management > MP
Group Management from the Function Tree.
Step 2 Click New in the General Attributes tab and the New MP Group dialogue box is displayed.
Step 3 Set the parameters as required. For details on the parameters for general attributes of the MP
group, see Table 4-20.
Step 4 Click Apply. The Operation Result dialog box is displayed indicating that the operation was
successful.
Step 5 Click Close.
----End
Prerequisite
l You must be an NM user with "NE operator" authority or higher.
l An MP group must be configured.
Procedure
Step 1 In the NE Explorer, select an NE and choose Configuration > Interface Management > MP
Group Management from the Function Tree.
Step 2 Select an MP group in the General Attributes tab and click Configuration. The Config
Member Interface dialog box is displayed.
Step 3 Set the parameters as required.
Step 4 Click Apply. The Warning dialog box is displayed, indicating that the operation may interrupt
the services.
NOTE
l Deleting the member interface of the MP group may damage the service.
l The member interfaces in the same and interconnected MP groups must have the same frame mode.
For the parameters of Frame Mode, see E1 Frame Format.
Step 5 Click Yes. A dialog box is displayed, indicating that the operation is successful.
----End
Procedure
Step 1 For details of configuring Ethernet LAG, refer to Creating an LAG in the Feature
Description.
----End
Procedure
Step 1 For details of configuring bound channels in an ATM IMA group, refer to Configuring Bound
Channels in an ATM IMA Group in the Feature Description.
Step 2 For details of configuring attributes of an ATM IMA group, refer to Configuring Attributes of
an ATM IMA Group in the Feature Description.
NOTE
After the IMA group is configured, the IMA protocol must be enabled.
Step 3 For details of configuring ATM interface attributes, refer to Configuring ATM Interface
Attributes in the Feature Description.
----End
Table 4-7 Descriptions of the parameters for SDH interface General Attributes
Field Value Description
Max Data Packet Size (byte) 960 to 9000 Set the maximum packet
Default: 1620 length.
This parameter can be set
only when Port Mode is set
to Layer 3, and
Encapsulation Type to
PPP.
Table 4-8 Descriptions of the parameters for Advanced Attributes of the SDH interface
Field Value Description
Clock Mode Master Mode, Slave Mode Select the clock mode.
Master Mode indicates that
the internal clock signals are
adopted.
Slave Mode indicates that
the line clock signals are
adopted.
Table 4-9 Descriptions of the parameters for PDH interface General Attributes
Field Value Description
Max Data Packet Size (byte) 960 to 1900 Set the maximum data packet
Default: 1620 length.
This parameter can be set
only when Port Mode is set
to Layer 3, and
Encapsulation Type to
PPP.
Table 4-10 Descriptions of the parameters for PDH interface Layer 3 Attributes
Field Value Description
Table 4-11 Descriptions of the parameters for PDH interface Advanced Attributes
Field Value Description
Table 4-12 Descriptions of the parameters for Ethernet interface General Attributes
Field Value Description
Port Mode Layer 2, Layer 3, Layer Mix Select the working mode of
the Ethernet port.
Layer 2: The port can access
the user-side equipment or
carry Ethernet services that
are based on the ports and use
the port exclusively.
Layer 3: The port can carry
tunnels.
Layer Mix: The port can
carry layer 2 services. The
interface works as an NNI
interface to access L2VPN
services. If a VLAN sub-
interface is created, the
interface can carry tunnels.
Max Frame Length (byte) OptiX RTN 950: 960 to 9000 The maximum frame length
Default: 1620 is also the maximum
transport unit (MTU).
Table 4-13 Descriptions of the parameters for Ethernet interface Layer 2 Attributes
Field Value Description
QinQ Type Domain 0600 to FFFF Set the QinQ type domain.
This parameter is available
only when you set
Encapsulation Type in
General Attributes to
QinQ.
Table 4-14 Descriptions of the parameters for Ethernet interface Layer 3 attributes
Field Value Description
Table 4-15 Descriptions of the parameters for Ethernet interface Advanced Attributes
Port Physical parameters For example: Port Enable: Displays physical parameters
Enabled, Working Mode: of the port.
Auto-Negotiation, Non-
Autonegotiation Flow
Control Mode: Disabled,
MAC Loopback: Non-
Loopback, PHY Loopback:
Non-Loopback
Transmitting Rate(Kbit/s) For example: 1024 Displays the rate at which the
data packets are transmitted.
Receiving Rate(Kbit/s) For example: 1024 Displays the rate at which the
data packets are received.
Table 4-16 Descriptions of the parameters for Ethernet interface Flow Control
Field Value Description
Table 4-17 Descriptions of the parameters for Serial interface General Attributes
Field Value Description
Port Mode Layer 2, Layer 3 Sets the port mode. If you set
Port Mode to Layer 2, the
value of Encapsulation
Type changes to ATM
automatically. If you set Port
Mode to Layer 3, you can set
Encapsulation Type to
PPP or Null.
Max Data Packet Size (byte) 46-1900 Sets the maximum data
Default: 1620 packet length.
Table 4-18 Descriptions of the parameters for Serial interface Layer 3 Attributes
Field Value Description
Board for Borrowed IP Example: 3-EF8F Select the board for the
Address unnumbered IP address.
This parameter can be set
only when Specify IP
Address is set to Borrow
Interface IP Address.
Port for Borrowed IP Example: 3-EF8F-3(Port-3) Display the port for the
Address unnumbered IP address.
This parameter can be set
only when Specify IP
Address is set to Borrow
Interface IP Address.
Table 4-19 Descriptions of the parameters for Ethernet virtual interface General Attributes
Field Value Description
Port Type EoA Virtual Interface, Selects the type of the port.
VLAN Sub Interface When Port Type is set to
VLAN Sub Interface for a
port, this port can carry
MPLS tunnels.
NOTE
In the case of the OptiX RTN
910/950, Port Type can be set
to VLAN Sub Interface only.
Associated Board For example: Slot-Board Displays the board where the
Name Ethernet virtual interface is
located.
Associated Port For example: Slot-Board Displays the port where the
Name-Port(Port No.) Ethernet virtual interface is
located.
Max Reserved Bandwidth For example: 4096 Set the maximum bandwidth
(Kbit/s) used by the tunnel.
The maximum reserved
bandwidth should not exceed
the physical bandwidth of the
bearer port.
The OptiX RTN 910/950
does not support this
parameter.
IP Address For example: 192.168.0.1 Set the IP address for the port.
This parameter can be set
only when Specify IP
Address is set to Manually.
Board for Borrowed IP For example: Slot-Board Select the board for the
Address Name unnumbered IP address.
This parameter can be set
only when Specify IP
Address is set to Borrow
Interface IP Address.
Port for Borrowed IP For example: Slot-Board Select the port for the
Address Name-Port(Port No.) unnumbered IP address.
This parameter can be set
only when Specify IP
Address is set to Borrow
Interface IP Address.
Sequence Number Type Long Serial Number, Short Select the type of sequence
Serial Number, Huawei number:
Mode l Long Serial Number: The
Default: Huawei Mode sequence number field
has 24 bits.
l Short Serial Number: The
sequence number field
has 12 bits.
NOTE
The ports at both ends must
have the same settings of
Sequence Number Type.
Table 4-21 Descriptions of the parameters for microwave interface General Attributes
Field Value Description
Channel Space 7.0M, 14M, 28M, 56M Displays the channel spacing
Default: 7.0M of the corresponding radio
link.
Full Capacity Modulation QPSK, 16QAM, 32QAM, This parameter specifies the
Format 64QAM, 128QAM, highest modulation scheme
256QAM that the AM function
supports.
Generally, the value of this
parameter is determined by
the bandwidth of the services
that need to be transmitted
over the Hybrid microwave
and the availability of the
radio link that corresponds to
this modulation scheme.
This parameter is valid only
when AM Enable Status is
set to Enable.
Enable ATPC Automatic Enable, Disable When you set this parameter
Threshold Adjustment Default: Enable to Enabled, the equipment
adjusts the ATPC threshold
automatically based on the
link status.
This parameter is available
only when you set Enable
ATPC to Enabled.
Table 4-23 Descriptions of the parameters for microwave interface Layer 2 Attributes
Field Value Description
QinQ Type Domain 1536 to 65535 Set the QinQ type domain.
This parameter is available
only when you set
Encapsulation Type in
General Attributes to
QinQ.
Table 4-24 Descriptions of the parameters for microwave interface Layer 3 attributes
Field Value Description
Table 4-25 Descriptions of the parameters for microwave interface Advanced Attributes
Field Value Description
Error Frame Discard Enabled Enabled, Disabled Displays whether error frame
discard is enabled. You can
also enable or disable error
frame discard.
The microwave IF board
logic verifies the error frame
in the Ethernet packet that is
dropped from a microwave
air interface. Enabled: An
error frame is detected and
the Ethernet packet is
discarded. Disabled: An
error frame is detected, but
the Ethernet packet is not
discarded.
The BER of E1 services is
monitored. Hence, it is
recommended that
Composite Port Loopback
be set to Disabled. In the case
of other services, the default
value is recommended.
Channel Space 7.0M, 14M, 28M, 56M Sets the channel spacing of
Default: 7.0M the corresponding radio
links.
Full Capacity Modulation QPSK, 16QAM, 32QAM, This parameter specifies the
64QAM, 128QAM, highest modulation scheme
256QAM that the AM function
Default: QPSK supports. Generally, the
value of this parameter is
determined by the bandwidth
of the services that need to be
transmitted over the Hybrid
microwave and the
availability of the radio link
that corresponds to this
modulation scheme.
This parameter is valid only
when Enable AM is set to
Enabled.
Range of Frequency (MHz) For example: 22017 to 23025 Specifies the range of the
transmit frequencies of an
ODU board.
Actual TX Frequency (MHz) For example: 23025 Queries the actual transmit
frequency of an ODU board.
Actual RX Frequency (MHz) For example: 22017 Queries the actual receive
frequency of an ODU board.
Actual T/R Spacing (MHz) For example: 1008 Queries the actual interval
between the transmit and
receive frequencies of a
board.
Actual RX Power (dBm) For example: -50 Queries the actual received
optical power of the ODU
board.
Actual Receive Frequency For example: 22017 Queries the actual received
(MHz) frequency for a board.
Actual T/R Spacing (MHz) For example: 1008 Queries the actual spacing
between transmission and
receiving for a board.
The range of the frequency For example: [2300.8, Queries the working range of
point (MHz) 2332.2] a frequency point.
Transmit Power (dBm) -10.0 to 35.0 Sets the transmit power for a
radio frequency port.
Actual Receive Power (dBm) For example: -50 Queries the received power.
Actual range of Power (dBm) For example: [-6, 24] Queries the range of the
actual transmit power.
Produce Time For example: 2006-6 Queries the time when the
ODU equipment is produced.
In a PSN network, the MPLS tunnel carries PWs where various services are encapsulated. In
this way, data packets can be transparently transmitted among NEs. One MPLS tunnel can carry
several PWs. Before configuring a service, first configure a MPLS tunnel that carries the service.
On the U2000, you can use the trail function or per-NE configuration scheme to configure an
MPLS tunnel.
Configure the MPLS OAM to enable the CV/FFD detection of a tunnel. In this way, the
connectivity of the MPLS tunnel can be monitored in a real-time manner and the MPLS tunnel
switching can be triggered.
5.9 Creating an MPLS APS Protection Group
You can create an MPLS tunnel protection group to protect MPLS tunnels. You can configure
1:1 protection in an MPLS tunnel protection group. To create an MPLS tunnel protection group,
the MPLS tunnel protection group must be configured at the source and sink NEs of the MPLS
tunnel.
5.10 Configuration Case of the Static MPLS Tunnel
This section describes how to configure a static MPLS tunnel by using the trail function and on
a per-NE basis. The configuration case and configuration flowchart help you better understand
the service configuration process. The configuration includes networking, service planning, and
configuration process.
5.11 Parameter Description
This section describes the parameters related to the MPLS Tunnel configuration.
Figure 5-1 shows how the MPLS tunnel is used as the service transmission channel.
IMA E1 IMA E1
MPLS Tunnel
FE FE
PW
The MPLS tunnel only provides an end-to-end channel, and does not care which service is
encapsulated in the PW it carries. Data packets are first encapsulated in the PW, which is stuck
with an MPLS label and sent to the MPLS tunnel for transmission. At the sink end, data packets
are recovered and retain the original service features. In the tunnel, the intermediate nodes are
called Transit nodes. Hence, a tunnel contains the Ingress node, Egress node and Transit nodes.
Node B
RNC
MPLS tunnel
An edge node in one network accesses the services from Node B, and transports the services to
the RNC connected to another PE. For such transport, one point-to-point MPLS tunnel can be
used. On the U2000, two schemes can be used to create such a unicast tunnel.
l Configuration on a per-NE basis: Configure the ingress port and the IP address of the next
hop at each NE involved in the MPLS tunnel. In this way, one unicast MPLS tunnel is
created.
l Configuration by trail: Configure a unicast MPLS tunnel by specifying the source NE, sink
NE, and the other NEs that the MPLS tunnel traverses.
Working
tunnel
Ingress Egress
node Protection node
tunnel
Destination Source
Frame
MAC MAC ARP request/answer
type
address address
6 6 2
MAC IP address
IP MAC IP MAC address Destination
address at the Destination
protocol addres address OP at the transmit MAC
transmit IP address
type type s length length end address
end
2 2 1 1 2 6 4 6 4
l Destination MAC address: six bytes. When an ARP request is sent, the destination MAC
address is the broadcast MAC address, that is, 0xFF.FF.FF.FF.FF.FF.
l Source MAC address: six bytes.
l Frame type: two bytes. The value of this field is 0x0806.
l MAC address type: two bytes. It defines the address type in the network that runs the ARP.
Value 1 indicates the Ethernet address.
l IP protocol type: two bytes. It defines the protocol type. Value 0x0800 indicates the IP
address.
l MAC address length: one byte. It defines the length of the physical address expressed in
bytes. In the case of an ARP request or answer, the value of this field is 6.
l IP address length: one byte. It defines the length of the logical address expressed in bytes.
In the case of an ARP request or answer, the value of this field is 4.
l OP: two bytes. It defines the ARP packet type. Value 1 indicates the ARP request and value
2 indicates the ARP answer.
l MAC address at the transmit end: six bytes. It defines the MAC address of the transmit
station.
l IP address at the transmit end: four bytes. It defines the IP address of the transmit station.
l Destination MAC address: six bytes. It defines the destination MAC address. In the case
of an ARP request packet, the value of this field is all-zero.
l Destination IP address: four bytes. It defines the destination IP address.
Static ARP
Static ARP means that there is a fixed mapping relation between the IP address and the MAC
address, and thus you cannot adjust this relation dynamically on the equipment or the router.
For the static ARP, you need to manually create a table that is stored on each equipment in the
network.
The static ARP table is used in the following scenarios:
l When a packet is transmitted to a destination address beyond the local network segment,
this packet is bound with a specific network interface card (NIC) in order to be forwarded
through this gateway.
l To filter out certain illegal IP addresses, you can bind these addresses with an MAC address
that does not exist to realize the filtering.
Dynamic ARP
Dynamic ARP means that the mapping relation between the IP address and the MAC address is
constantly refreshed and adjusted through address learning.
Changing the NIC or moving the host to another network usually changes the physical address.
The corresponding MAC address can be obtained in a timely manner based on the dynamic ARP
address resolution.
ARP Principle
When a host or other network equipment needs to transmit data to another host or equipment,
IP data packets must be encapsulated into frames to be transmitted in the physical network.
During the transmission, the destination MAC address must be available.
When the equipment on the transmit station wants to obtain the MAC address of another
equipment in the network, the transmit station searches for the MAC address corresponding to
the IP address in the ARP table. If the ARP table is available, the transmit station obtains the
MAC address from the ARP table directly. Otherwise, the ARP function is enabled. As shown
in Figure 5-5, host A sends data to host B to obtain the MAC address of host B.
To obtain the MAC address of the station whose IP address is 10.1.1.2, host A broadcasts an
ARP request packet in the network. The packet carries the information about the MAC address
and IP address of the transmit station, and the IP address of the destination station. All the
equipment in the network receives and handles the ARP request packet. Only host B on the
destination station, however, can identify the IP address and return an ARP answer packet.
According to the MAC address of the transmit station in the request packet, host B sends the
ARP answer packet to the request station in unicast mode. After receiving the ARP answer
packet, host A obtains the MAC address of host B.
Host C Host D
IP: 10.1.1.3 IP: 10.1.1.4
MAC:A-A-C MAC:A-A-D
Optional
Creating Network
Configure the
network-side
interface
Configuring the
Address Parse
Configure the
Tunnel
End
2. Configuring the network-side Set the general attributes and Layer 3 attributes (tunnel
interface enable status and IP address) for interfaces to carry the
tunnel carrying.
3. Configuring the LSR ID Configure the LSR ID of the NE and start of global label
space. The LSR ID of the NE must be unique.
4. Configuring the Address Parse If the MPLS tunnel cannot obtain the correspondence
between the IP address and MAC address of the next
hop, you need to configure the corresponding static
ARP table items.
5. Creating an MPLS Tunnel by You can configure the MPLS tunnel on the per-NE basis
Using the Trail Function or or by using trail management. Set the tunnel ID, select
Creating an MPLS Tunnel on a static signaling type, set other relevant information such
Per-NE Basis as the service name, ingress node, egress node, and
transit node.
Prerequisite
You must be an NM user with "NE operator" authority or higher.
Procedure
Step 1 In the NE Explorer, select the NE and choose Configuration > MPLS Management > Basic
Configuration from the Function Tree.
Step 2 Set LSR ID, Start of Global Label Space and other parameters. For details on the parameters
for general attributes of MPLS, see Table 5-10.
CAUTION
If there are services on the NE, modifying LSR ID may result in NE reset and service
interruption.
----End
Prerequisite
You must be an NM user with "NE operator" authority or higher.
Procedure
Step 1 In the NE Explorer, click the NE, and choose Configuration > Control Plane Configuration
> Address Parse from the Function Tree.
Step 2 Click Create and the Add Address Parse dialogue box is displayed.
Step 3 Set the IP address and MAC address of the ARP table items separately, and then click Apply.
For details on the parameters for the address parse, see Table 5-5.
CAUTION
When configuring the MAC address of the ARP table items, the first digit of the address must
be of an even number.
CAUTION
The configuration of the address resolution refers to the creation of the static ARP table items.
To delete the dynamic ARP table items, click Clear. This operation, however, clears all the
contents in the ARP table items, and interrupts the services. Thus, exercise caution when
performing this operation.
NOTE
----End
Prerequisite
l You must be an NM user with "NE operator" authority or higher.
l You must complete the correct configuration of the port attributes.
l You must complete the correct setting of the LSR ID for each NE.
Procedure
Step 1 Choose Service > PTN Tunnel > Create PTN Tunnel from the Main Menu. The Create PTN
Tunnel dialog box is displayed.
Step 2 Select Create Reverse Tunnel to configure the parameters for the forward and reverse static
tunnels. When creating a static MPLS tunnel by using the trail function, see Table 5-6 for details
on the parameters.
NOTE
Step 3 Click Next. Select nodes from the Available NE. Click to add each node as an Ingress
node, Egress node or Transit node. When creating a static MPLS tunnel by using the trail
function, see Table 5-7 for details on the parameters.
NOTE
When adding a transit node, follow the trail of the link in the networking diagram.
Step 4 Click Next. Set parameters for nodes selected in the previous step. When creating a static MPLS
tunnel by using the trail function, see Table 5-8 for details on the parameters for route
information.
1. Ingress node: Set Out Port, Out Label and Next Hop Address.
2. Egress node: Set In Port and In Label.
3. Transit node: Set Out Port, Out Label, In Port, In Label and Next Hop Address.
NOTE
If the ports along a tunnel are of different types (for example, an Ethernet port and a virtual port are of
different types), de-select Filter Ports by Port Type to display all ports. If you select Filter Ports by Port
Type, only the ports of the same type are displayed.
The label value of the ingress node may be same as or different from the label value of the egress node.
When Active is not selected, the tunnel is only stored on the U2000 side. When Active is selected, the
tunnel can be delivered from the U2000 side to the NE side.
Step 5 Click Finish. A progress bar is displayed to show the creation progress. When the creation is
complete, the Operation Result is displayed, indicating that the MPLS tunnel is successfully
created. Then, click Close.
----End
Prerequisite
l You must be an NM user with "NE operator" authority or higher.
l You must complete the correct configuration of the port attributes.
l You must complete the correct setting of the LSR ID for each NE.
Procedure
Step 1 Select the source NE of the tunnel in the NE Explorer. Choose Configuration > MPLS
Management > Unicast Tunnel Management from Function Tree.
Step 2 Click the Static Tunnel tab and click New. The New Unicast Tunnel dialog box is displayed.
Step 3 Select New Reverse Tunnel to set parameters for the forward and reverse tunnels. When creating
an MPLS tunnel on a per-NE basis, see Table 5-11 for details on the related parameters.
NOTE
When Node Type is set to Egress, Bandwidth(kbit/s) must be consistent with the tunnel bandwidth in
the Ingress direction and cannot be set.
For Next Hop Address, select the IP address of the interface of the next node.
Step 5 Follow Steps 1 - 4 to create static tunnels for Transit nodes and the Egress node.
----End
Prerequisite
You must be an NM user with "NE monitor" authority or higher.
Procedure
Step 1 In the NE Explorer, select the NE and choose Configuration > MPLS Management > MPLS
Label Management from the Function Tree.
Step 2 In the Tunnel Label tab, click Query to view the tunnel label information.
----End
Prerequisite
l You must complete the creation of an MPLS tunnel.
l You must be an NM user with "NE or network operator" authority or higher.
Procedure
Step 1 Click the NE in the NE Explorer interface. Choose Configuration > MPLS Management >
Unicast Tunnel Management from Function Tree.
Step 2 Click the OAM Parameters tab and set the parameters.For details on the parameters for MPLS
OAM, see Table 5-13.
NOTE
Step 3 Click Apply. The Operation Result dialog box is displayed, indicating that the operation
succeeds.
----End
Prerequisite
l You must be an NM user with "NE monitor" authority or higher.
l The working and protection tunnels must be created.
l The MPLS OAM function must be enabled for each MPLS tunnel in the protection group.
l The OAM packet type must be set to FFD and the packet sending period must be set to 20
ms.
Procedure
Step 1 Select the source NE of the tunnel in the NE Explorer. Choose Configuration > APS Protection
Management from the Function Tree.
Step 2 Click New. The New Tunnel Protection Group dialog box is displayed.
Step 3 Set parameters for the tunnel protection group. For details on the parameters for the tunnel
protection group, see Table 1.
l Protection Type: The protection type can be 1:1.
l Switching Mode: The switching mode can be single-ended or dual-ended. When the
protection type is 1:1, the switching mode must be dual-ended.
l Revertive Mode: The revertive mode can be non-revertive or revertive.
l Hold-off Time(100 ms): The unit is 100 milliseconds. You can enter an integer from 0 to
100, that is, 0 to 10 seconds.
CAUTION
When creating the protection group, you must set the Protocol Status to Disabled. If you enable
the APS protocol at the local NE first and then the opposite NE when configuring the MPLS
APS protection, the opposite NE may has an anomaly in receiving services or report an abnormal
alarm.
Step 4 Click OK. The MPLS tunnel protection group is successfully configured.
NOTE
The bandwidth of the protection tunnel should be not less than that of the working tunnel. To increase the
bandwidth of the working tunnel after the protection group is created, increase the bandwidth of the
protection tunnel first.
Step 5 Refer to Steps 1 through 4 to configure the protection group on the sink NE of the tunnel.
Step 6 Enable the APS protocol for the MPLS APS protection group.
1. Select the source NE of the Tunnel in the NE Explorer. Choose Configuration > APS
Protection Management from the Function Tree.
2. Right-click the APS protection group that is already created to choose Start Protocol from
the shortcut menu.
3. A dialog box is displayed indicating that the operation is successful. Then, the Protocol
Status of the APS protection group changes to Enabled.
----End
Working tunnel
Bypass tunnel
NE2
The voice service requires high network security. The service tunnel between NE1 and NE3 is
configured with 1:1 protection. In the case of a service that requires high network security, MPLS
APS protection can be configured to protect the service. For details of how to configure MPLS
APS protection, see MPLS APS in the Feature Description.
l The NE1-to-NE3 working tunnel is along the NE1-NE2-NE3 trail. NE2 is the transit node.
l The NE1-to-NE3 protection tunnel is along the NE1-NE4-NE3 trail. When the NE1-NE2
link fails or NE2 fails, the protection tunnel protects the working tunnel.
NE Parameter Planning
Tunnel Planning
Prerequisite
You must be an NM user with "NE operator" authority or higher.
You must be familiar with the networking diagram, requirements, and service planning.
Procedure
Step 1 Configure the microwave port that carries the MPLS tunnel. For details of the configuration, see
4.5 Configuring Microwave Interfaces.
Step 2 Set the LSR ID of the NE. For details of the configuration, see 5.3 Configuring Basic Attributes
of the MPLS.
Step 3 Create the primary tunnel. For details of the configuration, see 5 Configuring an MPLS
Tunnel.
1. Set the positive and reverse tunnels.
l Tunnel ID: 100 (Positive), 101 (Reverse)
l Name: Working Tunnel (Positive), Working Tunnel (Reverse)
l Signal Type: Static
l Scheduling Type: E-LSP (E-LSP indicates that the tunnel determines the scheduling
priority and discarding priority of packets according to the EXP information. On one
MPLS tunnel of the E-LSP type, there can be a maximum of eight types of PWs.)
l EXP: none (The EXP is the tunnel priority and is set according to the tunnel planning.)
l Bandwidth (kbit/s): No Limit (Set the bandwidth according to networking planning.)
2. Select the Ingress, Egress, and Transit nodes and set the route information.
l Ingress node: NE1 (The tunnel source node is called the ingress node, that is, the tunnel
in network node.)
l Egress node: NE3 (The tunnel sink node is called the egress node, that is, the tunnel out
network node.)
l Transit node: NE2 (the transmit node of the tunnel on the network is called the transit
node.)
3. Set the route restrictions.
l Positive route information
– NE1 ingress node
– Out Port: 3-IFE2-1 (source port of the tunnel trail)
– Out Label: 20 (The out label at the local end is the same as the in label at the
downstream node. The labels are used for transmitting packets.)
– Next Hop Address: 10.1.1.2
– NE2 transit node
– In Port: 4-IFE2-1
– In Label: 20
– Out Port: 3-IFE2-1
– Out Label: 30
– Next Hop Address: 10.1.2.2
– NE3 egress node
– In Port: 4-IFE2-1
– In Label: 30
l Reverse route information
– NE3 ingress node
– Out Label: 21
– NE2 transit node
– In Label: 21
– Out Label: 31
– NE1 egress node
– In Label: 31
----End
Prerequisite
You must be an NM user with "NE operator" authority or higher.
You must be familiar with the networking diagram, requirements, and service planning.
Procedure
Step 1 Configure the microwave port that carries the MPLS tunnel. For details of the configuration, see
4.5 Configuring Microwave Interfaces.
Step 2 Set the LSR ID of the NE. For details of the configuration, see 5.3 Configuring Basic Attributes
of the MPLS.
Step 3 Create the working tunnel. For details of the configuration, see 5.6 Creating an MPLS Tunnel
on a Per-NE Basis.
Set the tunnel information about NE1.
l Tunnel ID: 100 (Positive), 101 (Reverse)
l Name: Working Tunnel (Positive), Working Tunnel (Reverse)
l Node Type: Ingress
l Bandwidth (kbit/s): 10240 (Set the bandwidth according to networking planning.)
l In Label: 31
l Out Board/Logical Port Type: 3-IFE2
l Out Port: 1 (port-1) (source port of the tunnel trail)
l Out Label: 20
l Next Hop Address: 10.1.1.2 (the IP address of the port of the next station on the tunnel link)
l Sink Node: 1.0.0.3 (the LSR ID of the sink node on the positive tunnel link)
l Tunnel Type: E-LSP (E-LSP indicates that the tunnel determines the scheduling priority and
discarding priority of packets according to the EXP information. On one MPLS tunnel of the
E-LSP type, there can be a maximum of eight types of PWs.)
l EXP: none
Configure the tunnel information about the NE2 transit node.
l Tunnel ID: 100 (Positive), 101 (Reverse)
l Name: Working Tunnel (Positive), Working Tunnel (Reverse)
l Node Type: Transit (NE2 is the intermediate station that the tunnel trail passes.)
l Bandwidth (kbit/s): 10240 (Set the bandwidth according to networking planning.)
l In Board/Logical Port Type: 4-IFE2
l In Port: 1 (port-1)
l In Label: 20 (Positive), 21 (Reverse)
l Out Board/Logical Port Type: 3-IFE2
l Out Port: 1 (port-1) (source port of the tunnel trail)
l In Label: 30 (Positive), 31 (Reverse)
l Next Hop Address: 10.1.2.2 (the IP address of the port of the next station on the positive
tunnel link), 10.1.1.1 (the IP address of the port of the next station on the reverse tunnel link)
l Source Node: 1.0.0.1 (the LSR ID of the source node on the tunnel link)
l Sink Node: 1.0.0.3 (the LSR ID of the sink node on the tunnel link)
l Tunnel Type: E-LSP (E-LSP indicates that the tunnel determines the scheduling priority and
discarding priority of packets according to the EXP information. On one MPLS tunnel of the
E-LSP type, there can be a maximum of eight types of PWs.)
Set the tunnel information about NE3.
----End
ARP List Type Static, Dynamic Display the type of the ARP
list.
Table 5-6 Descriptions of the parameters for the Static Tunnel in the General Attributes tab
Field Value Description
Table 5-7 Descriptions of the parameters for the Static Tunnel in the Select Nodes tab
Field Value Description
Table 5-8 Descriptions of the parameters for the static tunnel in the Route Information tab
Field Value Description
Next Hop Address Example: 192.168.1.2 Sets the IP address of the next
hop.
NOTE
The egress node does not
support the setting of the next
hop address.
Filter Ports by Port Type Checked, Unchecked Sets whether ports are
filtered by port type. When
Filter Ports by Port Type is
checked, ports are filtered on
the next hop and only the
ports of the specified type are
displayed. When Filter
Ports by Port Type is
unchecked, all ports are
displayed and this setting is
applied to the pass-through of
NEs.
Auto assign label Checked, Unchecked After you select Auto assign
label, the system
automatically assigns the In
Label and Out Label for the
static Tunnel.
Table 5-9 Descriptions of the parameters for the Static Tunnel in the Tunnel Information tab
Field Value Description
Positive Tunnel Information Tunnel ID, Name, Signal Display information on the
Type, Scheduling Type, created positive tunnel.
Bandwidth (kbit/s), Ingress
Node, Egress Node, Transit
Node
Reverse Tunnel Information Tunnel ID, Name, Signal Display information on the
Type, Scheduling Type, created reverse tunnel.
Bandwidth (kbit/s), Ingress
Node, Egress Node, Transit
Node
Start of Global Label Space RTN 950: 0 to 1046528 Set and display the start of the
Increment: 2048 global label space.
The start of the global label
space is the minimum value
of the ingress and egress
labels of the unicast tunnel.
When Start of Global Label
Space is 0, the minimum
value of the ingress and
egress labels of the unicast
tunnel is 16. "0-15" values
are reserved and are
unavailable.
Global Label Space Size 1536 Display the size of the global
label space.
The global label space size is
the number of unicast tunnel
labels.
Start of Multicast Label 1536 Set and display the start of the
Space multicast label space.
The start of the multicast
label space is the minimum
value of the ingress and
egress labels of the multicast
tunnel.
In Board/Logic Interface For example: Slot-Board Display and set the in board
Type Name or logic interface type.
Bandwidth Remaining (kbit/ For example: 10240 Display and set the remaining
s) bandwidth of the static
tunnel.
NOTE
OptiX RTN 910 and OptiX
RTN 950 series products do not
support the Bandwidth
Remaining (kbit/s) function.
Out Board/Logic Interface For example: Slot-Board Display and set the out board
Type Name or logic interface type.
Out Port For example: Slot-Board Display and set the egress
Name-Port(Port No.) port of the static tunnel.
The ingress node and
transmit node support the
setting of the egress port, but
the egress node does not.
Next Hop Address For example: 192.168.0.2 Display and set the IP address
of the egress next hop of the
tunnel.
The ingress node and
transmit node support the
setting of the egress next hop
address, but the egress node
does not.
Source Node For example: 192.168.0.1 Display and set the source
node of the tunnel.
The egress node and transmit
node support the setting of
the source node, but the
ingress node does not.
Sink Node For example: 192.168.0.2 Display and set the sink node
of the tunnel.
The ingress node and
transmit node support the
setting of the sink node, but
the egress node does not.
Hold-off Time (100 ms) 0 to 100 Sets the hold-off time of the
Default: 0 protection group.
Switching Status Normal \(No Request for Displays the switching status
Working\), Normal \(No of the protection group.
Request for Protection\),
Lockout, Forced Switching,
Working Tunnel Failure,
Protection Tunnel Failure,
Protection Tunnel
Degradation, Working
Tunnel Degradation, Manual
Switching \(Protection to
Working\), Manual
Switching \(Working to
Protection\), WTR, DNR,
Exercise Switching \
(Protection to Working\),
Exercise Switching \
(Working to Protection\),
Reverse Request \(Protection
to Working\), Reverse
Request \(Working to
Protection\)
Tunnel Type MPLS Tunnel, IP Tunnel, Sets the type of the working
GRE Tunnel tunnel.
NOTE
In the case of the OptiX RTN
910 or OptiX RTN 950, only
MPLS tunnel is used.
Detection Packet Type CV, FFD Set the detection packet type.
l CV: The detection
frequency is always the
same and cannot be set.
l FFD: The detection
frequency can be set.
Detection Packet Period (ms) 3.3, 10, 20, 50, 100, 200, 500 Set and display the detection
packet period.
If Detection Packet Period
is set to FFD, the detection
packet period can be set. If
Detection Packet Period is
set to CV, the detection
packet period is always 1000.
NOTE
The OptiX RTN 910 and OptiX
RTN 950 can not support the
3.3 and 10.
LSP Defect Type dServer, dLOCV, Display the LSP defect type.
dTTSI_Mismatch,
dTTSI_Mismerge, dExcess,
dUnknown, SD, SF, BDI,
FDI
This section describes the basic information about the CES service and illustrates how to
configure the CES service.
Application Mode
The CES service allows a metropolitan Ethernet network (MEN) carrier to provide TDM services
to customers that have only the TDM equipment. This enlarges the service range and the number
of users of the MEN carriers, and provides a way to transform the traditional circuit network to
the wideband data network.
The CES service mainly applies to the wireless service and the enterprise private line service.
The application scenarios include UNI-NNI and UNI-UNI, as shown in Figure 6-1.
l UNI-NNI CES service: The RTN equipment accesses the TDM services of customers by
using the E1 interface. The CES services can be created between the RTN equipments to
emulate the end-to-end TDM service. To customers, the CES services are similar to actual
TDM services.
l UNI-UNI CES service: The RTN equipment transmits and receives TDM services at a
single point.
NOTE
Now only the point-to-point service is supported. That is, the service of one E1 interface mapping to one
PW is supported. But converged services of several E1 interfaces mapping to one PW are not supported.
UNI-UNI
BTS
UNI-NNI
BSC
PE
PE
BTS PE
TDM Link
PW
Tunnel BTS
Emulation Mode
The RTN equipment supports two types of CES services: structure-aware TDM circuit emulation
service over packet switched network (CESoPSN) and structure-agnostic TDM over packet
(SAToP).
l The RTN equipment senses frame structures, frame alignment modes and timeslots in the
TDM circuit.
l The RTN equipment processes the overhead and extracts the payload in TDM frames. Then,
the RTN equipment delivers the timeslot of each channel to the packet payload according
to certain sequence. As a result, the service in each channel in the packet is fixed and visible.
l Each Ethernet frame that carries the CES service loads TDM frames of a fixed number.
Usually the loading time is 0.125 to 5 ms.
l The equipment regards TDM signals as constant rate bit flows, instead of sensing structures
in the TDM signals. The entire bandwidth of TDM signals is emulated.
l The overhead and payload in the TDM signal are transparently transmitted.
l The Ethernet frame carries the CES service. Usually the loading time is 1 ms.
In the CESoPSN mode, for the free 64 Kbit/s timeslot in TDM E1 signal, the RTN equipment
provides the compression function to save the transmission bandwidth.
Service Clock
The TDM service has high requirements for the clock synchronization. The RTN equipment
provides two solutions to the CES service clock synchronization. See Table 6-1.
1. Creating To create a network, you need to create NEs, configure NE data, create
Network fibers, and configure the clock.
2.Configuring the Configure the UNI port that accesses the CES service.
Interface
Configure and manage UNI-NNI CES services by following the configuration flow shown in
Figure 6-5.
Creating a Network
Configure
inferface
Configure Tunnel
Configure UNI-NNI
CES Service
End
Task Remarks
2. Configuring Interfaces Specify the UNI ports that access the CES
services and the NNI port that carries the
MPLS tunnel.
3. Creating an MPLS Tunnel by Using the Configure the MPLS tunnel that carries the
Trail Function or Creating an MPLS CES services.
Tunnel on a Per-NE Basis You can configure the MPLS tunnel on the
per-NE basis or by using trail management.
Set the tunnel ID, select static signaling type,
set other relevant information such as the
service name, ingress node, egress node, and
transit node.
4. Configuring the UNIs-NNI CES Service Set the attributes of the CES service and PWs
by Using Trail Management or Configuring that carry the CES service.
the UNIs-NNI CES Service on the Per-NE
Basis
Prerequisite
You must be an NM user with "NE operator" authority or higher.
Procedure
Step 1 Choose Service > PTN Service > Create CES Service from the Main Menu. The Create CES
Service dialog box is displayed.
Step 2 In the Create CES Service dialog box, create the UNI-UNI service.
NOTE
For the UNI-UNI service, you need not specify a PW and set parameters of the PW.
When Active is not selected, the service is only stored on the U2000 side. When Active is selected, the
service can be delivered from the U2000 side to the NE side.
details on the parameters for source/sink port attributes of the CES service, see Table
6-8.
NOTE
----End
Prerequisite
l You must be an NM user with "NE operator" authority or higher.
l The DCN of the port with the CES service must be disabled.
l A tunnel must be created. For configuration method, see 5.5 Creating a Static MPLS
Tunnel by Using the Trail Function.
Context
When the interface is used to carry the CES service, you need to set the frame format, to ensure
that the frame format is the same as the service encapsulation format. When the emulation mode
of a CES service is CESoPSN, it is recommended that you set the frame format at the interface
to CRC-4 multiframe. When the emulation mode of a CES service is SAToP, the frame format
at the interface should be set to non-framing.
Procedure
Step 1 Choose Service > PTN Service > Create CES Service from the Main Menu. The Create CES
Service dialog box is displayed.
Step 2 In the Create CES Service dialog box, create the UNI-NNI service.
NOTE
For the UNI-NNI service, you need specify a PW and set parameters of the PW.
When Active is not selected, the service is only stored on the U2000 side. When Active is selected, the
service can be delivered from the U2000 side to the NE side.
2. In Source, click Browse and select the source NE, source port, lower path of the service.
In Sink, click Browse and select the sink NE, sink port and low path of the service. For
details on the parameters for source/sink port attributes of CES service, see Table 6-8.
NOTE
----End
Prerequisite
You must be an NM user with "NE operator" authority or higher.
Procedure
Step 1 In the NE Explorer, select an NE and choose Configuration > CES Service Management from
the Function Tree.
Step 2 Click New, and the Create CES Service dialog box is displayed. In this dialog box, configure
the UNI-UNI service.
NOTE
l In the case of the UNI-UNI service, QoS and Advanced Attributes do not need to be set.
Step 3 Set attributes related to the UNI-UNI service. For details on the parameters for UNI-UNI service
of CES, see Table 6-10.
1. Configure the parameters of the service.
NOTE
----End
Prerequisite
l You must be an NM user with "NE operator" authority or higher.
l The DCN of the port with the CES service must be disabled.
l The CES service interface must be configured. The interface mode must set to Layer 1.
The frame format and frame mode must be set.
l The tunnel must be created. For configuration method, see 5.5 Creating a Static MPLS
Tunnel by Using the Trail Function or 5.6 Creating an MPLS Tunnel on a Per-NE
Basis.
Procedure
Step 1 In the NE Explorer, select an NE and choose Configuration > CES Service Management from
the Function Tree.
Step 2 Click New, and the Create CES Service dialog box is displayed. In this dialog box, configure
the UNI-NNI CES services.
NOTE
NOTE
NOTE
NOTE
6. Click Apply. A dialog box is displayed, indicating that the operation is successful. Click
Close.
----End
Between BTS and BSC, the CES service is transported through the OptiX RTN 950 equipment,
as shown in Figure 6-6.
BTS
NE3 BSC
NE2
BTS
Between BTS and NE2, two CES services are configured. All the timeslots of one E1 are
occupied, and timeslots 1-14 and 20 of another E1 are occupied. Between BTS and NE1, the
service is configured through one E1 interface. All the timeslots of the E1 are occupied.
Service Planning
Table 6-5 Parameters for configuring the CES service: NE2-NE3 (The E1 timeslots are fully
occupied.)
Level E1 E1
Service ID 4 4
PW ID 6 6
PW Ingress Label 35 35
PW Egress Label 35 35
EXP 4 4
Table 6-6 Parameters for configuring the CES service: NE2-NE3 (The E1 timeslots are partially
occupied.)
Attribute Value Value
Level E1 E1
Service ID 5 5
PW ID 8 8
PW Ingress Label 36 36
PW Egress Label 36 36
EXP 4 4
Table 6-7 Parameters for configuring the CES service: NE1-NE3 (The E1 timeslots are fully
occupied.)
Attribute Value Value
Level E1 E1
Service ID 6 6
PW ID 9 9
PW Ingress Label 37 37
PW Egress Label 37 37
EXP 4 4
Prerequisite
You must be an NM user with "NE operator" authority or higher.
You must be familiar with the networking diagram, requirements, and service planning.
Procedure
Step 1 Configure the microwave port that carries the MPLS tunnel. For details of the configuration, see
4.5 Configuring Microwave Interfaces.
Step 2 Configure the E1 port that carries the CES service. For details of the configuration, see 4.2
Configuring PDH Interfaces.
Step 3 Configure the MPLS tunnel that carries the CES service. For details of the configuration, see 5
Configuring an MPLS Tunnel.
Step 4 Create the CES Remote Service 1. For details of the configuration, see 6.3.2 Creating a UNI-
NNI CES Service by Using the Trail Function.
The parameters are set as follows:
l Basic Information
– Service Level: E1
– Service Name: CES Local Service 1
– Service ID: 4
– Customer: All
– Remarks: -
l Source
– NE: NE2
– Port: 2-ML1
– High Path: -
– Low Path: 1
– 64K Timeslot: -
l Sink
– NE: NE3
– Port: 2-ML1
– High Path: -
– Low Path: 1
– 64K Timeslot: -
l PW
– ID: 6
– Signaling Type: Static
– Encapsulation Type: SAToP
– Uplink Label: 35
– Downlink Label: 35
– Uplink Tunnel: 2(Tunnel-0002)
– Downlink Tunnel: 4(Tunnel-0004)
l Advanced
– RTP Head: Disabled
– Packet Loading Time(us): 1000
– Jitter Compensation Buffering Time(us): 5000
– Uplink Clock Mode: External Clock Mode
– Downlink Clock Mode: External Clock Mode
Step 5 Create the CES Remote Service 2. For details of the configuration, see 6.3.2 Creating a UNI-
NNI CES Service by Using the Trail Function.
The parameters are set as follows:
l Basic Information
– Service Level: E1
– Service Name: CES Remote Service 2
– Service ID: 5
– Customer: All
– Remarks: -
l Source
– NE: NE2
– Port: 2-ML1
– High Path: -
– Low Path: 2
– 64K Timeslot: 1-14, 20
l Sink
– NE: NE3
– Port: 2-ML1
– High Path: -
– Low Path: 2
– 64K Timeslot: 1-14, 20
l PW
– ID: 8
– Signaling Type: Static
– Encapsulation Type: CESoPSN
– Uplink Label: 36
– Downlink Label: 36
– Uplink Tunnel: 2(Tunnel-0002)
– Downlink Tunnel: 4(Tunnel-0004)
l Advanced
– RTP Head: Disabled
– Packet Loading Time(us): 1000
– Jitter Compensation Buffering Time(us): 5000
– Uplink Clock Mode: External Clock Mode
– Downlink Clock Mode: External Clock Mode
Step 6 Create the CES Remote Service 3. For details of the configuration, see 6.3.2 Creating a UNI-
NNI CES Service by Using the Trail Function.
l Basic Information
– Service Level: E1
– Service Name: CES Remote Service 3
– Service ID: 6
– Customer: All
– Remarks: -
l Source
– NE: NE1
– Port: 2-ML1
– High Path: -
– Low Path: 1
– 64K Timeslot: -
l Sink
– NE: NE3
– Port: 2-ML1
– High Path: -
– Low Path: 3
– 64K Timeslot: -
l PW
– ID: 9
– Signaling Type: Static
– Encapsulation Type: SAToP
– Uplink Label: 37
– Downlink Label: 37
– Uplink Tunnel: 3(Tunnel-0003)
– Downlink Tunnel: 5(Tunnel-0005)
l Advanced
– RTP Head: Disabled
– Packet Loading Time(us): 1000
– Jitter Compensation Buffering Time(us): 5000
– Uplink Clock Mode: External Clock Mode
– Downlink Clock Mode: External Clock Mode
----End
Prerequisite
You must be an NM user with "NE operator" authority or higher.
You must be familiar with the networking diagram, requirements, and service planning.
Procedure
Step 1 Configure the E1 port that carries the CES service. For details of the configuration, see 4.2
Configuring PDH Interfaces.
Step 2 Configure the microwave port that carries the MPLS tunnel. For details of the configuration, see
4.5 Configuring Microwave Interfaces.
Step 3 Configure the MPLS tunnel that carries the CES service. For details of the configuration, see 5
Configuring an MPLS Tunnel.
Step 4 Create the CES Remote Service 1. For details of the configuration, see 6.3.4 Creating a UNI-
NNI CES Service on a Per-NE Basis.
1. Set parameters for NE2.
The configuration parameters are as follows:
l Service ID: 4
l Service Name: CES Remote Service 1
l Level: E1
l Type: E-Line
l Mode: UNI-NNI
l Source Board: 2-ML1
l Source Low Path: 1
l PW ID: 6
l PW Signaling Type: Static
l PW Type: SAToP
l PW Ingress Label: 35
l PW Egress Label: 35
l Peer IP: 10.10.10.3
l Tunnel: 2(Tunnel-0002)
l RTP Head: Disabled
l Jitter Compensation Buffering Time(us): 5000
l Packet Loading Time(us): 1000
l Clock Mode: External Clock Mode
l EXP: 4
2. Set parameters for NE3.
The configuration parameters are as follows:
l Service ID: 4
l Service Name: CES Remote Service 1
l Level: E1
l Type: E-Line
l Mode: UNI-NNI
l Source Board: 2-ML1
l Source Low Path: 1
l PW ID: 6
l PW Signaling Type: Static
l PW Type: SAToP
l PW Ingress Label: 35
l PW Egress Label: 35
l Peer IP: 10.10.10.2
l Tunnel: 2(Tunnel-0002)
l RTP Head: Disabled
l Jitter Compensation Buffering Time(us): 5000
l Packet Loading Time(us): 1000
l Clock Mode: External Clock Mode
l EXP: 4
Step 5 Create the CES Remote Service 2. For details of the configuration, see 6.3.4 Creating a UNI-
NNI CES Service on a Per-NE Basis.
1. Set parameters for NE2.
l Service ID: 5
l Service Name: CES Remote Service 2
l Level: E1
l Type: E-Line
l Mode: UNI-NNI
l Source Board: 2-ML1
l Source Low Path: 2
l Source 64K Timeslot: 1-14, 20
l PW ID: 8
l PW Signaling Type: Static
l PW Type: CESoPSN
l PW Ingress Label: 36
l PW Egress Label: 36
l Peer IP: 10.10.10.3
l Tunnel: 2(Tunnel-0002)
l RTP Head: Disabled
l Jitter Compensation Buffering Time(us): 5000
l Packet Loading Time(us): 1000
l Clock Mode: External Clock Mode
l EXP: 4
2. Set parameters for NE3.
l Service ID: 5
l Service ID: 6
l Service Name: CES Remote Service 3
l Level: E1
l Type: E-Line
l Mode: UNI-NNI
l Source Board: 2-ML1
l Source Low Path: 3
l PW ID: 9
l PW Signaling Type: Static
l PW Type: SAToP
l PW Ingress Label: 37
l PW Egress Label: 37
l Peer IP: 10.10.10.1
l Tunnel: 3(Tunnel-0003)
l RTP Head: Disabled
l Jitter Compensation Buffering Time(us): 5000
l Packet Loading Time(us): 1000
l Clock Mode: External Clock Mode
l EXP: 4
----End
High Path VC-4 supported by the board Set the high path.
In the case of the line port, set
the VC-4 higher order path
number.
Low Path Lower order timeslot number Set the low path.
or tributary port number In the case of the E1 port, set
supported by the board the E1 port number. In the
case of the line port, set the
VC-12 lower order path
number.
The equipment currently
supports point-to-point CES
services only. Therefore, you
can specify only one value
here.
Tunnel Type MPLS Tunnel, IP Tunnel, Select the tunnel that carries
GRE Tunnel the service.
NOTE
In the case of the OptiX RTN
910 or OptiX RTN 950, only
MPLS tunnel is used.
Tunnel Name For example, shenzhen Select the tunnel that carries
(Tunnel-0001) the service.
Auto assign label Checked, Unchecked After you select Auto assign
label, the system
automatically assigns the
Uplink Label/Source Port
and Downlink Label/Sink
Port for the PW.
Table 6-9 Descriptions of the parameters for Advanced Attributes of CES Service Management
Field Value Description
Packet Loading Time (us) RTN 950: 125 to 5000 Set the packet loading time.
Set the packet loading time to
increase the efficiency in
encapsulation.
Jitter Compensation RTN 950: 375 to 16000 Set the jitter compensation
Buffering Time(us) buffering time.
The jitter compensation
buffering time is set to ensure
that the CES service is real-
time.
NOTE
Different RTN devices support
the different ranges of jitter
compensation buffering time.
When the value exceeds the
range, an error message is
displayed.
The value of Jitter
Compensation Buffering
Time(us) must be greater than
the value of Packet Loading
Time(us) on the opposite end.
Ingress Clock Mode/Source Adaptive Clock Mode, Line Set the clock mode. The
Clock Mode, Null clock mode is set to ensure
correct restoration of the CES
service at the sink. Apply the
default value for Ingress
Clock Mode/Source.
Ingress Clock Mode/Sink Adaptive Clock Mode, Line Set the clock mode. The
Clock Mode, Null clock mode is set to ensure
correct restoration of the CES
service at the sink. Apply the
default value for Ingress
Clock Mode/Source.
Table 6-10 Descriptions of the parameters for PW General Attributes of CES service
management
Field Value Description
Source Board Example: Slot-Board Sets the source board of the CES
Name-Port(Port No.) service.
Source High Channel Example: VC4-1 Sets the source high channel.
In the case of the line port, set the
VC-4 higher order path number.
Source 64K Timeslot Example: 1-31 Sets the compressed source 64K
timeslot.
Sink Board Example: Slot-Board Sets the sink board of the CES
Name-Port(Port No.) service.
Sink High Channel Example: VC4-1 Sets the sink high channel.
In the case of the line port, set the
VC-4 higher order path number.
Sink 64K Timeslot Example: 1-31 Sets the compressed sink 64K
timeslot.
Table 6-11 Descriptions of the parameters for QoS of CES Service Management
Field Value Description
Table 6-12 Descriptions of the parameters for Advanced Attributes of CES Service Management
Field Value Description
Packet Loading Time(us) RTN 950: 125 to 5000 Set the packet loading time.
Set the packet loading time to
increase the efficiency in
encapsulation.
Jitter Compensation RTN 950: 375 to Set the jitter compensation buffer
Buffering Time (us) 16000 time.
The jitter compensation buffer time
is set to ensure that the CES service
is real-time.
NOTE
Different RTN devices support the
different ranges of jitter compensation
buffering time. When the value exceeds
the range, an error message is displayed.
The value of Jitter Compensation
Buffering Time(us) must be greater
than the value of Packetisation
Buffering Time(us) on the opposite
end.
Ingress Clock Mode Adaptive Clock Mode, Set the ingress clock mode.
Line Clock Mode, Null The clock mode is set to ensure
correct recovery of the CES service
at the sink.
This section describes basic information on the ATM service, and illustrates how to configure
an ATM service with an example.
UNI-UNI
Node B
UNI-NNI
RNC
Node B
IMA Link
STM-1 ATM Link
PW Node B
Tunnel
The ATM UNIs-NNI service supports the convergence of multiple ATM connections into a PW
for transmission. As shown in Figure 7-2, three ATM connections are encapsulated into a PW.
Constant bit rate Voice services, video PCR, CDVT The CBR supports
(CBR) service services of a constant the strict
bit rate, and circuit requirements for
emulation services CTD and CDV, but
does not support
services with
variable delay.
Unspecified bit rate LAN emulation, IP PCR, CDVT The UBR does not
(UBR) service over ATM, and non- require a strict delay
special traffic and the delay
services variation. Besides, it
does not provide a
special QoS or
ensure the output.
Real time variable bit Audio services, and PCR, SCR, CDVT, The rtVBR supports
rate (rtVBR) service video services of a MBS time-sensitive
variable bit rate service applications
and have restrictions
on the delay and
delay variation.
Non real time Data packet PCR, SCR, MBS The nrtVBR does not
variable bit rate transmission, have restrictions on
(nrtVBR) service terminal meeting, the delay and delay
and file transmission variation but
supports application
of services with the
variable rate and
burst traffic features.
Congestion Control
Traffic parameter control is based on the connection and cells, but congestion control relates to
different service types.
If a network requires discarding cells, a better solution of congestion is to discard packets rather
than cells. When an NE discards cells, it also discards a part of the packet. As a result, the upper
layer protocol, such as the TCP/IP protocol, is retransmitted, and thus congestion or even collapse
occurs.
Task Remarks
1. Creating To create a network, you need to create NEs, configure NE data, create
Network fibers, and configure the clock.
Task Remarks
2. Configuring the The ATM policy is used for traffic management of the ATM service.
ATM Policy
3. Configure thing Configure the UNI port that accesses the ATM service.
ATM Interface
Optional
Creating Network
Configure the
network-side
interface
Configure the
Tunnel
Configure the
UNIs-NNI ATM
service
End
1. Creating To create a network, you need to create NEs, configure NE data, create
Network fibers, and configure the clock.
2. Configure the Set the general attributes and Layer 3 attributes (tunnel enable status and
network-side IP address) for interfaces to carry the tunnel carrying.
interface
3. Creating an Configure the MPLS tunnel that carries the ATM services.
MPLS Tunnel by You can configure the MPLS tunnel on the per-NE basis or by using trail
Using the Trail management. Set the tunnel ID, select static signaling type, set other
Function or relevant information such as the service name, ingress node, egress node,
Creating an and transit node.
MPLS Tunnel on
a Per-NE Basis
4. Configure the The ATM policy is used for traffic management of the ATM service.
ATM Policy
6. Configuring Set the attributes of the ATM services and PWs that carry the ATM
the UNI-UNI services.
ATM Service by
Using Trail
Management or
Configuring the
UNI-UNI ATM
Service on the
Per-NE Basis
E1 1. In General attributes for the PDH interface, set the port mode to
Layer 2. For details, see 4.2.1 Setting General Attributes of PDH
Interfaces.
2. In Advanced Attributes for the PDH interface, set the Frame
Format and Frame Mode. For details, see 4.2.3 Setting the
Advanced Attributes of PDH Interfaces.
3. Configuring bound channels in an ATM IMA Group, for details, see
Configuring Bound Channels in an ATM IMA Group in the Feature
Description.
4. Set attributes of the ATM IMA group. In particular, specify the IMA
Transmit Frame Length, set the IMA Symmetry Mode, and enable
the IMA protocol. For details, see Configuring Attributes of an ATM
IMA Group in the Feature Description.
5. Set attributes of the ATM interface. In particular, set the interface
type, maximum VPI, and maximum VCI. For details, see
Configuring ATM Interface Attributes in the Feature Description.
E1 board
(For 64K 1. In General attributes for the PDH interface, set the port mode to
example: times Layer 1. For details, see 4.2.1 Setting General Attributes of PDH
ML1) lots Interfaces.
2. In Advanced Attributes for the PDH interface, set the Frame
Format and Frame Mode. For details, see 4.2.3 Setting the
Advanced Attributes of PDH Interfaces.
3. Create a serial port and specify the timeslots used by the service. Set
the port mode to Layer 2 and the encapsulation type is ATM. For
details, see 4.4.1 Creating Serial Interfaces.
4. Configuring bound channels in an ATM IMA Group, for details, see
Configuring Bound Channels in an ATM IMA Group in the Feature
Description.
5. Set attributes of the ATM IMA group. In particular, specify the IMA
Transmit Frame Length, set the IMA Symmetry Mode, and enable
the IMA protocol. For details, see Configuring Attributes of an ATM
IMA Group in the Feature Description.
6. Set attributes of the ATM interface. In particular, set the interface
type, maximum VPI, and maximum VCI. For details, see
Configuring ATM Interface Attributes in the Feature Description.
VC1 1. Configuring bound channels in an ATM IMA Group, for details, see
2 Configuring Bound Channels in an ATM IMA Group in the Feature
Description.
2. Set attributes of the ATM IMA group. In particular, specify the IMA
Transmit Frame Length, set the IMA Symmetry Mode, and enable
the IMA protocol. For details, see Configuring Attributes of an ATM
IMA Group in the Feature Description.
3. Set attributes of the ATM interface. In particular, set the interface
type, maximum VPI, and maximum VCI. For details, see
Channeli
Configuring ATM Interface Attributes in the Feature Description.
zed
STM-1 64K 1. Create a serial port and specify the timeslots used by the service. Set
board times the port mode to Layer 2 and the encapsulation type is ATM. For
(For lots details, see 4.4.1 Creating Serial Interfaces.
example:
2. Configuring bound channels in an ATM IMA Group, for details, see
CD1)
Configuring Bound Channels in an ATM IMA Group in the Feature
Description.
3. Set attributes of the ATM IMA group. In particular, specify the IMA
Transmit Frame Length, set the IMA Symmetry Mode, and enable
the IMA protocol. For details, see Configuring Attributes of an ATM
IMA Group in the Feature Description.
4. Set attributes of the ATM interface. In particular, set the interface
type, maximum VPI, and maximum VCI. For details, see
Configuring ATM Interface Attributes in the Feature Description.
ATM service and the PW attributes in a user interface of the U2000. In this way, the ATM service
can be fast created.
Prerequisite
l You must be an NM user with "NE operator" authority or higher.
l The ports must be configured. If IMA services are accessed, you must complete the
configuration of an IMA group. For configuration method, see Configuring the IMA in
Feature Description.
l You must complete the configuration of the ATM policy. For configuration method, see
Creating the ATM Policy in Feature Description.
l You must complete the creation of a tunnel. For configuration method, see 5.5 Creating a
Static MPLS Tunnel by Using the Trail Function.
Background Information
The OptiX RTN equipment can access services at the E1/VC-12 level or 64K timeslot level.
When the OptiX RTN equipment accesses the services at the E1/VC-12 level, all the available
timeslots of the E1/VC-12 channels are used to transport services. When the OptiX RTN
equipment accesses the services at the 64K timeslot level, one E1/VC-12 channel can be used
to transport both the ATM services and CES services (certain timeslots allocated for ATM
services and others for CES services). In this manner, the E1/VC-12 channels are used flexibly.
Procedure
Step 1 Choose Service > PTN Service > Create ATM Service from the Main Menu.
Step 2 Create a UNI-UNI or UNIs-NNI service in the Create ATM Service window.
NOTE
For the UNI-UNI service, you need not specify a PW and set parameters of the PW. For the UNIs-NNI
service, you need specify a PW and set parameters of the PW.
For the ATM Service type, you can select the following.
l PVP: Only the VPI value of the ATM connection can be modified.
l PVC: The VPI and VCI values of the ATM connection can be modified.
2. In Source, click Browse and select the source NE and source port of the service. In Sink,
click Browse and select the sink NE and sink port of the service. For details on the
parameters for the source/sink port of the ATM service, see Table 7-9.
NOTE
For a UNI-UNI service, select the same source and sink NEs. Select one source port and one sink
port.
3. In ATM Connection, click Add to add an ATM connection. For details on the parameters
for ATM connection, see Table 7-9.
NOTE
l Modify the VPI and VCI or not, according to the ATM Service type.
l You can proceed with the next operation only after selecting the uplink and downlink ATM
policies of the ATM connection.
l When Active is not selected, the service is only stored on the U2000 side. When Active is selected,
the service can be delivered from the U2000 side to the NE side.
For the ATM Service type, you can select the following.
l PVP: Only the VPI value of the ATM connection can be modified.
l PVC: The VPI and VCI values of the ATM connection can be modified.
2. In Source, click Browse and select the source NE and source port of the service. In Sink,
click Browse and select the sink source and sink port of the service. For details on the
parameters for the source/sink port of the ATM services, see Table 7-9.
NOTE
For a UNIs-NNI service, select different source and sink NEs.
3. In ATM Connection, click Add to add an ATM connection. For details on the parameters
for ATM connection, see Table 7-9.
NOTE
l Modify the VPI and VCI or not, according to the ATM Service type.
l The Sink VPI value ranges from 0 to Max. VPI. The Sink VCI value ranges from 32 to Max.
VCI.
l If Encapsulation Type is set n-to-one, you can add several ATM connections.
l You can proceed with the next operation only after selecting the uplink and downlink ATM
policies of the ATM connection.
4. Click Next. The Create ATM Service dialog box is displayed. Configure the PW and set
the parameters. For details on the parameters for PW attributes, see Table 7-10.
NOTE
When Active is not selected, the service is only stored on the U2000 side. When Active is selected,
the service can be delivered from the U2000 side to the NE side.
Step 6 Click Finish. The Operation Result window is displayed. Click Close.
----End
Prerequisite
l You must be an NM user with "NE operator" authority or higher.
l The ports must be configured. If IMA services are accessed, you must complete the
configuration of an IMA group. For configuration method, see Configuring the IMA.
l You must complete the configuration of the ATM policy. For configuration method, see
Creating the ATM Policy.
l You must complete the creation of a tunnel. For configuration method, see 5.6 Creating
an MPLS Tunnel on a Per-NE Basis.
Background Information
The OptiX RTN equipment can access services at the E1/VC-12 level or 64K timeslot level.
When the OptiX RTN equipment accesses the services at the E1/VC-12 level, all the available
timeslots of the E1/VC-12 channels are used to transport services. When the OptiX RTN
equipment accesses the services at the 64K timeslot level, one E1/VC-12 channel can be used
to transport both the ATM services and CES services (certain timeslots allocated for ATM
services and others for CES services). In this manner, the E1/VC-12 channels are used flexibly.
Procedure
Step 1 In the NE Explorer, select an NE and choose Configuration > ATM Service Management
from the Function Tree.
Step 2 Click the Connection tab. Click New. The New ATM Service window is displayed. In the
window, configure a UNIs-NNI or UNI-UNI service.
NOTE
l For the UNIs-NNI service, set the attributes in the Connection, PW and CoS Mapping tabs.
l For the UNI-UNI service, set only the attributes in the Connection tab.
NOTE
3. Click the PW tab and click Add. The Configure PW window is displayed. In the window,
set attributes of the PW.
4. Click the General Attributes tab and set the general attributes of PW. For details on the
parameters for general attributes of PW, see Table 7-13.
5. Optional: Click the QoS tab and set the QoS attribute of PW. For details on the parameters
for QoS attributes of PW, see Table 7-13.
6. Optional: Click the Advanced Attributes tab and set the advanced attributes of PW. For
details on the parameters for advanced attributes of PW, see Table 7-13.
7. Click the CoS Mapping tab and click Add to configure the CoS mapping table. For details
on the parameters for the CoS mapping table, see Table 7-14 andTable 7-15.
NOTE
You can configure the CoS mapping only after configuring the parameters in the PW tab.
8. Click OK.
Step 6 In the New ATM Service window, click OK. A dialog box is displayed, indicating that the
operation is successful. Click Close.
----End
Node B 1
IMA 2
Node B 2
Service VPI VCI VPI VCI VPI VCI VPI VCI
R99 1 100 60 32 60 32 60 32
HSDPA 1 101 61 32 61 32 61 32
IMA Planning
VCC-Supported VPI 32 32 32
Count
Clp01Pcr(cell/s) 1000 -
Clp01Scr(cell/s) - -
Clp0Scr(cell/s) - -
MBS(cell) - -
CDVT(us) 100000 -
ATM Connection 1 (the R99 service of NodeB1 and the HSDPA service of NodeB1)
Source VPI 1 1
Sink VPI 50 51
Sink VCI 32 32
Transit VPI 50 51
Transit VCI 32 32
ATM Connection 2 (the R99 service of NodeB2 and the HSDPA service of NodeB2)
Source VPI 1 1
Sink VPI 60 61
Sink VCI 32 32
Transit VPI 60 61
Transit VCI 32 32
PW
PW ID 6 8
PW Ingress Label 35 36
PW Egress Label 35 36
Prerequisite
You must be an NM user with "NE operator" authority or higher.
You must be familiar with the networking diagram, requirements, and service planning.
Procedure
Step 1 Configure the microwave port that carries the MPLS tunnel. For details of the configuration, see
4.5 Configuring Microwave Interfaces.
Step 2 Create the MPLS tunnel that carries the ATM service. For details of the configuration, see 5
Configuring an MPLS Tunnel.
Step 3 Configure two ATM policies, namely, UBR and CBR. For details of the configuration, see 3
Configuring the QoS Policy.
The policy parameters on RNC (NE2) are the same as the policy parameters on NodeB (NE1).
Before setting the port mode, make sure that the port DCN is disabled.
2. Configure the paths to be bound with the ATM IMA group. For details of the configuration,
see 4.8 Configuring the IMA.
4.4. The configuration parameters on the RNC are similar to the configuration parameters on
NodeB. For details, see 7.4.2 Service Planning.
Before setting the port mode, make sure that the port DCN is disabled.
l Configure the paths to be bound with the ATM IMA group.
– Available Boards: 2-ML1
– Configuration Ports: 2-ML1-1(Trunk-1)
– Available Binding Channel
– Level: E1
– Available Resources: Port: 2-ML1-1(Port-1) to 2-ML1-4 (Port-4)
l Set attributes of the ATM IMA group.
– Trunk: 2-ML1-1(Trunk-1)
– IMA Protocol Enable Status: Enabled
– Set Minimum Number of Active Transmitting Links, Minimum Number of Active
Receiving Links, IMA Protocol Version, IMA Transmit Frame Length, IMA
Symmetry Mode, and Maximum Delay Between Links(ms) parameters to be the same
as the parameters of the RNC.
l Set attributes of the ATM interface.
– Trunk: 2-ML1-1(Trunk-1)
– Port Type: UNI (A UNI interface is connected to the client-side equipment and an NNI
interface is connected to the ATM equipment on the core network.)
– ATM Cell Payload Scrambling: Enabled
– Max. VPI Bits: 8 (Set this parameter according to the networking planning. You can
specify the value range of VPI by setting Max. VPI Bits. The VPI ranges from 0 to
2MaxVPIbits-1.)
– Max. VCI Bits: 7 (Set this parameter according to the networking planning. You can
specify the value range of VCI by setting Max. VCI Bits. The VCI ranges from 0 to
2MaxVCIbits-1.)
– VCC-Supported VPI Count: 32 (Set this parameter according to the networking
planning.)
l Connection Type: PVC (PVC indicates that the VPI and VCI of the ATM
connection can be changed; PVP indicates that only the VPI of the ATM
connection can be changed.)
l Source NE: NE1
l Source Port:
2-ML1-1(Trunk1)
2-ML1-2(Trunk2)
l Sink NE: NE2
l Sink Port:
2-ML1-1(Trunk1)
l ATM Connection 1 (the R99 service of NodeB1)
– Source Port: 2-ML1-1(Trunk1)
– Source VPI: 1 (the VPI information transmitted with the service from NodeB)
– Source VCI: 100 (the VCI information transmitted with the service from
NodeB)
– Sink Port: 2-ML1-1(Trunk1)
– Sink VPI: 50 (The VPI information transmitted with the service after VPI
switching. The Sink VPI ranges from 0 to 2MaxVPIbits-1.)
– Sink VCI: 32 (The VCI information transmitted with the service after VCI
switching. The Sink VCI ranges from 0 to 2MaxVCIbits-1.)
– Uplink ATM Policy Name(ID): CBR (policy) (Select the CBR policy, because
connection 1 is an R99 service.)
– Downlink ATM Policy Name(ID): CBR (policy) (Select the CBR policy,
because connection 1 is an R99 service.)
– Transit VPI: 50
– Transit VCI: 32
l ATM Connection 2 (the R99 service of NodeB2)
– Source Port: 2-ML1-2(Trunk2)
– Source VPI: 1
– Source VCI: 101
– Sink Port: 2-ML1-1(Trunk1)
– Sink VPI: 60
– Sink VCI: 32
– Uplink ATM Policy Name(ID): CBR (policy) (Select the CBR policy, because
connection 2 is an R99 service.)
– Downlink ATM Policy Name(ID): CBR (policy) (Select the CBR policy,
because connection 2 is an R99 service.)
– Transit VPI: 60
– Transit VCI: 32
b. Set PW-related parameters.
l PW ID: 6
l Protocol Type: Static
– Sink VPI: 51 (The VPI information transmitted with the service after VPI
switching. The Sink VPI ranges from 0 to 2MaxVPIbits-1.)
– Sink VCI: 32 (The VCI information transmitted with the service after VCI
switching. The Sink VCI ranges from 0 to 2MaxVCIbits-1.)
– Uplink ATM Policy Name(ID): UBR (policy) (Select the UBR policy, because
connection 1 is an HSDPA service.)
– Downlink ATM Policy Name(ID): UBR (policy) (Select the UBR policy,
because connection 1 is an HSDPA service.)
– Transit VPI: 51
– Transit VCI: 32
l ATM Connection 2 (the HSDPA service of NodeB2)
– Source Port: 2-ML1-2(Trunk2)
– Source VPI: 1
– Source VCI: 101
– Sink Port: 2-ML1-1(Trunk1)
– Sink VPI: 61
– Sink VCI: 32
– Uplink ATM Policy Name(ID): UBR (policy) (Select the UBR policy, because
connection 2 is an HSDPA service.)
– Downlink ATM Policy Name(ID): UBR (policy) (Select the UBR policy,
because connection 2 is an HSDPA service.)
– Transit VPI: 61
– Transit VCI: 32
b. Set PW-related parameters.
l PW ID: 8
l Protocol Type: Static
l Uplink Label/Source Port: 36
l Downlink Label/Sink Port: 36
l Encapsulation Type: ATM n-to-one VPC cell transport (Select ATM n-to-one VPC
cell transport if multiple ATM connections are mapped into one PW; select ATM
one-to-one VCC Cell Mode if one ATM connection is mapped into one PW. In
this example, ATM n-to-one VPC cell transport is selected because two ATM
connections are mapped into one PW.)
l Direction: Bidirectional
l Tunnel Type: MPLS Tunnel
l Tunnel Name (ID): 3(Tunnel-003), 4(Tunnel-004)
l Control Word Use Policy: Must use
l Control Channel Type: CW (CW realizes connectivity check on the PW.)
l VCCV Verification Mode: Ping (PW Ping realizes connectivity check on the PW.)
l Max. Concatenated Cell Count: 20 (the maximum number of ATM cells that can
be encapsulated into each packet)
l Packet Loading Time(us): 1000
l NE: NE1
l CoS Mapping Name(ID): 1(Default AtmCosMap)
l NE: NE2
l CoS Mapping Name(ID): 1(Default AtmCosMap)
----End
Prerequisite
You must be an NM user with "NE operator" authority or higher.
You must be familiar with the networking diagram, requirements, and service planning.
Procedure
Step 1 Configure the microwave port that carries the MPLS tunnel. For details of the configuration, see
4.5 Configuring Microwave Interfaces.
Step 2 Create the MPLS tunnel that carries the ATM service. For details of the configuration, see 5
Configuring an MPLS Tunnel.
Step 3 Configure two ATM policies, namely, UBR and CBR. For details of the configuration, see 3
Configuring the QoS Policy.
– CDVT(us): 100000 (This parameter indicates the maximum delay of ATM cells. If the
delay is set to an excessively small value, the bucket may exceptionally lose packets when
cells burst. To prevent a large number of packets from being lost, set this parameter to a
value as large as possible.)
– Enable Traffic Frame Discarding: No
– UPC/NPC: Enabled
The policy parameters on RNC (NE2) are the same as the policy parameters on NodeB (NE1).
Step 4 Configure the ATM interface on NodeB side of NE1.
1. Configure the PDH interface. For details of the configuration, see 4.2 Configuring PDH
Interfaces.
The parameters are set as follows:
l Port: 2-ML1-1(Port-1) to 2-ML1-5(Port-5)
l Name: NodeB ATM (Set the port name according to the requirement. The port name
distinguishes the port from the other ports and helps to query the port.)
l Port Mode: Layer 2 (The port transmits IMA signals.)
l Encapsulation: ATM
NOTE
Before setting the port mode, make sure that the port DCN is disabled.
2. Configure the paths to be bound with the ATM IMA group. For details of the configuration,
see 4.8 Configuring the IMA.
Set the parameters related to 2-ML1-1(Trunk-1) as follows:
l Available Boards: 2-ML1
l Configuration Ports: 2-ML1-1(Trunk-1)
l Available Binding Channel
– Level: E1
– Available Resources: Port: 2-ML1-1(Port-1), 2-ML1-2(Port-2)
Set the parameters related to 2-ML1-2(Trunk-2) as follows:
l Available Boards: 2-ML1
l Configuration Ports: 2-ML1-2(Trunk-2)
l Available Binding Channel
– Level: E1
– Available Resources: Port: 2-ML1-3(Port-3) to 2-ML1-5 (Port-5)
3. Set attributes of the ATM IMA group. For details of the configuration, see 4.8 Configuring
the IMA.
Set the parameters related to 2-ML1-1(Trunk-1) as follows:
l IMA Protocol Enable Status: Enabled
l Set Minimum Number of Active Transmitting Links, Minimum Number of Active
Receiving Links, IMA Protocol Version, IMA Transmit Frame Length, IMA
Symmetry Mode, and Maximum Delay Between Links(ms) parameters to be the
same as the parameters of NodeB side.
Set the parameters related to 2-ML1-2(Trunk-2) as follows:
Before setting the port mode, make sure that the port DCN is disabled.
l Configure the paths to be bound with the ATM IMA group.
– Available Boards: 2-ML1
– Configuration Ports: 2-ML1-1(Trunk-1)
– Available Binding Channel
– Level: E1
– Available Resources: Port: 2-ML1-1(Port-1) to 2-ML1-4 (Port-4)
l Set attributes of the ATM IMA group.
– Trunk: 2-ML1-1(Trunk-1)
– IMA Protocol Enable Status: Enabled
– Set Minimum Number of Active Transmitting Links, Minimum Number of Active
Receiving Links, IMA Protocol Version, IMA Transmit Frame Length, IMA
Symmetry Mode, and Maximum Delay Between Links(ms) parameters to be the same
as the parameters of the RNC.
l Set attributes of the ATM interface.
– Trunk: 2-ML1-1(Trunk-1)
– Port Type: UNI (A UNI interface is connected to the client-side equipment and an NNI
interface is connected to the ATM equipment on the core network.)
– ATM Cell Payload Scrambling: Enabled
– Max. VPI Bits: 8 (Set this parameter according to the networking planning. You can
specify the value range of VPI by setting Max. VPI Bits. The VPI ranges from 0 to
2MaxVPIbits-1.)
– Max. VCI Bits: 7 (Set this parameter according to the networking planning. You can
specify the value range of VCI by setting Max. VCI Bits. The VCI ranges from 0 to
2MaxVCIbits-1.)
– VCC-Supported VPI Count: 32 (Set this parameter according to the networking
planning.)
– Transit VCI: 32
l Connection 2
– Source Board: 2-ML1
– Source Port: 2(Trunk-2)
– Source VPI(e.g.35,36-39): 1
– Source VCI(e.g.35,36-39): 100
– PW ID: 6
– Source VPI(e.g.35,36-39): 60
– Source VCI(e.g.35,36-39): 32
– Uplink Policy: CBR (policy) (Select the CBR policy, because connection 2 is an
R99 service.)
– Downlink Policy: CBR (policy) (Select the CBR policy, because connection 2 is an
R99 service.)
– Transit VPI: 60
– Transit VCI: 32
2. Set the PW-related parameters. For details of the configuration, see 7.3.2 Creating ATM
Services on a Per-NE Basis.
The parameters are set as follows:
l General Attributes
– PW ID: 6
– PW Signaling Type: Static
– PW Ingress Label/Source Port: 35
– PW Egress Label/Sink Port: 35
– PW Type: ATM n-to-one VCC cell transport (Select ATM n-to-one VPC cell
transport if multiple ATM connections are mapped into one PW; select ATM one-
to-one VCC Cell Mode if one ATM connection is mapped into one PW. In this
example, ATM n-to-one VPC cell transport is selected because two ATM
connections are mapped into one PW.)
– Tunnel Type: MPLS
– Tunnel: 1(Tunnel-0001)
– Peer IP: 1.1.1.2
l Advanced Attributes
– Control Word: Must use
– Control Channel Type: CW (CW realizes connectivity check on the PW.)
– VCCV Verification Mode: Ping (CW realizes connectivity check on the PW.)
– Max. Concatenated Cell Count: 10 (the maximum number of ATM cells that can be
encapsulated into each packet)
– Packet Loading Time(us): 1000
3. Set CoS attributes of PW1. For details of the configuration, see 7.3.2 Creating ATM
Services on a Per-NE Basis.
Configure the CoS mapping of PW1 as follows:
l PW ID: 6
– PW ID: 6
– PW Signaling Type: Static
– PW Ingress Label/Source Port: 35
– PW Egress Label/Sink Port: 35
– PW Type: ATM n-to-one VCC cell transport
– Tunnel Type: MPLS
– Tunnel: 2(Tunnel-0002)
– Peer IP: 1.1.1.1
– Advanced Attributes
– Control Word: Must use
– Control Channel Type: CW
– VCCV Verification Mode: PING
– Max. Concatenated Cell Count: 10
– Packet Loading Time(us): 1000
l Configure the CoS mapping of PW1 as follows:
– PW ID: 6
– CoS Mapping: 1(Default AtmCosMap)
5. Create an ATMService-HSDPA service. For details of the configuration, see Step 6.1 to
Step 6.4.
The configuration parameters on NE1 are as follows:
l Set the general attributes of the ATM service as follows:
– Service ID: 2
– Service Name: ATMService-HSDPA
– Service Type: UNIs-NNI
– Connection Type: PVC
l Configure the ATM connection.
– Connection 1
– Source Board: 2-ML1
– Source Port: 1(Trunk-1)
– Source VPI(e.g.35,36-39): 1
– Source VCI(e.g.35,36-39): 101
– PW ID: 8
– Sink Board: -
– Sink Port: -
– Sink VPI: 51
– Sink VCI: 32
– Uplink Policy: UBR (policy)
– Downlink Policy: UBR (policy)
– Transit VPI: 51
– Transit VCI: 32
– Connection 2
– Source Board: 2-ML1
– Source Port: 2(Trunk-2)
– Source VPI(e.g.35,36-39): 1
– Source VCI(e.g.35,36-39): 101
– PW ID: 8
– Sink VPI(e.g.35,36-39): 61
– Sink VCI(e.g.35,36-39): 32
– Uplink Policy: UBR (policy)
– Downlink Policy: UBR (policy)
– Transit VPI: 61
– Transit VCI: 32
l Set the parameters of PW2.
– General Attributes
– PW ID: 8
– PW Signaling Type: Static
– PW Ingress Label/Source Port: 36
– PW Egress Label/Sink Port: 36
– PW Type: ATM n-to-one VCC cell transport
– Tunnel Type: MPLS
– Tunnel: 3(Tunnel-0003)
– Peer IP: 1.1.1.2
– Advanced Attributes
– Control Word: Must use
– Control Channel Type: CW
– VCCV Verification Mode: PING
– Max. Concatenated Cell Count: 20
– Packet Loading Time(us): 1000
l Configure the CoS mapping of PW2 as follows:
– PW ID: 8
– CoS Mapping: 1(Default AtmCosMap)
– PW ID: 8
– CoS Mapping: 1(Default AtmCosMap)
----End
Connection Type PVP, PVC Select the switching type of the ATM
service.
l PVP indicates that only the VPI
values of the source and sink are
exchanged.
l PVC indicates that both the VPI and
VCI values of the source and sink are
exchanged.
Port Slot-Board Name-Port(Port Display the source port or sink port of the
No.) service.
Source Port NE name-Slot-Board Name- Display the source port connected to the
Port(Port No.) ATM.
Source VPI 0-Max VPI Set the VPI value of the source port.
For example, if the value of
Max. VPI is 255, the VPI
value ranges from 0 to 255.
Source VCI 32-Max VCI Set the VCI value of the source port.
For example, if the value of
Max. VCI 127, the VCI
value ranges from 32 to 127.
Sink Port NE name-Slot-Board Name- Display the sink port connected to the
Port(Port No.) ATM.
Sink VPI Example: 25 Set the VPI value of the sink port.
Sink VCI Example: 40 Set the VCI value of the sink port.
Uplink ATM Example: Policy (NE2:12- Select the QoS policy for the uplink ATM
Policy Name (ID) NE3:12) connection.
Downlink ATM Example: Policy (NE2:12- Select the QoS policy for the downlink
Policy Name (ID) NE3:12) ATM connection..
Tunnel Type MPLS Tunnel, IP Tunnel, GRE Set the tunnel type.
Tunnel NOTE
In the case of the OptiX RTN 910
or OptiX RTN 950, only MPLS
tunnel is used.
Tunnel Name (ID) Example: Uplink:Tunnel-10001 Select the tunnel that carries the
(10001),Downlink:Tun- PW.
nel-10002(10002)
Control Word Use Nonuse, Must Use Select whether to use the control
Policy word.
In an MPLS PSN network, the
control word carries the packet
information.
Control Channel Type CW, None Set the type of the control
channel.
Packet Loading Time 100 to 50000 Set the packet loading time.
(us)
Auto assign label Checked, Unchecked After you select Auto assign
label, the system automatically
assigns the In Label and Out
Label for the PW.
Connection Type Example: PVP, PVC Select the connection type of the
ATM service.
l PVP indicates that only the VPI
values of the source and sink are
exchanged.
l PVC indicates that both the VPI
and VCI values of the source
and sink are exchanged.
Source Board Example: Slot-Board Name Set the source board of the ATM
service.
Source Port Example: Slot-Board Name- Set the source port of the ATM
Port(Trunk No.) service.
Source VPI 0 to 4095 Set the VPI value of the source port.
Sink Board Example: Slot-Board Name Set the sink board of the ATM
service.
CAUTION
In the case of the UNIs-NNI service,
the sink board need not be set. In the
case of the UNI-UNI service, set the
sink board, which should not be the
source board.
Sink Port Example: Slot-Board Name- Set the sink port of the ATM
Port(Trunk No.) service.
CAUTION
In the case of the UNIs-NNI service,
the sink board need not be set. In the
case of the UNI-UNI service, set the
sink board, which should not be the
source board.
Sink VPI 0 to 4095 Set the VPI value of the sink port.
Sink VCI 32 to 65535 Set the VCI value of the sink port.
Uplink Policy Example: 3(Synchronize) Select the QoS policy for the
upstream ATM connection.
Down link Policy Example: 3(Synchronize) Select the QoS policy for the
downstream ATM connection.
Tunnel Type MPLS, IP, GRE Sets the type of the tunnel.
NOTE
In the case of the OptiX RTN
910 or OptiX RTN 950, only
MPLS tunnel is used.
Advanced Control Word Must use, No use Displays that the control
Attributes word must be used.
In an MPLS PSN network,
the control word carries the
packet information.
Service Type UBR, CBR, RT-VBR, NRT- Displays the ATM service
VBR, UBR+ classes.
l UBR is the ATM service
with an unspecified bit
rate. The UBR service is
used in a non-real time
manner, but no quality of
service (QoS) assurance
is available. Therefore, it
is suitable for
transmitting IP data
packets.
l CBR is the ATM service
with a constant bit rate.
The CBR service applies
to the connection that
requires static bandwidth.
In general, it supports real
time services that require
strict delay change (for
example, the audio,
imaging, and circuit
emulation services).
l RT-VBR is the ATM
service with a real time
variable bit rate. The RT-
VBR service is used in a
real time manner and has
a strict restriction on the
delay. It mainly supports
the audio and video
services.
l NRT-VBR is the ATM
service with a non-real
time variable bit rate. The
NRT-VBR service is used
in a burst and non-real
time manner. It can
ensure a very low ratio of
cell loss but has no
restriction on the delay.
l The UBR+ service
supports the setting of the
MCR parameter. There
are UBR+ services on
many NodeBs. The UBR
+ services are configured
with the MCR. When the
service rate does not
This section describes basic information on E-Line services, and uses an example to illustrate
how to configure an E-Line service.
UNI
B Company UNI
City1
branches in Company A need service isolation, services at the same UNI can be differentiated
through "port + VLANs". For a single station, in the uplink direction of the user side, complex
traffic classification can be performed for data packets, and different QoS policies can be used
according to the traffic classification.
In City 1 and City 2, Company A and Company B have branches. Communication between
branches of the same company is needed, but services between the two companies need to be
isolated. In this case, the communication between branches of Company A and Company B can
be realized by creating a UNI-NNI E-Line service carried by a PW. Services between the two
companies are isolated because different services are carried by different PWs.
Hence, the company service accessed at the user side is encapsulated into a PW, and then is
carried by the Tunnel.
Different E-Line services of different companies are carried by different PWs, and then are
transmitted to the same NNI. As a result, the number of NNIs is saved, and the bandwidth
utilization is increased. In the uplink direction of the user side, the hierarchical QoS can be
performed for data packets.
B Company
B Company City2
City1 UNI NNI NNI UNI
Tunnel
PW
Both Company A and Company B have branches in City 1 and City 2. Branches of each company
need to communicate with each other. The traffic from the two companies must be isolated. The
internal VLANs of Company A range from 1 to 100 and the internal VLANs of Company B
range from 1 to 200. In this case, you can configure a UNI-NNI E-Line service carried by a
QinQ link to meet the communication requirements. As different services are carried by QinQ
links of different values, traffic of different companies is isolated and the VLAN resources of
the packet switch network (PSN) are also saved.
In this case, different packets accessed at the user side from different companies are added with
different VLANs, and then carried by the same link at the network side.
As the E-Line services of different companies are added with one VLAN and transported to the
same port, the network-side port resources are saved and the bandwidth utilization is increased.
Also as only a small number of VLANs in the PSN are used, the VLAN resources of the network
are saved. To realize the QoS for the service carried by a QinQ link, configure the QinQ policy.
B Company
B Company
Required
Start
Optional
Creating Network
Configuring
Interfaces
Configuring UNI-UNI E-
Line Service
End
Task Remarks
1. Creating To create a network, you need to create NEs, configure NE data, create
Network fibers, and configure the clock.
2. Configuring the The QoS policy is used for traffic management of the E-Line service.
QoS Policy
3. Configuring the Configure the UNI port that accesses the E-Line service.
user-side
Interface
Task Remarks
Required
Start
Optional
Creating Network
Configuring
Interfaces
End
Table 8-2 Tasks for configuring the UNI-UNI E-Line service carried by a port
Task Remarks
1. Creating To create a network, you need to create NEs, configure NE data, create
Network fibers, and configure the clock.
2. Configure the The QoS policy is used for traffic management of the E-Line service.
QoS Policy
3. Configure the Configure the UNI port that accesses the E-Line service.
Interface
Creating Network
Configuring the
network-side
Interfaces
Configuring a
Tunnel
Configuring the
QoS Policy
Configuration Case of
the UNI-NNI E-Line
Service Carried by the
(Source NE)
PW
Configuration Case of
the UNI-NNI E-Line
Service Carried by the
(Sink NE)
PW
End
Table 8-3 Tasks for configuring the UNI-NNI E-Line service carried by PWs
Task Remarks
1. Creating To create a network, you need to create NEs, configure NE data, create
Network fibers, and configure the clock.
2. Configure the Set the general attributes and Layer 3 attributes (tunnel enable status and
network-side IP address) for interfaces to carry the tunnel carrying.
interface
3. Creating an Configure the MPLS tunnel that carries the E-Line service.
MPLS Tunnel by You can configure the MPLS tunnel on the per-NE basis or by using trail
Using the Trail management. Set the tunnel ID, select static signaling type, set other
Function or relevant information such as the service name, ingress node, egress node,
Creating an and transit node.
MPLS Tunnel on
a Per-NE Basis
4. Configure the The QoS policy is used for traffic management of the E-Line service.
QoS Policy
5. Configure the Configure the UNI port that accesses the E-Line service.
user-side
Interface
6. Configuring Set the attributes of the E-Line service and PWs that carry the E-Line
the UNI-NNI E- service.
Line Service on
the Per-NE Basis
or Configuring
the UNI-NNI E-
Line Service or
by Using Trail
Management
Required
Start
Optional
Creating Network
Configuring
Interfaces
Configuring QinQ
Link
End
Table 8-4 Tasks for configuring the UNI-NNI E-Line service carried by QinQ Link
Task Remarks
1. Creating To create a network, you need to create NEs, configure NE data, create
Network fibers, and configure the clock.
2. Configuring the The E-Line policy is used for traffic management of the E-Line service.
QoS Policy
3. Configuring the Configure the UNI port that accesses the E-Line service.
Interface
4. Configuring Create the QinQ link, and set the ID, board, port, S-Vlan, and QoS
QinQ Link information of the QinQ link.
The QinQ link encapsulates multiple VLAN packets to a VLAN on the
network side for transmission. This saves the VLAN resources on the
network.
Task Remarks
Prerequisite
You must be an NM user with "NE operator" authority or higher.
If a port need be exclusively used, disable the DCN function of the port that carries the service.
For details, see Enabling the Port DCN.
Procedure
Step 1 In the NE Explorer, select an NE and choose Configuration > Ethernet Service
Management > E-Line Service from Function Tree.
Step 2 Click the UNI tab and click New. The New E-Line Service dialog box is displayed.
Step 3 Set parameters in the dialog box.For details on the parameters for UNI ports of E-Line service,
see Table 8-12.
NOTE
Step 4 Optional: Click Configure QoS. The Configure QoS dialog box displayed.
Step 5 Optional: Click the UNI tab in the Configure QoS dialog box. Set Default Forwarding
Priority and Default Packet Relabeling Color for ports. Click OK. The New E-Line
Service dialog box is displayed.For details on the parameters for QoS of E-Line service, see
Table 8-14.
----End
Prerequisite
You must be an NM user with "NE operator" authority or higher.
If a port need be exclusively used, disable the DCN function of the port that carries the service.
For details, see Enabling the Port DCN.
Procedure
Step 1 Select the NE in the NE Explorer. Choose Configuration > Ethernet Service Management
> E-Line Service from Function Tree.
Step 2 Click the UNI tab and click New. The New E-Line Service dialog box is displayed.
Step 3 Set parameters in the dialog box.For details on the parameters for the E-Line service, see Table
8-12.
NOTE
Step 4 Optional: Click Configure QoS. The Configure QoS dialog box displayed.
Step 5 Optional: Click the UNI tab in the Configure QoS dialog box. Set Default Forwarding
Priority and Default Packet Relabeling Color for ports. Click OK. The New E-Line
Service dialog box is displayed.For details on the parameters for QoS of the E-Line service, see
Table 8-14.
----End
Prerequisite
You must be an NM user with "NE operator" authority or higher.
You must complete the creation of the MPLS tunnel that carries PWs.
If a port need be exclusively used, disable the DCN function of the port at the UNI side. For
details, see Enabling the Port DCN.
Procedure
Step 1 Select the NE in the NE Explorer. Choose Configuration > Ethernet Service Management
> E-Line Service from Function Tree.
Step 2 Click the UNI tab and click New. The New E-Line Service dialog box is displayed.
Step 3 Set parameters in the dialog box. For details on the parameters for UNI port of the E-Line service,
see Table 8-12.
NOTE
Step 4 Click Configure PW. The Configure PW dialog box is displayed. In the dialog box, set PW-
related parameters.For details on the parameters for PW of the E-Line service, see Table 8-13.
NOTE
----End
Prerequisite
You must be an NM user with "NE operator" authority or higher.
If a port need be exclusively used, disable the DCN function of the port that carries the service.
For details, see Enabling the Port DCN.
Procedure
Step 1 Choose Service > PTN Service > Create L2VPN E-Line Service from the Main Menu. The
Create L2VPN E-Line Service dialog box is displayed.
Step 2 In the Create L2VPN E-Line Service dialog box, set attributes related to the E-Line service.
For details on the parameters see Table 8-12.
NOTE
The source and sink NEs of the UNI-UNI service need to be the same.
When Active is not selected, the service is only stored on the U2000 side. When Active is selected, the
service can be delivered from the U2000 side to the NE side.
Step 3 Optional: Click Advanced. According to networking planning, set the QoS policy on the UNI
side in the displayed Advanced dialog box.
Step 4 Click Finish. The Operation Result window is displayed. Click Close.
----End
Prerequisite
You must be an NM user with "NE operator" authority or higher.
You must complete the creation of the MPLS tunnel that carries PWs.
If a port need be exclusively used, disable the DCN function of the port that carries the service.
For details, see Enabling the Port DCN.
Procedure
Step 1 Choose Service > PTN Service > Create L2VPN E-Line Service from the Main Menu. The
Create L2VPN E-Line Service dialog box is displayed.
Step 2 In the Create L2VPN E-Line Service dialog box, set parameters of the source and sink related
to the E-Line service.
NOTE
l For VLANs, you can set several VLANs. Separate consecutive VLANs with "-", and inconsecutive
VLANs with ",". For example, "1,3,5,8-10".
Step 3 Click Next and set PW-related parameters. Select the uplink tunnel and downlink tunnel that
carry the PW.
NOTE
Step 4 Optional: In QoS, set Bandwidth Limit to Enable. According to the network recruitment, set
CIR(kbit/s) and PIR(kbit/s) for the uplink and downlink.
Step 5 Optional: Click Advanced, and then set the QoS on the UNI side, QoS policy of the PW, EXP,
and LSP Mode in the displayed Advanced dialog box.
Step 7 Click Finish. The Operation Result window is displayed. Click Close.
----End
Prerequisite
You must be an NM user with "NE operator" authority or higher.
The Layer 2 attributes of the port on the QinQ link must be set and the encapsulation mode must
be the QinQ mode.
Procedure
Step 1 In the NE Explorer, click the NE and choose Configuration > Ethernet Service
Management > QinQ Link from the Function Tree.
Step 3 Click the General Attributes tab. Set QinQ Link ID, Board, Port and S-Vlan ID.
----End
Prerequisite
You must be an NM user with "NE operator" authority or higher.
Procedure
Step 1 In the NE Explorer, click the NE and choose Configuration > Ethernet Service
Management > E-Line Service from the Function Tree.
Step 2 Click the UNI tab and then click New. The New E-Line Service dialog box is displayed.
Step 4 Optional: Click Configure QoS. The Configure QoS dialog box displayed.
Step 5 Optional: Click the UNI tab in the Configure QoS dialog box. Set Policy, Default Forwarding
Priority and Default Packet Relabeling Color for ports. Click OK. The New E-Line
Service dialog box is displayed.For details on the parameters for QoS of E-Line service, see
Table 8-14.
Step 6 Click OK. The Operation Result dialog box is displayed, indicating that the operation is
successful. Click Close.
----End
Between NodeB and RNC, the Ethernet service is transported through the OptiX RTN 950
equipment, as shown in Figure 8-9.
FE FE
There are three types of Ethernet services between NodeB and RNC, as shown in Table 8-5.
QoS Planning
Table 8-8 QoS planning (CAR policy used in V-UNI Ingress policy)
CAR Policy CIR(kbit/s) PIR(kbit/s) CBS(byte) PBS(byte)
Name
NE1 NE2
NE1 NE2
Prerequisite
You must be an NM user with "NE operator" authority or higher.
You must be familiar with the networking diagram, requirements, and service planning.
Procedure
Step 1 Configure the E-Line services on NE1.
1. Create the V-UNI Ingress policy based on the QoS requirements of various services and
apply the policy to the service. For details of configuring the QoS, see 3 Configuring the
QoS Policy.
Set the CAR-related parameters of various services for the CAR policy as follows:
Set the QoS parameters of the services of different types in the V-UNI Ingress policy as
follows:
NOTE
The V-UNI Ingress policy is a QoS policy applied in the uplink direction of the service. Services in
the uplink direction are classified into three types. Hence, three types of traffic classification policies
are required, that is, one V-UNI Ingress policy distinguishes three flows.
2. Configure the microwave port that carries the Ethernet packet. For details of the
configuration, see 4.5 Configuring Microwave Interfaces.
3. Configure the FE port that carries the Ethernet packets. For details of the configuration,
see 4.3 Configuring Ethernet Interfaces.
4. Create an E-Line service on NE1. For details of the configuration, see 8.3.1 Creating a
UNI-UNI E-Line Service on a Per-NE Basis.
The parameters of the UNI-UNI E-Line service are as follows:
l Service ID: 1
l Service Name: E-Line
l Service Direction: UNI-UNI
l BPDU: Not Transparently Transmitted
l Port: 2-EFT8-1(Port-1)
l VLANs: 100, 200, 300
l Port: 3-IFE2-1(Port-1)
l VLANs: 100, 200, 300
l Policy: 1(E-Line Policy)
Step 2 Configure the E-Line services on NE2. The parameters and procedures for configuring the E-
Line services on NE2 are the same as the parameters and procedures for configuring the E-Line
services on NE1.
----End
RNC
FE
NE1
NE2
FE
BSC
BTS
NE1 NE2
PW
PW ID 35 45 35 45
PW Ingress 20 30 20 30
Label
PW Egress 20 30 20 30
Label
Prerequisite
You must be an NM user with "NE operator" authority or higher.
You must be familiar with the networking diagram, requirements, and service planning.
Procedure
Step 1 Configure the microwave port that carries the MPLS tunnel. For details of the configuration, see
4.5 Configuring Microwave Interfaces.
Step 2 Configure the FE port that carries the Ethernet packets on the NodeB side and BTS side. For
details of the configuration, see 4.3 Configuring Ethernet Interfaces.
Step 3 Create the MPLS Tunnel that carries the E-Line service. For details of the configuration, see 5
Configuring an MPLS Tunnel.
Step 4 Create the UNI-NNI E-Line service on NodeB side of the source NE. For details of the
configuration, see 8.3.3 Creating a UNI-NNI E-Line Service Carried by a PW on a Per-NE
Basis.
The parameters are set as follows:
l Service ID: 1
l Service Name: E-Line-1
l Service Direction: UNI-NNI
l BPDU: Not Transparently Transmitted
l Source Port: 2-EFT8-1
l VLANs: 100
l Carrier Type: PW
l PW ID: 35
l PW Signaling Type: Static
l PW Type: Ethernet Tagged Mode
l Direction: Bidirectional
l PW Encapsulation Type: MPLS
l PW Ingress Label: 20
l PW Egress Label: 20
l Peer IP: 10.10.10.2
l Tunnel: 1(Tunnel-0001)
Step 5 Create the UNI-NNI E-Line service on BTS side of the source NE. For details of the
configuration, see 8.3.3 Creating a UNI-NNI E-Line Service Carried by a PW on a Per-NE
Basis.
The parameters are set as follows:
l Service ID: 2
l Service Name: E-Line-1
l Service Direction: UNI-NNI
l BPDU: Not Transparently Transmitted
l Source Port: 2-EFT8-2
l VLANs: 200
l Carrier Type: PW
l PW ID: 45
l PW Signaling Type: Static
----End
Prerequisite
You must be an NM user with "NE operator" authority or higher.
You must be familiar with the networking diagram, requirements, and service planning.
Procedure
Step 1 Configure the microwave port that carries the MPLS tunnel. For details of the configuration, see
4.5 Configuring Microwave Interfaces.
Step 2 Configure the FE port that carries the Ethernet packets on the NodeB side and BTS side. For
details of the configuration, see 4.3 Configuring Ethernet Interfaces.
Step 3 Create the MPLS Tunnel that carries the E-Line service. For details of the configuration, see 5
Configuring an MPLS Tunnel.
Step 4 Create the UNI-NNI E-Line service on RNC side of the sink NE. For details of the configuration,
see 8.3.3 Creating a UNI-NNI E-Line Service Carried by a PW on a Per-NE Basis.
The parameters are set as follows:
l Service ID: 1
l Service Name: E-Line-1
l Service Direction: UNI-NNI
l BPDU: Not Transparently Transmitted
l Source Port: 2-EFT8-1
l VLANs: 100
l Carrier Type: PW
l PW ID: 35
l PW Signaling Type: Static
l PW Type: Ethernet Tagged Mode
l Direction: Bidirectional
l PW Encapsulation Type: MPLS
l PW Ingress Label: 20
l PW Egress Label: 20
l Peer IP: 10.10.10.1
l Tunnel: 3(Tunnel-0003)
Step 5 Create the UNI-NNI E-Line service on BSC side of the sink NE. For details of the configuration,
see 8.3.3 Creating a UNI-NNI E-Line Service Carried by a PW on a Per-NE Basis.
The parameters are set as follows:
l Service ID: 2
l Service Name: E-Line-2
l Service Direction: UNI-NNI
l BPDU: Not Transparently Transmitted
l Source Port: 2-EFT8-2
l VLANs: 200
l Carrier Type: PW
l PW ID: 45
l PW Signaling Type: Static
l PW Type: Ethernet Tagged Mode
l Direction: Bidirectional
l PW Encapsulation Type: MPLS
l PW Ingress Label: 30
l PW Egress Label: 30
l Peer IP: 10.10.10.1
l Tunnel: 3(Tunnel-0003)
----End
Service Name Example: test Set and query the name of the Ethernet service.
Each of the IDs that are set for E-Line services
and E-AGGR services must be unique.
Source Node Example: Slot-Board Display the source node of the E-Line service.
Name-Port(Port No.) The format is Slot number - Board name - Port
name (VLAN ID).
Sink Node Example: PW-0 Display the sink node of the E-Line service. The
sink node can be a port, PW or QinQ Link.
Direction UNI-UNI, UNI-NNI In the case of the UNI-NNI direction, select the
network-side bearer type as PW Port or QinQ
Link.
Service Tag - Set the service tag role of E-line service. When
Role Service Tag Role is set to Service, only one
VLAN ID can be set for the VLANs field.
User: The outer C/SVlan tag of user packets is
used as the user VLAN tag. When the packets
are forwarded, the packet forwarding is based on
the user VLAN tag.
Service: The outer C/SVlan tag of user packets
is used as the service VLAN tag. When the
packets are forwarded, the packet forwarding is
not based on the service VLAN tag.
NOTE
RTN 910/950 could not support.
Port Example: Slot-Board Set and query the user-side port or network-side
Name-Port(Port No.) port.
VLANs 1-4094 Set one or several VLAN IDs, or not set any
VLAN ID.
Bearer Type PW, Port, QinQ Link Set the bearer type when the service direction is
set to UNI-NNI.
QinQ Link ID Example: 5 Select and display the QinQ Link ID.
BPDU Not Transparently Set whether the bridge protocol data unit
Transmitted (BPDU) packets are transparently transmitted.
NOTE
RTN 910/950 only support setting to Not
Transparently.
Enable State Enable, Disable Set and display the enable status of the PW.
PW Signaling Static, Dynamic In the case of the dynamic PW, the label is
Type automatically allocated. In the case of the static
PW, the label is manually allocated. The
configuration at the two ends of a PW should be
consistent.
NOTE
The OptiX RTN 910/950 uses only static PWs.
Tunnel Type MPLS, IP, GRE Displays the type of the tunnel that carries the
PW.
NOTE
In the case of the OptiX RTN 910 or OptiX RTN 950,
only MPLS tunnel is used.
Control Word Preferred Use, No Use The control word is the encapsulation packet
header of four bytes. The control word is used
to identify the packet sequence or be stuffing
bits.
Control Channel CW, None Set the type of the control channel used by the
Type PW.
Local Working Up, Down Display the working status of the PW at the local
Status end. Up indicates that the PW works normally.
Down indicates that the PW work abnormally.
Request VLAN 1 to 4094, 65535 When the PW is in the Ethernet tagged mode,
the PW attaches the VLAN set here to the
packets without any VLAN from the local V-
UNI interface.
When the Use default value is selected, the
value of Request VLAN is 65535.
Active Active, Inactive Display the activation status of the PW. The E-
AGGR service and E-Line service support this
parameter.
Direction Ingress, Egress Set the direction of the interface, PW and QinQ
Link. Ingress indicates the in-coming direction.
Egress indicates the out-going direction.
Policy Name Example: Qos-test Display the name of the QoS policy.
PIR (Kbit/s) 64 to 10000000 Set the maximum rate for the service. The peak
information rate should not be less than the
committed information rate.
This field can be set after Bandwidth Limit is
enabled.
NOTE
RTN 910/950 could not support.
Default CS7, CS6,EF, AF4, The CoS varies with the values.
Forwarding AF3, AF2, AF1, BE, l CS6-CS7: Indicates the highest service class.
Priority NONE The CoS is applicable to transport of
signaling.
l EF: Indicates fast forwarding. The CoS is
applicable to the service of little delay and
packet loss rate, such as the audio service.
l AF1-AF4: Indicates the guaranteed
forwarding. The CoS is applicable to the
service that requires a certain rate, but does
not limit the delay or jitter.
l BE: The CoS is applicable to the service that
need not be processed exceptionally.
Ingress direction is configurable.
Default Packet none, red, yellow, Label packets with different colors according to
Relabeling green the label information carried with the packets.
Color Ingress direction is configurable.
EXP 0-7, None Set the QoS priority labels in an MPLS network.
These labels correspond to the eight classes.
l 0 corresponds to BE.
l 1 corresponds to AF1.
l 2 corresponds to AF2.
l 3 corresponds to AF3.
l 4 corresponds to AF4.
l 5 corresponds to EF.
l 6 corresponds to CS6.
l 7 corresponds to CS7.
LSP Mode Uniform, Pipe Set and display the LSP mode.
l Uniform: The CoS of user packets should be
recovered when the tunnel label is stripped.
l Pipe: The CoS of user packets need not be
recovered when the tunnel label is stripped.
This section describes basic information on E-AGGR services, and uses an example to illustrate
how to configure an E-AGGR service.
NodeB 1
FE
GE
FE MPLS Tunnel 1
NE1
NodeB 2 MPLS Tunnel 2 NE3
RNC
FE
NE2
FE
NodeB 3
NodeB 4 NodeB
Required Start
Optional
Creating Network
Configuring the
QoS Policy
Configuring
Interfaces
Configuring a UNIs-NNI
End Configuring a NNIs-UNI E-AGGR Service for NEs
E-AGGR Service for NEs
Configuring a NNIs-UNI
End
E-AGGR Service for NEs
End
The columns in the figure shows the three sub processes, which are for the configuration of a
UNI-UNI E-AGGR service, the configuration of an E-AGGR service carried by ports on the
NNI side, and the configuration of an E-AGGR service carried by PWs on the NNI side from
the left to right.
Configure the MPLS. For details, see 5 Configuring an MPLS Tunnel. When the MPLS tunnel
is configured, see the following contents according to the MPLS tunnel type.
l When the static MPLS tunnel is used, the MPLS tunnel can be configured on a per-NE
basis or by using the trail function. See 5.5 Creating a Static MPLS Tunnel by Using the
Trail Function and 5.6 Creating an MPLS Tunnel on a Per-NE Basis.
When configuring the E-AGGR service, see 9.4 Configuration Case of the E-AGGR
Service.
On the U2000, the creation of an E-AGGR service can be complete in one interface. The
equipment supports the multipoint-to-point service aggregation, and supports the service
aggregation from the NNI carried by multiple PWs to one UNI port.
9.3.2 Creating an E-AGGR Service by Using the Trail Function
The equipment supports the service convergence from multiple ports to one port, it also supports
the service convergence from multiple NNIs carried by the PW to one UNI. This section
describes how to create the convergence service in one user interface by using the trail function.
Prerequisite
You must be an NM user with "NE operator" authority or higher.
You must complete the creation of the MPLS tunnel that carries the PW.
If a port need be exclusively used, disable the DCN function of the port that carries the service.
For detail, see Enabling the Port DCN.
Procedure
Step 1 Select the NE in the NE Explorer. Choose Configuration > Ethernet Service Management
> E-AGGR Service from the Function Tree.
Step 2 Click New to display the New E-AGGR Service dialog box. Then, configure Service ID, and
Service Name.For details on the parameters for E-AGGR service, see Table 9-8.
Step 3 Click the UNI tab. Then, click Configuration to display the Configure Port dialog box.For
details on the parameters for UNI ports of E-AGGR service, see Table 9-9.
Step 4 In the Available Port list, select the desired port and click to add the port to the
Selected Port list.
NOTE
The port of the E-AGGR service does not support the S-Aware attribute.
Step 5 In the Selected Port list, configure Location and VLANs of the port, and then click OK.
NOTE
Location can be set to the source end or the sink end. Multiple source ends can be set, but only one sink
end can be set. Otherwise, the E-AGGR service cannot be correctly configured.
l To configure the NNI interface carried by the PW, click the PW tab. Click New to set
related parameters of the PW. Then, click OK.For details on the parameters for PW of E-
AGGR service, see Table 9-11.
NOTE
l For PW Signaling Type, select Dynamic or Static. Dynamic indicates that the LDP signaling is used
to create a PW. The OptiX RTN 910/950 uses only static PWs.
l For PW Type, select Ethernet or Ethernet Tagged Mode.
Step 7 Select VLAN Forwarding Table Item. Click New to display the New VLAN Forwarding
Table Item window to set the forwarding attributes. Then, click OK.For details on the
parameters for VLAN forwarding tables of E-AGGR service, see Table 9-14.
NOTE
The service is forwarded based on VLAN, and thus the forwarding attributes should be set in VLAN
Forwarding Table Item from each source interface to sink interface. In addition, the VLAN ID must be
set to a value within the range specified for the service.
Step 8 Click OK to display the confirmation dialog box. Then, close the dialog box.
Step 9 Optional: Click Configure QoS tab. Set the parameters of the QoS.For details on the parameters
for QoS of E-AGGR service, see Table 9-12.
l Click the UNI tab to set Default Forwarding Priority and Default Packet Relabeling
Color.
l Click the PW tab to set EXP and LSP Mode.
----End
Prerequisite
You must be an NM user with "NE operator" authority or higher.
You must complete the correct configuration of port attributes.
You must complete the creation of the tunnel that carries the PW.
If a port need be exclusively used, disable the DCN function of the port that carries the service.
For detail, see Enabling the Port DCN.
Procedure
Step 1 Choose Service > PTN Service > Create L2VPN E-AGGR Service from the Main Menu.
Step 2 In the Create L2VPN E-AGGR Service dialog box, set parameters of the source and sink related
to the E-AGGR service.
NOTE
According to different application scenarios of the convergence services, set the information about the
corresponding source and sink as follows:
l Configuration of the local convergence service: Select the same source and sink NE.
l Configuration of the convergence service from multiple UNIs to the same remote PW: Select different
source ports on the same source NE and select a sink NE.
l Configuration of the convergence service from multiple PWs to the same UNI: Select different source
NEs and select a sink NE.
Step 3 Click Next and set PW-related parameters in Step 2. Select the uplink and downlink tunnels that
carry the PW.
NOTE
Protocol Type can be set to Static of Dynamic. The OptiX RTN 910/950 uses only static PWs.
l Static: Static indicates that the uplink and downlink labels are manually added.
l Dynamic: Dynamic indicates that the MPLS-LDP protocol distributes the PW labels.
Step 4 Click Next.In VLAN Forwarding Table, click Add, and then select Source UNI to set Source
VLAN, Transit VLAN, and Sink VLAN.
Step 5 Optional: In QoS, according to the network requirement, set the UNI, bandwidth limit for the
PW, and QoS policy.
NOTE
If Bandwidth Limit is set to enabled, CIR (Kbit/s) and PIR (Kbit/s) can be set. The QoS policy can also
be selected from Policy. Before selecting a policy, you should create the policy.
Step 6 Click Finish. The Operation Result window is displayed. Click Close.
----End
NodeB 1
FE
GE
FE MPLS Tunnel 1
NE1
NodeB 2 MPLS Tunnel 2 NE3
RNC
FE
NE2
FE
NodeB 3
NodeB 4 NodeB
Service Requirement
QoS Planning
Table 9-4 QoS planning (CAR policy used in V-UNI Ingress policy)
PW ID 10 20 10, 20
PW Ingress 20 20 30 30
Label
PW Egress 20 20 30 30
Label
Prerequisite
You must be an NM user with "NE operator" authority or higher.
You must complete the correct configuration of port attributes.
You must complete the creation of the MPLS tunnel that carries the PW.
If a port need be exclusively used, disable the DCN function of the port that carries the service.
For detail, see Enabling the Port DCN.
Procedure
Step 1 Select the NE in the NE Explorer. Choose Configuration > Ethernet Service Management
> E-AGGR Service from the Function Tree.
Step 2 Click New to display the New E-AGGR Service dialog box. Then, configure Service ID, and
Service Name.For details on the parameters for E-AGGR service, see Table 9-8.
Step 3 Click the UNI tab. Then, click Configuration to display the Configure Port dialog box.For
details on the parameters for UNI ports of E-AGGR service, see Table 9-9.
Step 4 In the Available Port list, select the desired port and click to add the port to the
Selected Port list.
NOTE
The port of the E-AGGR service does not support the S-Aware attribute.
Step 5 In the Selected Port list, configure Location and VLANs of the port, and then click OK.
NOTE
Location can be set to the source end or the sink end. Multiple source ends can be set, but only one sink
end can be set. Otherwise, the E-AGGR service cannot be correctly configured.
l For PW Signaling Type, select Dynamic or Static. Dynamic indicates that the LDP signaling is used
to create a PW. The OptiX RTN 910/950 uses only static PWs.
l For PW Type, select Ethernet or Ethernet Tagged Mode.
Step 7 Select VLAN Forwarding Table Item. Click New to display the New VLAN Forwarding
Table Item window to set the forwarding attributes. Then, click OK.For details on the
parameters for VLAN forwarding tables of E-AGGR service, see Table 9-14.
NOTE
The service is forwarded based on VLAN, and thus the forwarding attributes should be set in VLAN
Forwarding Table Item from each source interface to sink interface. In addition, the VLAN ID must be
set to a value within the range specified for the service.
Step 8 Click OK to display the confirmation dialog box. Then, close the dialog box.
Step 9 Optional: Click Configure QoS tab. Set the parameters of the QoS.For details on the parameters
for QoS of E-AGGR service, see Table 9-12.
l Click the UNI tab to set Default Forwarding Priority and Default Packet Relabeling
Color.
l Click the PW tab to set EXP and LSP Mode.
----End
Prerequisite
You must be an NM user with "NE operator" authority or higher.
You must complete the correct configuration of port attributes.
You must complete the creation of the tunnel that carries the PW.
If a port need be exclusively used, disable the DCN function of the port that carries the service.
For detail, see Enabling the Port DCN.
Procedure
Step 1 Choose Service > PTN Service > Create L2VPN E-AGGR Service from the Main Menu.
Step 2 In the Create L2VPN E-AGGR Service dialog box, set parameters of the source and sink related
to the E-AGGR service.
NOTE
According to different application scenarios of the convergence services, set the information about the
corresponding source and sink as follows:
l Configuration of the local convergence service: Select the same source and sink NE.
l Configuration of the convergence service from multiple UNIs to the same remote PW: Select different
source ports on the same source NE and select a sink NE.
l Configuration of the convergence service from multiple PWs to the same UNI: Select different source
NEs and select a sink NE.
Step 3 Click Next and set PW-related parameters in Step 2. Select the uplink and downlink tunnels that
carry the PW.
NOTE
Protocol Type can be set to Static of Dynamic. The OptiX RTN 910/950 uses only static PWs.
l Static: Static indicates that the uplink and downlink labels are manually added.
l Dynamic: Dynamic indicates that the MPLS-LDP protocol distributes the PW labels.
Step 4 Click Next.In VLAN Forwarding Table, click Add, and then select Source UNI to set Source
VLAN, Transit VLAN, and Sink VLAN.
Step 5 Optional: In QoS, according to the network requirement, set the UNI, bandwidth limit for the
PW, and QoS policy.
NOTE
If Bandwidth Limit is set to enabled, CIR (Kbit/s) and PIR (Kbit/s) can be set. The QoS policy can also
be selected from Policy. Before selecting a policy, you should create the policy.
Step 6 Click Finish. The Operation Result window is displayed. Click Close.
----End
Service Name Example: test Set and query the name of the Ethernet service.
Location Source, Sink Displays the location of the UNI port. The E-
AGGR service supports this parameter.
Location Source, Sink Set location of the port involved in the service.
This parameter is required for the E-AGGR
service.
This parameter is required for the E-AGGR
service.
Enable State Enable, Disable Set and display the enable status of the PW.
PW Signaling Static, Dynamic In the case of the dynamic PW, the label is
Type automatically allocated. In the case of the static
PW, the label is manually allocated. The
configuration at the two ends of a PW should be
consistent.
NOTE
The OptiX RTN 910/950 uses only static PWs.
Tunnel Type MPLS, IP, GRE Displays the type of the tunnel that carries the
PW.
NOTE
In the case of the OptiX RTN 910 or OptiX RTN 950,
only MPLS tunnel is used.
Control Word Preferred Use, No Use The control word is the encapsulation packet
header of four bytes. The control word is used
to identify the packet sequence or be stuffing
bits.
Control Channel CW, None Set the type of the control channel used by the
Type PW.
Local Working Up, Down Display the working status of the PW at the local
Status end. Up indicates that the PW works normally.
Down indicates that the PW work abnormally.
Request VLAN 1 to 4094, 65535 When the PW is in the Ethernet tagged mode,
the PW attaches the VLAN set here to the
packets without any VLAN from the local V-
UNI interface.
When the Use default value is selected, the
value of Request VLAN is 65535.
Active Active, Inactive Display the activation status of the PW. The E-
AGGR service and E-Line service support this
parameter.
Direction Ingress, Egress Set the direction of the interface, PW and QinQ
Link. Ingress indicates the in-coming direction.
Egress indicates the out-going direction.
Policy Name Example: Qos-test Display the name of the QoS policy.
PIR (Kbit/s) 64 to 10000000 Set the maximum rate for the service. The peak
information rate should not be less than the
committed information rate.
This field can be set after Bandwidth Limit is
enabled.
NOTE
RTN 910/950 could not support.
Default CS7, CS6,EF, AF4, The CoS varies with the values.
Forwarding AF3, AF2, AF1, BE, l CS6-CS7: Indicates the highest service class.
Priority NONE The CoS is applicable to transport of
signaling.
l EF: Indicates fast forwarding. The CoS is
applicable to the service of little delay and
packet loss rate, such as the audio service.
l AF1-AF4: Indicates the guaranteed
forwarding. The CoS is applicable to the
service that requires a certain rate, but does
not limit the delay or jitter.
l BE: The CoS is applicable to the service that
need not be processed exceptionally.
Ingress direction is configurable.
Default Packet none, red, yellow, Label packets with different colors according to
Relabeling green the label information carried with the packets.
Color Ingress direction is configurable.
EXP 0-7, None Set the QoS priority labels in an MPLS network.
These labels correspond to the eight classes.
l 0 corresponds to BE.
l 1 corresponds to AF1.
l 2 corresponds to AF2.
l 3 corresponds to AF3.
l 4 corresponds to AF4.
l 5 corresponds to EF.
l 6 corresponds to CS6.
l 7 corresponds to CS7.
LSP Mode Uniform, Pipe Set and display the LSP mode.
l Uniform: The CoS of user packets should be
recovered when the tunnel label is stripped.
l Pipe: The CoS of user packets need not be
recovered when the tunnel label is stripped.
Port Example: Slot-Board Display the name of the port on the NE. Slot
Name-Port(Port No.) number - Board name - Port information
Enable Port Enabled, Disabled Display the enable status of the port.
Encapsulation Null, 802.1Q, QinQ Display the encapsulation type of the Ethernet
Type port.
802.1Q indicates that a four-byte 802.1Q tag is
inserted between the source MAC address
section and the protocol type section.
QinQ indicates that the 802.1Q is embedded
with the 802.1Q.
TAG Tag Aware, Access, The tag indicates which packets can be
Hybrid processed.
Tag Aware: The port transparently transmits the
data packet with a VLAN ID (tag). If a data
packet does not have a VLAN ID (untag), the
port discards this data packet. In this case, the
Default VLAN ID and VLAN Priority are
meaningless.
Access: The port adds the default VLAN ID to
the data packet without any VLAN ID (untag).
If the data packet has a VLAN ID (tag), the port
discards this data packet.
Hybrid: The port adds the default VLAN ID to
the data packet without any VLAN ID (untag).
If the data packet has a VLAN ID (tag), the port
transparently transmits the data packet.
Table 9-14 Descriptions of the parameters for VLAN Forwarding Table Item
Field Value Description
Source Interface V-UNI, V-NNI Select and query the type of the source interface.
Type
Source Interface [Port]Slot-Board Select and query the source interface. If Source
Name-Port(Port No) Interface Type is set to V-NNI, the source
interface can be a port or PW.
Source VLAN 1-4094 Set and query the source VLAN ID.
ID
Sink Interface V-UNI, V-NNI Select and query the type of the sink interface.
Type
Sink Interface [Port]Slot-Board Select and query the sink interface. If Sink
Name-Port(Port No) Interface Type is set to V-NNI, the sink
interface can be a port or PW.
Sink VLAN ID 1-4094 Set and query the sink VLAN ID.
The OptiX RTN 950 provides the orderwire and synchronous data functions, which require
certain data configuration.
Procedure
Step 1 In the NE Explorer, select an NE and choose Configuration > Orderwire from the Function
Tree. Click the General tab.
Step 3 Set Call Waiting Time(s), Telephone No. and orderwire ports.
NOTE
l Call Waiting Time(s) should be set to the same value for all NEs with orderwire communication.
When the number of NEs is smaller than 30, set the value to 5 seconds. Otherwise, set it to 9 seconds.
l The telephone number cannot repeat in the same orderwire subnet.
l Set the length of the telephone number according to the actual requirements. The maximum length is
eight digits and the minimum length is three digits. In the same orderwire subnet, the number length
must be the same.
----End
Prerequisite
l You must be an NM user with NE operator authority or higher.
l The board involved in the synchronous data service must be configured.
Procedure
Step 1 In the NE Explorer, select the NE from the Object Tree, and then choose Configuration >
Orderwire from the Function Tree.
Step 3 Hold on the Ctrl key, select two data channels from Available Date Channel, and then click
----End
102
NE Orderwire Port
NE1 3-IFE2-1
NE2 3-IFE2-1
4-IFE2-1
NE3 3-IFE2-1
Procedure
Step 1 10.1 Configuring Orderwire.
Parameter Value
Parameter Value
----End
In the networking diagram shown in Figure 10-3, the microwave network transmits the network
management information of the third-party equipment. The third-party equipment and the NMS
use the protocol converter to convert the network management information carried by the
Ethernet network into the network management information carried by the 64 kbit/s synchronous
data service. Hence, the microwave network needs to transparently transmit the corresponding
synchronous data only. On the network:
l NE1 and NE2 add or drop the 64 kbit/s synchronous data service.
l The radio link between NE1 and NE2 is configured with 1+0 non-protection.
ETH ETH
E1 E1
NE1 F1 3-IFE2-1
NE2 3-IFE2-1 F1
NOTE
In the case of radio links or SDH optical transmission line configured with 1+1 protection, only the main link
needs to be configured with the synchronous data service.
Procedure
Step 1 10.2 Configuring the Synchronous Data Service.
The values for the related parameters are provided as follows.
Parameter Value
----End
The OptiX RTN equipment provides the alarm input and output interfaces for monitoring the
equipment alarms and environment alarms. The alarm input interface inputs the external
environment monitoring information to the OptiX RTN equipment, and the OptiX RTN
equipment reports the information to the NMS center. Hence, the external environment is
monitored and managed on the NMS. The alarm output interface outputs the alarm information
to the alarm monitoring center, and then the alarm monitoring center manages the alarms in a
centralized manner.
As shown in Figure 11-1, the alarm monitoring center monitors the operating status of the
equipment in the equipment room, and manages the alarm information in a centralized manner.
The alarm collection module detects the external operating environment status of the equipment
with regard to temperature, humidity, and security of the equipment room.
l Alarm output interface (ALMO): The ALMO interface is a common interface for two alarm
outputs and two alarm concatenations. As shown in Figure 11-1, the information about the
alarms for the OptiX RTN equipment can be output through the alarm output interface to
the alarm monitoring center, or the information about the alarms for multiple sets of OptiX
RTN equipment is concatenated and then managed in a centralized manner through the
alarm output interface.
l Alarm input interface (ALMI): The ALMI interface is the interface for one to four alarm
inputs. As shown in Figure 11-1, the information about the external operating status for
the equipment that is collected by the alarm collection module is input to the OptiX RTN
equipment through the alarm input interface. When the external operating environment
status is abnormal, an alarm is reported on the NMS. Hence, the external operating
environment can be easily managed by the NMS.
ALMO Alarm
monitoring
center
A
U
X
Q ALMI Alarm
collection
NMS module
Prerequisite
You must be an NM user with "NE operator" authority or higher.
Procedure
Step 1 Click the icon of the AUXQ in the NE Explorer, and choose Configuration > Environment
Monitor Configuration > Environment Monitor interface from the Function Tree.
Step 2 Select Input Relay from the drop-down menu. Set Using Status of the alarm input interface to
Used.
NOTE
In the case of the OptiX RTN 950 equipment, you can set four alarm inputs, and each alarm input can
monitor one external environment status.
----End
Prerequisite
You must be an NM user with "NE operator" authority or higher.
Procedure
Step 1 Click the icon of the AUXQ in the NE Explorer, and choose Configuration > Environment
Monitor Configuration > Environment Monitor interface from the Function Tree.
Step 3 According to the actual requirement, set Relay Control Mode to Auto Control or Manual
Control.
NOTE
Step 4 If you select Manual Control, you can set Relay Status in Critical Alarm.
----End
Prerequisite
You must be an NM user with "NE operator" authority or higher.
Context
The equipment monitors the board temperature and reports the alarm only when the monitoring
status is set to Monitor. By default, the board temperature monitoring status is Monitor. In this
case, you can just use the default values of the upper threshold and lower threshold.
Procedure
Step 1 Click the icon of a board in the NE Explorer, and choose Configuration > Environment
Monitor Configuration > Environment Monitor Interface from the Function Tree.
Step 2 Select Temperature Attributes from the drop-down menu.
Step 3 Set Temperature Upper Threshold(°C) and Temperature Lower Threshold(°C). Click
Apply.
----End
To back up the configuration data is to back up the data stored on the NMS and that stored on
the NE. To back up the data stored on the NMS, back up the MO data of the NMS. To back up
the data stored on the NE, backup the NE database.
Prerequisite
l The U2000 must be started in the NMS center.
l You must be an NM user with "NM maintainer" authority or higher.
Background Information
The are two methods to back up the U2000 database: immediately backing up the U2000 data
and backing up the U2000 data in a scheduled manner.
Procedure
l Immediately backing up the U2000 data.
1. Choose Administration > Database > Database Backup from the main menu. Then,
the Backup dialog box is displayed.
2. Set the backup path on the server, and then click Backup. The U2000 database backup
starts and a dialog box is displayed showing the backup progress.
NOTE
If no schedule task is available, a prompt Information dialog box appears. Click OK.
2. Click New and the Task Creation Wizard dialog box is displayed.
3. Select Database Backup as the task type and enter a name for the scheduled task.
Then click Next.
4. Select Database Backup(DUMP). Then click Next.
5. Select Back up the data to the local server or Back up the database to the remote
server.
– If Back up the data to the local server is selected, enter a backup path on the
local server. Then click Next.
– If Back up the database to the remote server is selected, enter the IP address,
user name, and password of a remote server, select a transmission mode, and enter
a backup path on the remote server. Then click Next.
6. Select the running period for the task. Then click Next.
NOTE
----End
Prerequisite
l You must log in to the NE as an NE user of the system level.
l You must be a U2000 user with "NE and Network Operator" authority or higher.
Procedure
Step 1 Choose Configuration > NE Configuration Data Management from the Main Menu. The
NE Configuration Data Management window is displayed.
Step 3 Select one or more NEs from Configuration Data Management List.
Step 4 Choose Back Up NE Data > Back Up Database to SCC. Click OK in the displayed
Confirm to start the backup.
Step 5 Click Close in the displayed Operation Result dialog box to complete the operation.
----End
Prerequisite
l You must log in to the NE as an NE user with "System Level" authority.
l You must be an NM user with "NE and Network Operator" authority or higher.
l The system control board is configured with a CF card.
Procedure
Step 1 Choose Configuration > NE Configuration Data Management from the Main Menu.
Step 3 Select one or more NEs from Configuration Data Management List.
Step 4 Click Back Up NE Data > Manually Back Up Database to CF Card. Click OK to start the
backup.
----End
Prerequisite
l The U2000 user must log in and display the Main Topology interface.
l You must be a U2000 user with "NE and Network Maintainer" authority or higher.
l The NE must be created on the U2000.
l The computer where the U2000 is installed must be able to normally communicate with
the NE.
l The FTP/HFCP/SFTP server is configured and the FTP/HFCP/SFTP service is started.
l The updated NE database must be backed up to the system control board.
Context
l Backup operation can be performed on multiple devices of the same device type.
l On selecting the device type in the device tree, all the devices and the device type versions
related to the device type is displayed in the NE View table.
l The files are backed up from the server can be viewed in the Backup Information tab.
Procedure
Step 1 Choose Administration > NE Software Management > NE Data Backup/Restoration from
the Main Menu to open the NE View tab. The device types are displayed.
Step 2 Select and right-click the device(s) that you want to backup in the table, and click Backup.
Step 3 In the displayed Backup dialog box, select backup to NMS Server or NMS Client.
l If the NMS Server is selected, the database file is stored on the NMS server.
l If the NMS Client is selected, the database file is stored on the NMS client and you need to
click to select the location where the device data have to be backed up.
Step 4 Click Start and the backup processing information is displayed in the NE View area.
----End
Result
The selected NE database is successfully backed up.
A Glossary
A.1 0-9
A.2 A-E
A.3 F-J
A.4 K-O
A.5 P-T
A.6 U-Z
A.1 0-9
1+1 protection An architecture that has one normal traffic signal, one working SNC/trail, one protection
SNC/trail and a permanent bridge. At the source end, the normal traffic signal is
permanently bridged to both the working and protection SNC/trail. At the sink end, the
normal traffic signal is selected from the better of the two SNCs/trails. Due to the
permanent bridging, the 1+1 architecture does not allow an extra unprotected traffic
signal to be provided.
1U The standard electronics industries association (EIA) rack unit (44 mm/1.75 in.)
802.1Q in 802.1Q 802.1Q in 802.1Q (QinQ) is a VLAN feature that allows the equipment to add a VLAN
tag to a tagged frame.The implementation of QinQ is to add a public VLAN tag to a
frame with a private VLAN tag, making the frame encapsulated with two layers of VLAN
tags. The frame is forwarded over the service provider's backbone network based on the
public VLAN tag. By this, a layer 2 VPN tunnel is provided to customers.The QinQ
feature enables the transmission of the private VLANs to the peer end transparently.
A.2 A-E
A
ABR See Available Bit Rate
ACAP See adjacent channel alternate polarization
Access Control List Access Control List (ACL) is a list of IP address. The addresses listed in the ACL are
used for authentication. If the ACL for the user is not null, it indicates that the address
where the user logged in is contained in the list.
ACL See Access Control List
adaptive modulation A technology that is used to automatically adjust the modulation mode according to the
channel quality. When the channel quality is favorable, the equipment adopts a high-
efficiency modulation mode to improve the transmission efficiency and the spectrum
utilization of the system. When the channel quality is degraded, the equipment adopts
the low-efficiency modulation mode to improve the anti-interference capability of the
link that carries high-priority services.
ADC See Analog to Digital Converter
add/drop multiplexer Add/Drop Multiplexing. Network elements that provide access to all or some subset of
the constituent signals contained within an STM-N signal. The constituent signals are
added to (inserted), and/or dropped from (extracted) the STM-N signal as it passed
through the ADM.
Address Resolution Address Resolution Protocol (ARP) is an Internet Protocol used to map IP addresses to
Protocol MAC addresses. It allows hosts and routers to determine the link layer addresses through
ARP requests and ARP responses. The address resolution is a process in which the host
converts the target IP address into a target MAC address before transmitting a frame.
The basic function of the ARP is to query the MAC address of the target equipment
through its IP address.
adjacent channel A channel configuration method, which uses two adjacent channels (a horizontal
alternate polarization polarization wave and a vertical polarization wave) to transmit two signals.
ADM See add/drop multiplexer
Administrative Unit The information structure which provides adaptation between the higher order path layer
and the multiplex section layer. It consists of an information payload (the higher order
VC) and an AU pointer which indicates the offset of the payload frame start relative to
the multiplex section frame start.
AF See Assured Forwarding
AGC See Automatic Gain Control
aggregation A collection of objects that makes a whole. An aggregation can be a concrete or
conceptual set of whole-part relationships among objects.
AIS See Alarm Indication Signal
Alarm automatic When an alarm is generated on the device side, the alarm is reported to the N2000. Then,
report an alarm panel prompts and the user can view the details of the alarm.
alarm cascading The shunt-wound output of the alarm signals of several subracks or cabinets.
Alarm Filtering An NE reports the detected alarm to the element management system (EMS). Based on
the filter state of the alarm, the EMS determines whether to display or save the alarm
information. If the filter state of an alarm is set to Filter, the alarm is not displayed or
stored on the EMS. The alarm, however, is still monitored by the NE.
Alarm Indication A code sent downstream in a digital network as an indication that an upstream failure
Signal has been detected and alarmed. It is associated with multiple transport layers. Note: See
ITU-T Rec. G.707/Y.1322 for specific AIS signals.
Alarm suppression A function used not to monitor alarms for a specific object, which may be the
networkwide equipment, a specific NE, a specific board and even a specific function
module of a specific board.
AM See adaptive modulation
Analog to Digital An electronic circuit that converts continuous signals to discrete digital numbers. The
Converter reverse operation is performed by a digital-to-analog converter (DAC).
APS See Automatic Protection Switching
ARP See Address Resolution Protocol
ASK amplitude shift keying
Assured Forwarding Assured Forwarding (AF) is one of the four per-hop behaviors (PHB) defined by the
Diff-Serv workgroup of IETF. AF is suitable for certain key data services that require
assured bandwidth and short delay. For traffic within the limit, AF assures quality in
forwarding. For traffic that exceeds the limit, AF degrades the service class and continues
to forward the traffic instead of discarding the packets.
Asynchronous A data transfer technology based on cell, in which packets allocation relies on channel
Transfer Mode demand. It supports fast packet switching to achieve efficient utilization of network
resources. The size of a cell is 53 bytes, which consist of 48-byte payload and 5-byte
header.
ATM See Asynchronous Transfer Mode
ATM PVC ATM Permanent Virtual Circuit
B
Backward Defect When detecting a defect, the sink node of a LSP uses backward defect indication (BDI)
Indication to inform the upstream end of the LSP of a downstream defect along the return path.
bandwidth A range of transmission frequencies that a transmission line or channel can carry in a
network. In fact, it is the difference between the highest and lowest frequencies the
transmission line or channel. The greater the bandwidth, the faster the data transfer rate.
Base Station Controller A logical entity that connects the BTS with the MSC in a GSM network. It interworks
with the BTS through the Abis interface, the MSC through the A interface. It provides
the following functions: Radio resource management, Base station management, Power
control, Handover control, and Traffic measurement. One BSC controls and manages
one or more BTSs in an actual network.
Base Transceiver A Base Transceiver Station terminates the radio interface. It allows transmission of traffic
Station and signaling across the air interface. The BTS includes the baseband processing, radio
equipment, and the antenna.
BDI See Backward Defect Indication
BE See best effort
BER See Bit Error Rate
best effort A kind of PHB (Per-Hop-Behavior). In the forwarding process of a DS domain, the traffic
of this PHB type features reachability but the DS node does not guarantee the forwarding
quality.
BIOS Basic Input Output System
BIP Bit-Interleaved Parity
bit error An incompatibility between a bit in a transmitted digital signal and the corresponding
bit in the received digital signal.
Bit Error Rate Bit error rate. Ratio of received bits that contain errors. BER is an important index used
to measure the communications quality of a network.
blank filler panel A piece of board to cover vacant slots, to keep the frame away from dirt, to keep proper
airflow inside the frame, and to beautify the frame appearance.
BPDU See Bridge Protocol Data Unit
Bridge Protocol Data The data messages that are exchanged across the switches within an extended LAN that
Unit uses a spanning tree protocol (STP) topology. BPDU packets contain information on
ports, addresses, priorities and costs and ensure that the data ends up where it was
intended to go. BPDU messages are exchanged across bridges to detect loops in a
network topology. The loops are then removed by shutting down selected bridges
interfaces and placing redundant switch ports in a backup, or blocked, state.
Broadcast A means of delivering information to all members in a network. The broadcast range is
determined by the broadcast address.
BSC See Base Station Controller
BTS See Base Transceiver Station
Buffer A storage area used for handling data in transit. Buffers are used in internetworking to
compensate for differences in processing speed between network devices. Bursts of data
can be stored in buffers until they can be handled by slower processing devices.
C
C-VLAN Customer VLAN
Cable distribution plate A component which is used to arrange the cables in order.
cable ladder (1) A cable ladder is a frame which supports electrical cables. (2) Two metal cables
usually made of stainless steel with rungs of lightweight metal tubing such as aluminum,
six or eight inches wide spaced about eighteen inches apart. It can be rolled into a compact
lightweight bundle for transport ease.
cable tie The tape used to bind the cables.
cabling trough The trough which is used for cable routing in the cabinet.
captive nut Captive nuts (or as they are more correctly named, 'tee nuts') have a range of uses but
are more commonly used in the hobby for engine fixing (securing engine mounts to the
firewall), wing fixings, and undercarriage fixing.
CAR See committed access rate
CBR See Constant Bit Rate
CCC See Circuit Cross Connect
CCDP See Co-Channel Dual Polarization
CCM See continuity check message
CE See Customer Edge
Central Processing The CPU is the brains of the computer. Sometimes referred to simply as the processor
Unit or central processor, the CPU is where most calculations take place.
CES See Circuit Emulation Service
CF See compact flash
CGMP Cisco Group Management Protocol
Connectivity Check Ethernet CFM can detect the connectivity between MEPs. The detection is achieved by
each MEP transmitting a Continuity Check Message (CCM) periodically. This detection
is called CC detection.
Constant Bit Rate constant bit rate. A kind of service categories defined by the ATM forum. CBR transfers
cells based on the constant bandwidth. It is applicable to service connections that depend
on precise clocking to ensure undistorted transmission.
Constraint Shortest An extension of shortest path algorithms like OSPF and IS-IS. The path computed using
Path First CSPF is a shortest path fulfilling set of constrains. It simply means that it runs shortest
path algorithm after pruning those links that violate a given set of constraints. A
constraint could be minimum bandwidth required per link (also know as bandwidth
guaranteed constraint), end-to-end delay, maximum number of link traversed etc. CSPF
is widely used in MPLS Traffic Engineering. The routing using CSPF is known as
Constraint Based Routing (CBR).
Constraint-based An alternative to RSVP (Resource ReSerVation Protocol) in MPLS (MultiProtocol
Routed-Label Label Switching) networks. RSVP, which works at the IP (Internet Protocol) level, uses
Distribution Protocol IP or UDP datagrams to communicate between LSR (Label Switched Routing) peers.
RSVP does not require the maintenance of TCP (Transmission Control Protocol)
sessions, although RSVP must assume responsibility for error control. CR-LDP is
designed to facilitate the routing of LSPs (Label Switched Paths) through TCP sessions
between LSR peers through the communication of label distribution messages during
the session.
continuity check CCM is used to detect the link status.
message
corrugated tube A pipe which is used for fiber routing.
CoS See Class of Service
CPU See Central Processing Unit
CR-LDP See Constraint-based Routed-Label Distribution Protocol
CRC See Cyclic Redundancy Check
cross polarization A technology used in the case of the Co-Channel Dual Polarization (CCDP) to eliminate
interference the cross-connect interference between two polarization waves in the CCDP.
cancellation
CSPF See Constraint Shortest Path First
Customer Edge A part of BGP/MPLS IP VPN model. It provides interfaces for direct connection to the
Service Provider (SP) network. A CE can be a router, switch, or host.
CWDM See Coarse Wavelength Division Multiplexing
Cyclic Redundancy A procedure used in checking for errors in data transmission. CRC error checking uses
Check a complex calculation to generate a number based on the data transmitted. The sending
device performs the calculation before transmission and includes it in the packet that it
sends to the receiving device. The receiving device repeats the same calculation after
transmission. If both devices obtain the same result, it is assumed that the transmission
was error free. The procedure is known as a redundancy check because each transmission
includes not only data but extra (redundant) error-checking values.
D
Data Circuit-terminal Also Data Communications Equipment (DCE) and Data Carrier Equipment (DCE). The
Equipment basic function of a DCE is to convert data from one interface, such as a digital signal, to
another interface, such as an analog signal. One example of DCE is a modem.
Data Communication A communication network used in a TMN or between TMNs to support the Data
Network Communication Function (DCF).
Data Communications The data channel that uses the D1-D12 bytes in the overhead of an STM-N signal to
Channel transmit information on operation, management, maintenance and provision (OAM&P)
between NEs. The DCC channels that are composed of bytes D1-D3 is referred to as the
192 kbit/s DCC-R channel. The other DCC channel that are composed of bytes D4-D12
is referred to as the 576 kbit/s DCC-M channel.
Datagram A kind of PDU which is used in Connectionless Network Protocol, such as IP datagram,
UDP datagram.
DC See Direct Current
DC-C See DC-Return Common (with Ground)
DC-I See DC-Return Isolate (with Ground)
DC-Return Common A power system, in which the BGND of the DC return conductor is short-circuited with
(with Ground) the PGND on the output side of the power supply cabinet and also on the line between
the output of the power supply cabinet and the electric equipment.
DC-Return Isolate A power system, in which the BGND of the DC return conductor is short-circuited with
(with Ground) the PGND on the output side of the power supply cabinet and is isolated from the PGND
on the line between the output of the power supply cabinet and the electric equipment.
DCC See Data Communications Channel
DCE See Data Circuit-terminal Equipment
DCN See Data Communication Network
DDF See Digital Distribution Frame
DDN See Digital Data Network
DE See discard eligible
Detour LSP The LSP that is used to re-route traffic around a failure in one-to-one backup.
diamond-shaped nut A type of nut that is used to fasten the wiring frame to the cabinet.
Differentiated Services A service architecture that provides the end-to-end QoS function. It consists of a series
of functional units implemented at the network nodes, including a small group of per-
hop forwarding behaviors, packet classification functions, and traffic conditioning
functions such as metering, marking, shaping and policing.
Differentiated Services Differentiated Services CodePoint. A marker in the header of each IP packet using bits
Code Point 0-6 in the DS field. Routers provide differentiated classes of services to various service
streams/flows based on this marker. In other words, routers select corresponding PHB
according to the DSCP value.
DiffServ See Differentiated Services
Digital Data Network A high-quality data transport tunnel that combines the digital channel (such as fiber
channel, digital microwave channel, or satellite channel) and the cross multiplex
technology.
Digital Distribution A type of equipment used between the transmission equipment and the exchange with
Frame transmission rate of 2 to 155 Mbit/s to provide the functions such as cables connection,
cable patching, and test of loops that transmitting digital signals.
digital modulation A digital modulation controls the changes in amplitude, phase, and frequency of the
carrier based on the changes in the baseband digital signal. In this manner, the
information can be transmitted by the carrier.
Direct Current Electrical current whose direction of flow does not reverse. The current may stop or
change amplitude, but it always flows in the same direction.
discard eligible A bit in the frame relay header. It indicates the priority of a packet. If a node supports
the FR QoS, the rate of the accessed FR packets is controlled. When the packet traffic
exceeds the specified traffic, the DE value of the redundant packets is set to 1. In the
case of network congestion, the packets with DE value as 1 are discarded at the node.
Distance Vector Distance Vector Multicast Routing Protocol. The DVMRP protocol is an Internet
Multicast Routing gateway protocol mainly based on the RIP. The protocol implements a typical dense
Protocol mode IP multicast solution. The DVMRP protocol uses IGMP to exchange routing
datagrams with its neighbors.
DS boundary node A DS node that connects one DS domain to a node either in another DS domain or in a
domain that is not DS-capable.
DS domain In the DifferServ mechanism, the DS domain is a domain consisting of a group of
network nodes that share the same service provisioning policy and same PHB. It provides
point-to-point QoS guarantees for services transmitted over this domain.
DS interior node A DS node located at the center of a DS domain. It is a non-DS boundary node.
DS node A DS-compliant node, which is subdivided into DS boundary node and ID interior node.
DSCP See Differentiated Services Code Point
dual-polarized antenna An antenna intended to radiate or receive simultaneously two independent radio waves
orthogonally polarized.
DVMRP See Distance Vector Multicast Routing Protocol
E
E-AGGR Ethernet-Aggregation
E-LAN See Ethernet LAN
E-Tree See Ethernet-Tree
EBS See Excess Burst Size
ECC See Embedded Control Channel
EF See Expedited Forwarding
EFM See Ethernet in the First mile
Electro Magnetic Any electromagnetic disturbance that interrupts, obstructs, or otherwise degrades or
Interference limits the effective performance of electronics/electrical equipment.
A.3 F-J
F
Failure If the fault persists long enough to consider the ability of an item with a required function
to be terminated. The item may be considered as having failed; a fault has now been
detected.
Fast Ethernet A type of Ethernet with a maximum transmission rate of 100 Mbit/s. It complies with
the IEEE 802.3u standard and extends the traditional media-sharing Ethernet standard.
fast link pulse The likn pulse that is used to encode information during automatic negotiation.
FCS Frame Check Sequence
FD See frequency diversity
FDI See Forward Defect Indication
FE See Fast Ethernet
FEC See Forward Error Correction
FFD Fast Failure Detection
Fiber Connector A device installed at the end of a fiber, optical source or receive unit. It is used to couple
the optical wave to the fiber when connected to another device of the same type. A
connector can either connect two fiber ends or connect a fiber end and a optical source
(or a detector).
fiber patch cord A kind of fiber used for connections between the subrack and the ODF, and for
connections between subracks or inside a subrack.
Field Programmable A type of semi-customized circuit used in the Application Specific Integrated Circuit
Gate Array (ASIC) field. It is developed on the basis of the programmable components, such as the
PAL, GAL, and EPLD. It not only remedies the defects of customized circuits, but also
overcomes the disadvantage of the original programmable components in terms of the
limited number of gate arraies.
FIFO See First in First out
File Transfer Protocol A member of the TCP/IP suite of protocols, used to copy files between two computers
on the Internet. Both computers must support their respective FTP roles: one must be an
FTP client and the other an FTP server.
First in First out A stack management mechanism. The first saved data is first read and invoked.
FLP See fast link pulse
Forced switch This function forces the service to switch from the working channel to the protection
channel, with the service not to be restored automatically. This switch occurs regardless
of the state of the protection channels or boards, unless the protection channels or boards
are satisfying a higher priority bridge request.
Forward Defect Forward defect indication (FDI) is generated and traced forward to the sink node of the
Indication LSP by the node that first detects defects. It includes fields to indicate the nature of the
defect and its location. Its primary purpose is to suppress alarms being raised at affected
higher level client LSPs and (in turn) their client layers.
Forward Error A bit error correction technology that adds the correction information to the payload at
Correction the transmit end. Based on the correction information, the bit errors generated during
transmission are corrected at the receive end.
Forwarding plane Also referred to as the data plane. The forwarding plane is connection-oriented, and can
be used in Layer 2 networks such as an ATM network.
FPGA See Field Programmable Gate Array
Fragment Piece of a larger packet that has been broken down to smaller units.
Fragmentation Process of breaking a packet into smaller units when transmitting over a network medium
that can not support the original size of the packet.
frame A frame, starting with a header, is a string of bytes with a specified length. Frame length
is represented by the sampling circle or the total number of bytes sampled during a circle.
A header comprises one or a number of bytes with pre-specified values. In other words,
a header is a code segment that reflects the distribution (diagram) of the elements pre-
specified by the sending and receiving parties.
frequency diversity A diversity scheme that enables two or more microwave frequencies with a certain
frequency interval are used to transmit/receive the same signal and selection is then
performed between the two signals to ease the impact of fading.
FTP See File Transfer Protocol
Full duplex The system that can transmit information in both directions on a communication link.On
the communication link, both parties can send and receive data at the same time.
G
gateway network A network element that is used for communication between the NE application layer and
element the NM application layer
GCP See GMPLS control plan
GE See Gigabit Ethernet
Generic traffic shaping A traffic control measure that initiatively adjusts the output speed of the traffic. This is
to adapt the traffic to network resources that can be provided by the downstream router
to avoid packet discarding and congestion.
GFP Generic Framing Procedure
Gigabit Ethernet GE adopts the IEEE 802.3z. GE is compatible with 10 Mbit/s and 100 Mbit/s Ethernet.It
runs at 1000Mbit/s. Gigabit Ethernet uses a private medium, and it does not support
coaxial cables or other cables. It also supports the channels in the bandwidth mode. If
Gigabit Ethernet is, however, deployed to be the private bandwidth system with a bridge
(switch) or a router as the center, it gives full play to the performance and the bandwidth.
In the network structure, Gigabit Ethernet uses full duplex links that are private, causing
the length of the links to be sufficient for backbone applications in a building and campus.
Global Positioning A global navigation satellite system. It provides reliable positioning, navigation, and
System timing services to worldwide users .
GMPLS control plan The OptiX GMPLS control plan (GCP) is the ASON software developed by Huawei.
The OptiX GCP applies to the OptiX OSN product series. By using this software, the
traditional network can evolve into the ASON network. The OptiX OSN product series
support the ASON features.
GNE See gateway network element
GPS See Global Positioning System
GR See Graceful Restart
Graceful Restart In IETF, protocols related to Internet Protocol/Multiprotocol Label Switching (IP/
MPLS) such as Open Shortest Path First (OSPF), Intermediate System-Intermediate
System (IS-IS), Border Gateway Protocol (BGP), Label Distribution Protocol (LDP),
and Resource Reservation Protocol (RSVP) are extended to ensure that the forwarding
is not interrupted when the system is restarted. This reduces the flapping of the protocols
at the control plane when the system performs the active/standby switchover. This series
of standards is called Graceful Restart.
Graphical User A visual computer enviroment that represents programs, files, and options with graphical
Interface images, such as icons, menus, and dialog boxes, on the screen.
ground resistance (electricity) Opposition of the earth to the flow of current through it; its value depends
on the nature and moisture content of the soil, on the material, composition, and nature
of connections to the earth, and on the electrolytic action present.
GTS See Generic traffic shaping
GUI See Graphical User Interface
guide rail Components to guide, position, and support plug-in boards.
Internet Protocol A update version of IPv4. It is also called IP Next Generation (IPng). The specifications
Version 6 and standardizations provided by it are consistent with the Internet Engineering Task
Force (IETF).Internet Protocol Version 6 (IPv6) is also called. It is a new version of the
Internet Protocol, designed as the successor to IPv4. The specifications and
standardizations provided by it are consistent with the Internet Engineering Task Force
(IETF).The difference between IPv6 and IPv4 is that an IPv4 address has 32 bits while
an IPv6 address has 128 bits.
Inverse Multiplexing Inverse Multiplexing over ATM. The ATM inverse multiplexing technique involves
over ATM inverse multiplexing and de-multiplexing of ATM cells in a cyclical fashion among links
grouped to form a higher bandwidth logical link whose rate is approximately the sum of
the link rates. This is referred to as an IMA group.
IP See Internet Protocol
IPv6 See Internet Protocol Version 6
IS-IS See Intermediate System to Intermediate System
ISO See International Organization for Standardization
IST See Internal Spanning Tree
ITU-T International Telecommunication Union - Telecommunication Standardization Sector
IVL Independence VLAN learning
Jitter Short waveform variations caused by vibration, voltage fluctuations, and control system
instability.
A.4 K-O
L
Laser A component that generates directional optical waves of narrow wavelengths. The laser
light has better coherence than ordinary light. The fiber system takes the semi-conductor
laser as the light source.
layer 2 switch A data forwarding method. In LAN, a network bridge or 802.3 Ethernet switch transmits
and distributes packet data based on the MAC address. Since the MAC address is the
second layer of the OSI model, this data forwarding method is called layer 2 switch.
Layer 2 virtual private A virtual private network realized in the packet switched (IP/MPLS) network by Layer
network 2 switching technologies.
LB See Loopback
LCAS See Link Capacity Adjustment Scheme
LDPC Low-Density Parity Check code
line rate forwarding The line rate equals the maximum transmission rate capable on a given type of media.
Link Aggregation Link Aggregation Control Protocol (LACP) is part of an IEEE specification (802.3ad)
Control Protocol that allows you to bundle several physical ports to form a single logical channel. LACP
allows a switch to negotiate an automatic bundle by sending LACP packets to the peer.
link aggregation group An aggregation that allows one or more links to be aggregated together to form a link
aggregation group so that a MAC clientcan treat the link aggregation group as if it were
a single link.
Link Capacity The Link Capacity Adjustment Scheme (LCAS) is designed to allow the dynamic
Adjustment Scheme provisioning of bandwidth, using VCAT, to meet customer requirements.
Link Protection Protection provided by the bypass tunnel for the link on the working tunnel. The link is
a downstream link adjacent to the PLR. When the PLR fails to provide node protection,
the link protection should be provided.
LMSP Linear Multiplex Section Protection
Local Area Network A network formed by the computers and workstations within the coverage of a few square
kilometers or within a single building. It features high speed and low error rate. Ethernet,
FDDI, and Token Ring are three technologies used to implement a LAN. Current LANs
are generally based on switched Ethernet or Wi-Fi technology and running at 1,000 Mbit/
s (that is, 1 Gbit/s).
Locked switching When the switching condition is satisfied, this function disables the service from being
switched from the working channel to the protection channel. When the service has been
switched, the function enables the service to be restored from the protection channel to
the working channel.
LOF See Loss Of Frame
LOM Loss Of Multiframe
Loopback A troubleshooting technique that returns a transmitted signal to its source so that the
signal or message can be analyzed for errors.
LOP See Loss Of Pointer
LOS See Loss Of Signal
Loss Of Frame A condition at the receiver or a maintenance signal transmitted in the PHY overhead
indicating that the receiving equipment has lost frame delineation. This is used to monitor
the performance of the PHY layer.
Loss Of Pointer Loss of Pointer: A condition at the receiver or a maintenance signal transmitted in the
PHY overhead indicating that the receiving equipment has lost the pointer to the start of
cell in the payload. This is used to monitor the performance of the PHY layer.
Loss Of Signal Loss of signal (LOS) indicates that there are no transitions occurring in the received
signal.
Lower subrack The subrack close to the bottom of the cabinet when a cabinet contains several subracks.
LP Lower Order Path
LPT Link State Path Through
LSP See Label Switched Path
LSR See Label Switching Router
M
MA See Maintenance Association
MAC See Medium Access Control
MAC See Media Access Control
MADM Multi Add-Drop Multiplexer
Maintenance That portion of a Service Instance, preferably all of it or as much as possible, the
Association connectivity of which is maintained by CFM. It is also a full mesh of Maintenance
Entities.
Maintenance A MEP is an actively managed CFM Entity, associated with a specific DSAP of a Service
association End Point Instance, which can generate and receive CFM frames and track any responses. It is an
end point of a single Maintenance Association, and terminates a separate Maintenance
Entity for each of the other MEPs in the same Maintenance Association.
Maintenance Domain The Maintenance Domain (MD) refers to the network or the part of the network for which
connectivity is managed by CFM. The devices in an MD are managed by a single ISP.
Maintenance Point Maintenance Point (MP) is one of either a MEP or a MIP.
Management A type of database used for managing the devices in a communications network. It
Information Base comprises a collection of objects in a (virtual) database used to manage entities (such as
routers and switches) in a network.
Manual switching A protection switching. When the protection path is normal and there is no request of a
higher level switching, the service is manually switched from the working path to the
protection path, to test whether the network still has the protection capability.
Maximum Transfer The MTU (Maximum Transmission Unit) is the size of the largest datagram that can be
Unit sent over a network.
MBS Maximum Burst Size
MCF See Message Communication Function
MD See Maintenance Domain
MDI See Medium Dependent Interface
Mean Time To Repair The average time that a device will take to recover from a failure.
Media Access Control A protocol at the media access control sublayer. The protocol is at the lower part of the
data link layer in the OSI model and is mainly responsible for controlling and connecting
the physical media at the physical layer. When transmitting data, the MAC protocol
checks whether to be able to transmit data. If the data can be transmitted, certain control
information is added to the data, and then the data and the control information are
transmitted in a specified format to the physical layer. When receiving data, the MAC
protocol checks whether the information is correct and whether the data is transmitted
correctly. If the information is correct and the data is transmitted correctly, the control
information is removed from the data and then the data is transmitted to the LLC layer.
Medium Access A general reference to the low-level hardware protocols used to access a particular
Control network. The term MAC address is often used as a synonym for physical addresses.
Medium Dependent The electrical and mechanical interface between the equipment and the media
Interface transmission.
MEP See Maintenance association End Point
Message The MCF is composed of a protocol stack that allows exchange of management
Communication information with their prs .
Function
MIB See Management Information Base
MIP Maintenance Intermediate Point
MLPPP See Multi-link Point to Point Protocol
mount angle An L-shape steel sheet. One side is fixed on the front panel with screws, and the other
side is fixed on the installation hole with screws. On both sides of a rack, there is an L-
shaped metal fastener. This ensures that internal components are closely connected with
the rack. Normally, an internal component is installed with two mount angles.
MP See Maintenance Point
MPID Maintenance Point Identification
MPLS See Multi-Protocol Label Switch
MPLS L2VPN The MPLS L2VPN provides the Layer 2 VPN service based on an MPLS network.In
this case, on a uniform MPLS network, the carrier is able to provide Layer 2 VPNs of
different media types, such as ATM, FR, VLAN, Ethernet, and PPP.
MPLS OAM The MPLS OAM provides continuity check for a single LSP, and provides a set of fault
detection tools and fault correct mechanisms for MPLS networks. The MPLS OAM and
relevant protection switching components implement the detection function for the CR-
LSP forwarding plane, and perform the protection switching in 50 ms after a fault occurs.
In this way, the impact of a fault can be lowered to the minimum.
MPLS TE Multiprotocol Label Switching Traffic Engineering
MPLS TE tunnel In the case of reroute deployment, or when traffic needs to be transported through
multiple trails, multiple LSP tunnels might be used. In traffic engineering, such a group
of LSP tunnels are referred to as TE tunnels. An LSP tunnel of this kind has two
identifiers. One is the Tunnel ID carried by the SENDER object, and is used to uniquely
define the TE tunnel. The other is the LSP ID carried by the SENDER_TEMPLATE or
FILTER_SPEC object.
MS See Multiplex Section
MSP See multiplex section protection
N
N+1 protection A radio link protection system composed of N working channels and one protection
channel.
NE See Network Element
NE Explorer The main operation interface, of the U2000, which is used to manage the OptiX
equipment. In the NE Explorer, the user can configure, manage and maintain the NE,
boards, and ports on a per-NE basis.
Network Element A network element (NE) contains both the hardware and the software running on it. One
NE is at least equipped with one system control board which manages and monitors the
entire network element. The NE software runs on the system control board.
network management The network management system in charge of the operation, administration, and
system maintenance of a network.
Network Service Access A network address defined by ISO, through which entities on the network layer can
Point access OSI network services.
Network to Network This is an internal interface within a network linking two or more elements.
Interface
next hop The next router to which a packet is sent from any given router as it traverses a network
on its journey to its final destination.
NLP Normal Link Pulse
NMS See network management system
NNHOP Next-Next-Hop
NNI See Network to Network Interface
Node A node stands for a managed device in the network.For a device with a single frame, one
node stands for one device.For a device with multiple frames, one node stands for one
frame of the device.Therefore, a node does not always mean a device.
Node Protection A parameter of the FRR protection. It indicates that the bypass tunnel should be able to
protect the downstream node that is involved in the working tunnel and adjacent to the
PLR. The node cannot be a merge point, and the bypass tunnel should also be able to
protect the downstream link that is involved in the working tunnel and adjacent to the
PLR.
non-gateway network A network element whose communication with the NM application layer must be
element transferred by the gateway network element application layer.
non-GNE See non-gateway network element
NSAP See Network Service Access Point
NSF Not Stop Forwarding
NSMI Network Serial Multiplexed Interface
O
OAM See Operation, Administration and Maintenanc
ODF See Optical Distribution Frame
ODU See outdoor unit
One-to-One Backup A local repair method in which a backup tunnel is separately created for each protected
tunnel at a PLR.
Open Shortest Path A link-state, hierarchical interior gateway protocol (IGP) for network routing. Dijkstra's
First algorithm is used to calculate the shortest path tree. It uses cost as its routing metric. A
link state database is constructed of the network topology which is identical on all routers
in the area.
Open Systems A standard or "reference model" (officially defined by the International Organization of
Interconnection Standards (ISO)) for how messages should be transmitted between any two points in a
telecommunication network. The reference model defines seven layers of functions that
take place at each end of a communication.
Operation, Operation, Administration and Maintenance. A group of network support functions that
Administration and monitor and sustain segment operation, activities that are concerned with, but not limited
Maintenanc to, failure detection, notification, location, and repairs that are intended to eliminate faults
and keep a segment in an operational state and support activities required to provide the
services of a subscriber access network to users/subscribers.
Optical Distribution A frame which is used to transfer and spool fibers.
Frame
orderwire A channel that provides voice communication between operation engineers or
maintenance engineers of different stations.
OSI See Open Systems Interconnection
OSP OptiX Software Platform
OSPF See Open Shortest Path First
outdoor unit The outdoor unit of the split-structured radio equipment. It implements frequency
conversion and amplification for RF signals.
Outloop A method of looping back the input signals received at an port to an output port without
changing the structure of the signals.
Output optical power The ranger of optical energy level of output signals.
A.5 P-T
P
Packet over SDH/ A MAN and WAN technology that provides point-to-point data connections. The POS
SONET interface uses SDH/SONET as the physical layer protocol, and supports the transport of
packet data (such as IP packets) in MAN and WAN.
packet switched A telecommunication network which works in packet switching mode.
network
Packing case A case which is used for packing the board or subrack.
Path/Channel A logical connection between the point at which a standard frame format for the signal
at the given rate is assembled, and the point at which the standard frame format for the
signal is disassembled.
PBS See peak burst size
PCB See Printed Circuit Board
PCI bus PCI (Peripheral Component Interconnect) bus. A high performance bus, 32-bit or 64-bit
for interconnecting chips, expansion boards, and processor/memory subsystems.
PDH See Plesiochronous Digital Hierarchy
PDU Protocol Data Unit
PE See Provider Edge
peak burst size A parameter used to define the capacity of token bucket P, that is, the maximum burst
IP packet size when the information is transferred at the peak information rate. This
parameter must be larger than 0. It is recommended that this parameter should be not
less than the maximum length of the IP packet that might be forwarded.
Peak Information Rate Peak Information Rate . A traffic parameter, expressed in bit/s, whose value should be
not less than the committed information rate.
Penultimate Hop Penultimate Hop Popping (PHP) is a function performed by certain routers in an MPLS
Popping enabled network. It refers to the process whereby the outermost label of an MPLS tagged
packet is removed by a Label Switched Router (LSR) before the packet is passed to an
adjacent Label Edge Router (LER).
Per-Hop-Behavior A forwarding behavior applied at a DS-compliant node. This behavior belongs to the
behavior aggregate defined in the DiffServ domain.
PHB See Per-Hop-Behavior
PHP See Penultimate Hop Popping
PIM-DM Protocol Independent Multicast-Dense Mode
PIM-SM See Protocol Independent Multicast-Sparse Mode
PIR See Peak Information Rate
Plesiochronous Digital A multiplexing scheme of bit stuffing and byte interleaving. It multiplexes the minimum
Hierarchy rate 64 kit/s into the 2 Mbit/s, 34 Mbit/s, 140 Mbit/s, and 565 Mbit/s rates.
Point-to-Point Protocol A protocol on the data link layer, provides point-to-point transmission and encapsulates
data packets on the network layer. It is located in layer 2 of the IP protocol stack.
polarization A kind of electromagnetic wave, the direction of whose electric field vector is fixed or
rotates regularly. Specifically, if the electric field vector of the electromagnetic wave is
perpendicular to the plane of horizon, this electromagnetic wave is called vertically
polarized wave; if the electric field vector of the electromagnetic wave is parallel to the
plane of horizon, this electromagnetic wave is called horizontal polarized wave; if the
tip of the electric field vector, at a fixed point in space, describes a circle, this
electromagnetic wave is called circularly polarized wave.
POS See Packet over SDH/SONET
Power box A direct current power distribution box at the upper part of a cabinet, which supplies
power for the subracks in the cabinet.
PPP See Point-to-Point Protocol
PPVPN Provider Provisioned VPN
PQ See Priority Queuing
PRBS Pseudo-Random Binary Sequence
PRC Primary Reference Clock
Printed Circuit Board A board used to mechanically support and electrically connect electronic components
using conductive pathways, tracks, or traces, etched from copper sheets laminated onto
a non-conductive substrate.
Priority Queuing A priority queue is an abstract data type in computer programming that supports the
following three operations: 1) InsertWithPriority: add an element to the queue with an
associated priority 2) GetNext: remove the element from the queue that has the highest
priority, and return it (also known as "PopElement(Off)", or "GetMinimum") 3)
PeekAtNext (optional): look at the element with highest priority without removing it
Processing board area An area for the processing boards on the subrack.
protection grounding A cable which connects the equipment and the protection grounding bar. Usually, one
cable half of the cable is yellow; while the other half is green.
Protection path A specific path that is part of a protection group and is labeled protection.
Protocol Independent A protocol for efficiently routing to multicast groups that may span wide-area (and inter-
Multicast-Sparse Mode domain) internets. This protocol is named protocol independent because it is not
dependent on any particular unicast routing protocol for topology discovery, and sparse-
mode because it is suitable for groups where a very low percentage of the nodes (and
their routers) will subscribe to the multicast session. Unlike earlier dense-mode multicast
routing protocols such as DVMRP and PIM-DM which flooded packets everywhere and
then pruned off branches where there were no receivers, PIM-SM explicitly constructs
a tree from each sender to the receivers in the multicast group. Multicast packets from
the sender then follow this tree.
Provider Edge A device that is located in the backbone network of the MPLS VPN structure. A PE is
responsible for VPN user management, establishment of LSPs between PEs, and
exchange of routing information between sites of the same VPN. During the process, a
PE performs the mapping and forwarding of packets between the private network and
the public channel. A PE can be a UPE, an SPE, or an NPE.
Pseudo wire An emulated connection between two PEs for transmitting frames. The PW is established
and maintained by PEs through signaling protocols. The status information of a PW is
maintained by the two end PEs of a PW.
Pseudo Wire Pseudo-Wire Emulation Edge to Edge (PWE3) is a type of end-to-end Layer 2
Emulation Edge-to- transmitting technology. It emulates the essential attributes of a telecommunication
Edge service such as ATM, FR or Ethernet in a Packet Switched Network (PSN). PWE3 also
emulates the essential attributes of low speed Time Division Multiplexed (TDM) circuit
and SONET/SDH. The simulation approximates to the real situation.
PSN See packet switched network
PTN Packet Transport Network
PW See Pseudo wire
PWE3 See Pseudo Wire Emulation Edge-to-Edge
Q
QoS See Quality of Service
QPSK See Quadrature Phase Shift Keying
Quadrature Phase Shift Quadrature Phase Shift Keying (QPSK) is a modulation method of data transmission
Keying through the conversion or modulation and the phase determination of the reference
signals (carrier). It is also called the fourth period or 4-phase PSK or 4-PSK. QPSK uses
four dots in the star diagram. The four dots are evenly distributed on a circle. On these
phases, each QPSK character can perform two-bit coding and display the codes in Gray
code on graph with the minimum BER.
Quality of Service Quality of Service, which determines the satisfaction of a subscriber for a service. QoS
is influenced by the following factors applicable to all services: service operability,
service accessibility, service maintainability, and service integrity.
R
Radio Freqency A type of electric current in the wireless network using AC antennas to create an
electromagnetic field. It is the abbreviation of high-frequency AC electromagnetic wave.
The AC with the frequency lower than 1 kHz is called low-frequency current. The AC
with frequency higher than 10 kHz is called high-frequency current. RF can be classified
into such high-frequency current.
Radio Network A device used in the RNS to control the usage and integrity of radio resources.
Controller
Random Early A packet loss algorithm used in congestion avoidance. It discards the packet according
Detection to the specified higher limit and lower limit of a queue so that global TCP synchronization
resulted in traditional Tail-Drop can be prevented.
Rapid Spanning Tree An evolution of the Spanning Tree Protocol, providing for faster spanning tree
Protocol convergence after a topology change. The RSTP protocol is backward compatible with
the STP protocol.
RDI See Remote Defect Indication
Received Signal The received wide band power, including thermal noise and noise generated in the
Strength Indicator receiver, within the bandwidth defined by the receiver pulse shaping filter, for TDD
within a specified timeslot. The reference point for the measurement shall be the antenna
Receiver Sensitivity Receiver sensitivity is defined as the minimum acceptable value of average received
power at point R to achieve a 1 x 10-10 BER.
RED See Random Early Detection
REI See Remote Error Indication
Remote Defect A signal transmitted at the first opportunity in the outgoing direction when a terminal
Indication detects specific defects in the incoming signal.
Remote Error A remote error indication (REI) is sent upstream to signal an error condition. There are
Indication two types of REI alarms: Remote error indication line (REI-L) is sent to the upstream
LTE when errors are detected in the B2 byte. Remote error indication path (REI-P) is
sent to the upstream PTE when errors are detected in the B3 byte.
remote network A manage information base (MIB) defined by the Internet Engineering Task Force
monitoring (IETF). RMON is mainly used to monitor the data flow of one network segment or the
entire network.
Resource Reservation The Resource Reservation Protocol (RSVP) is designed for Integrated Service and is
Protocol used to reserve resources on every node along a path. RSVP operates on the transport
layer; however, RSVP does not transport application data. RSVP is a network control
protocol like Internet Control Message Protocol (ICMP).
Reverse pressure A traffic control method. In telecommunication, when detecting that the transmit end
transmits a large volume of traffic, the receive end sends signals to ask the transmit end
to slow down the transmission rate.
RF See Radio Freqency
RFC Request For Comment
S
SD See space diversity
SDH See Synchronous Digital Hierarchy
SDP Serious Disturbance Period
SEMF Synchronous Equipment Management Function
Service Level A management-documented agreement that defines the relationship between service
Agreement provider and its customer. It also provides specific, quantifiable information about
measuring and evaluating the delivery of services. The SLA details the specific operating
and support requirements for each service provided. It protects the service provider and
customer and allows the service provider to provide evidence that it has achieved the
documented target measure.
SES Severely Errored Second
Setup Priority The priority of the tunnel with respect to obtaining resources, ranging from 0 (indicates
the highest priority) to 7. It is used to determine whether the tunnel can preempt the
resources required by other backup tunnels.
SF See Signal Fail
SFP See Small Form-Factor Pluggable
side trough The trough on the side of the cable rack, which is used to place nuts so as to fix the
cabinet.
signal cable Common signal cables cover the E1cable, network cable, and other non-subscriber signal
cable.
Signal Fail SF is a signal indicating the associated data has failed in the sense that a near-end defect
condition (not being the degraded defect) is active.
Signal Noise Ratio The SNR or S/N (Signal to Noise Ratio) of the amplitude of the desired signal to the
amplitude of noise signals at a given point in time. SNR is expressed as 10 times the
logarithm of the power ratio and is usually expressed in dB (Decibel).
Simple Network A network management protocol of TCP/IP. It enables remote users to view and modify
Management Protocol the management information of a network element. This protocol ensures the
transmission of management information between any two points. The polling
mechanism is adopted to provide basic function sets. According to SNMP, agents, which
can be hardware as well as software, can monitor the activities of various devices on the
network and report these activities to the network console workstation. Control
information about each device is maintained by a management information block.
simplex Of or relating to a telecommunications system in which only one message can be sent
in either direction at one time.
SLA See Service Level Agreement
Slicing To divide data into the information units proper for transmission.
Small Form-Factor A specification for a new generation of optical modular transceivers.
Pluggable
SNC See SubNetwork Connection
SNCP See SubNetwork Connection Protection
SNMP See Simple Network Management Protocol
SNR See Signal Noise Ratio
SP Strict Priority
space diversity A diversity scheme that enables two or more antennas separated by a specific distance
to transmit/receive the same signal and selection is then performed between the two
signals to ease the impact of fading. Currently, only receive SD is used.
Spanning Tree Protocol Spanning Tree Protocol. STP is a protocol that is used in the LAN to remove the loop.
STP applies to the redundant network to block some undesirable redundant paths through
certain algorithms and prune a loop network into a loop-free tree network.
SSM See Synchronization Status Message
Static Virtual Circuit Static virtual circuit. A static implementation of MPLS L2VPN that transfers L2VPN
information by manual configuration of VC labels, instead of by a signaling protocol.
Statistical multiplexing A multiplexing technique whereby information from multiple logical channels can be
transmitted across a single physical channel. It dynamically allocates bandwidth only to
active input channels, to make better use of available bandwidth and allow more devices
to be connected than with other multiplexing techniques. Compare with TDM.
STM See synchronous transport module
STM-1 SDH Transport Module -1
T
tail drop A type of QoS. When a queue within a network router reaches its maximum length,
packet drops can occur. When a packet drop occurs, connection-based protocols such as
TCP slow down their transmission rates in an attempt to let queued packets be serviced,
thereby letting the queue empty. This is also known as tail drop because packets are
dropped from the input end (tail) of the queue.
Tail drop A congestion management mechanism, in which packets arrive later are discarded when
the queue is full. This policy of discarding packets may result in network-wide
synchronization due to the TCP slow startup mechanism.
TCI Tag Control Information
TCP See TransmissionControl Protocol
TDM See Time Division Multiplexing
TE See traffic engineering
TEDB See Traffic Engineering DataBase
Telecommunication The Telecommunications Management Network is a protocol model defined by ITU-T
Management Network for managing open systems in a communications network.An architecture for
management, including planning, provisioning, installation, maintenance, operation and
administration of telecommunications equipment, networks and services.
TIM Trace Identifier Mismatch
Time Division It is a multiplexing technology. TDM divides the sampling cycle of a channel into time
Multiplexing slots (TSn, n=0, 1, 2, 3......), and the sampling value codes of multiple signals engross
time slots in a certain order, forming multiple multiplexing digital signals to be
transmitted over one channel.
Time To Live A technique used in best-effort delivery systems to prevent packets that loop endlessly.
The TTL is set by the sender to the maximum time the packet is allowed to be in the
network. Each router in the network decrements the TTL field when the packet arrives,
and discards any packet if the TTL counter reaches zero.
TMN See Telecommunication Management Network
ToS priority A ToS sub-field (the bits 0 to 2 in the ToS field) in the ToS field of the IP packet header.
TPS See Tributary Protection Switch
traffic engineering A task that effectively maps the service flows to the existing physical topology.
Traffic Engineering TEDB is the abbreviation of the traffic engineering database. MPLS TE needs to know
DataBase the features of the dynamic TE of every links by expanding the current IGP, which uses
the link state algorithm, such as OSPF and IS-IS. The expanded OSPF and IS-IS contain
some TE features, such as the link bandwidth and color. The maximum reserved
bandwidth of the link and the unreserved bandwidth of every link with priority are rather
important. Every router collects the information about TE of every links in its area and
generates TE DataBase. TEDB is the base of forming the dynamic TE path in the MPLS
TE network.
Traffic shaping It is a way of controlling the network traffic from a computer to optimize or guarantee
the performance and minimize the delay. It actively adjusts the output speed of traffic
in the scenario that the traffic matches network resources provided by the lower layer
devices, avoiding packet loss and congestion.
trail A type of transport entity, mainly engaged in transferring signals from the input of the
trail source to the output of the trail sink, and monitoring the integrality of the transferred
signals.
TransmissionControl The protocol within TCP/IP that governs the breakup of data messages into packets to
Protocol be sent via IP (Internet Protocol), and the reassembly and verification of the complete
messages from packets received by IP. A connection-oriented, reliable protocol (reliable
in the sense of ensuring error-free delivery), TCP corresponds to the transport layer in
the ISO/OSI reference model.
Tributary Protection Tributary protection switching, a function provided by the equipment, is intended to
Switch protect N tributary processing boards through a standby tributary processing board.
trTCM See Two Rate Three Color Marker
TTL See Time To Live
TU Tributary Unit
Tunnel A channel on the packet switching network that transmits service traffic between PEs.
In VPN, a tunnel is an information transmission channel between two entities. The tunnel
ensures secure and transparent transmission of VPN information. In most cases, a tunnel
is an MPLS tunnel.
Two Rate Three Color The trTCM meters an IP packet stream and marks its packets based on two rates, Peak
Marker Information Rate (PIR) and Committed Information Rate (CIR), and their associated
burst sizes to be either green, yellow, or red. A packet is marked red if it exceeds the
PIR. Otherwise it is marked either yellow or green depending on whether it exceeds or
doesn't exceed the CIR.
A.6 U-Z
U
UAS Unavailable Second
UBR See Unspecified Bit Rate
UDP See User Datagram Protocol
underfloor cabling The cables connected cabinets and other devices are routed underfloor.
UNI See User Network Interface
Unicast The process of sending data from a source to a single recipient.
Unspecified Bit Rate No commitment to transmission. No feedback to congestion. This type of service is ideal
for the transmission of IP datagrams. In case of congestion, UBR cells are discarded,
and no feedback or request for slowing down the data rate is delivered to the sender.
Upper subrack The subrack close to the top of the cabinet when a cabinet contains several subracks.
UPS Uninterruptible Power Supply
upward cabling Cables or fibres connect the cabinet with other equipment from the top of the cabinet.
User Datagram A TCP/IP standard protocol that allows an application program on one device to send a
Protocol datagram to an application program on another. User Datagram Protocol (UDP) uses IP
to deliver datagrams. UDP provides application programs with the unreliable
connectionless packet delivery service. Thus, UDP messages can be lost, duplicated,
delayed, or delivered out of order.UDP is used to try to transmit the data packet, that is,
the destination device does not actively confirm whether the correct data packet is
received.
User Network Interface A type of ATM Forum specification that defines an interoperability standard for the
interface between ATM-based products (a router or an ATM switch) located in a private
network and the ATM switches located within the public carrier networks. Also used to
describe similar connections in Frame Relay networks.
V
V-NNI See virtual network-network interface
V-UNI See Virtual User-Network Interface
Variable Bit Rate One of the traffic classes used by ATM (Asynchronous Transfer Mode). Unlike a
permanent CBR (Constant Bit Rate) channel, a VBR data stream varies in bandwidth
and is better suited to non real time transfers than to real-time streams such as voice calls.
VBR See Variable Bit Rate
VC See Virtual Channel
VC-12 Virtual Container -12
VC-3 Virtual Container -3
VC-4 Virtual Container -4
VCC Virtual Channel Connection
VCC,VPL See Virtual Chanel Connection
VCG See virtual concatenation group
VCI See Virtual Channel Identifier
Virtual Chanel Virtual Channel Connection. The VC logical trail that carries data between two end
Connection points in an ATM network. A logical grouping of multiple virtual channel connections
into one virtual connection.
Virtual Channel Any logical connection in the ATM network. A VC is the basic unit of switching in the
ATM network uniquely identified by a virtual path identifier (VPI)/virtual channel
identifier (VCI) value. It is the channel on which ATM cells are transmitted by the sw
Virtual Channel virtual channel identifier. A 16-bit field in the header of an ATM cell. The VCI, together
Identifier with the VPI, is used to identify the next destination of a cell as it passes through a series
of ATM switches on its way to its destination.
virtual concatenation A group of co-located member trail termination functions that are connected to the same
group virtual concatenation link
Virtual Leased Line A point-to-point, layer-2 channel that behaves like a leased line by transparently
transporting different protocols with a guaranteed throughput.
Virtual Local Area A logical grouping of two or more nodes which are not necessarily on the same physical
Network network segment but which share the same IP network number. This is often associated
with switched Ethernet.
virtual network- A virtual network-network interface (V-NNI) is a network-side interface.
network interface
Virtual Path Identifier The field in the ATM (Asynchronous Transfer Mode) cell header that identifies to which
VP (Virtual Path) the cell belongs.
Virtual Private LAN A type of point-to-multipoint L2VPN service provided over the public network. VPLS
Service enables geographically isolated user sites to communicate with each other through the
MAN/WAN as if they are on the same LAN.
Virtual Private The extension of a private network that encompasses encapsulated, encrypted, and
Network authenticated links across shared or public networks. VPN connections can provide
remote access and routed connections to private networks over the Internet.
Virtual Private Wire A technology that bears Layer 2 services. VPWS emulates services such as ATM, FR,
Service Ethernet, low-speed TDM circuit, and SONET/SDH in a PSN.
Virtual Routing and A technology included in IP (Internet Protocol) network routers that allows multiple
Forwarding instances of a routing table to exist in a router and work simultaneously.
Virtual Switch Instance An instance through which the physical access links of VPLS can be mapped to the
virtual links. Each VSI provides independent VPLS service. VSI has Ethernet bridge
function and can terminate PW.
Virtual User-Network virtual user-network interface. A virtual user-network interface, works as an action point
Interface to perform service claissification and traffic control in HQoS.
VLAN See Virtual Local Area Network
VLL See Virtual Leased Line
Voice over IP An IP telephony term for a set of facilities used to manage the delivery of voice
information over the Internet. VoIP involves sending voice information in a digital form
in discrete packets rather than by using the traditional circuit-committed protocols of the
public switched telephone network (PSTN).
VoIP See Voice over IP
VPI See Virtual Path Identifier
VPLS See Virtual Private LAN Service
VPN See Virtual Private Network
VPWS See Virtual Private Wire Service
VRF See Virtual Routing and Forwarding
VSI See Virtual Switch Instance
W
Wait to Restore Time A period of time that must elapse before a - from a fault recovered - trail/connection can
be used again to transport the normal traffic signal and/or to select the normal traffic
signal from.
WAN See Wide Area Network
Web LCT The local maintenance terminal of a transport network, which is located on the NE
management layer of the transport network
Weighted Fair Queuing Weighted Fair Queuing (WFQ) is a fair queue scheduling algorithm based on bandwidth
allocation weights. This scheduling algorithm allocates the total bandwidth of an
interface to queues, according to their weights and schedules the queues cyclically. In
this manner, packets of all priority queues can be scheduled.
Weighted Random A packet loss algorithm used for congestion avoidance. It can prevent the global TCP
Early Detection synchronization caused by traditional tail-drop. WRED is favorable for the high-priority
packet when calculating the packet loss ratio.
WFQ See Weighted Fair Queuing
Wide Area Network A network composed of computers which are far away from each other which are
physically connected through specific protocols. WAN covers a broad area, such as a
province, a state or even a country.
Winding pipe A tool for fiber routing, which acts as the corrugated pipe.
wire speed Wire speed refers to the maximum packet forwarding capacity on a cable. The value of
wire speed equals the maximum transmission rate capable on a given type of media.
WMS Wholesale Managed Services
WRED See Weighted Random Early Detection
WRR Weighted Round Robin
WTR See Wait to Restore Time
X
XPD Cross-Polarization Discrimination
XPIC See cross polarization interference cancellation