Академический Документы
Профессиональный Документы
Культура Документы
Series
V100R005C01
Commissioning Guide
Issue
02
Date
2013-08-10
Notice
The purchased products, services and features are stipulated by the contract made between Huawei and the
customer. All or part of the products, services and features described in this document may not be within the
purchase scope or the usage scope. Unless otherwise specified in the contract, all statements, information,
and recommendations in this document are provided "AS IS" without warranties, guarantees or representations
of any kind, either express or implied.
The information in this document is subject to change without notice. Every effort has been made in the
preparation of this document to ensure accuracy of the contents, but all statements, information, and
recommendations in this document do not constitute a warranty of any kind, express or implied.
Website:
http://www.huawei.com
Email:
support@huawei.com
Issue 02 (2013-08-10)
Version
V100R005C01
V100R009C00
Intended Audience
This document describes the commissioning process of the OptiX PTN 950 in terms of
preparations for commissioning and system commissioning.
This document describes the commissioning flow and method.
This document is intended for:
l
Symbol Conventions
The symbols that may be found in this document are defined as follows.
Symbol
Description
DANGER
WARNING
CAUTION
Issue 02 (2013-08-10)
ii
Symbol
Description
TIP
TIP indicates a tip that may help you solve a problem or save
time.
NOTE
GUI Conventions
The GUI conventions that may be found in this document are defined as follows.
Convention
Description
Boldface
>
Change History
Updates between document issues are cumulative. Therefore, the latest document issue contains
all updates made in previous issues.
Description
Whole manual
Description
Whole manual
iii
Update
Description
Whole manual
Issue 02 (2013-08-10)
iv
Contents
Contents
About This Document.....................................................................................................................ii
1 Equipment Commissioning Flow..............................................................................................1
2 Preparations for the Commissioning.........................................................................................3
2.1 Checking Commissioning Conditions............................................................................................................................4
2.2 References and Instruments Required for the Commissioning......................................................................................4
3 Network Commissioning.............................................................................................................6
3.1 Checking the Connection between the Equipment and the NMS Computer..................................................................8
3.2 Starting the U2000..........................................................................................................................................................8
3.3 Creating the Network Topology.....................................................................................................................................9
3.3.1 Creating NEs................................................................................................................................................................9
3.3.2 Uploading NE Data...................................................................................................................................................15
3.3.3 Setting NE Name, NE IP Address, NE ID and LSR ID............................................................................................17
3.3.4 Creating Links...........................................................................................................................................................19
3.4 Setting the VLAN ID and Bandwidth Used by Inband DCN.......................................................................................23
3.5 Synchronizing NE Time...............................................................................................................................................25
3.6 Enabling the NE Performance Monitoring Function....................................................................................................26
3.7 Checking the Optical Power of Optical Interface.........................................................................................................27
3.8 Configuring Services....................................................................................................................................................29
3.9 Testing Service Connectivity........................................................................................................................................29
3.9.1 Testing Connectivity of an E-Line Service...............................................................................................................30
3.9.2 Testing Connectivity of an E-LAN Service..............................................................................................................31
3.9.3 Testing Connectivity of a UNIs-NNI ATM Service.................................................................................................35
3.9.4 Testing Connectivity of a CES Service.....................................................................................................................38
3.9.5 Testing Connectivity of a CES Service (VC3/VC4).................................................................................................41
3.9.6 Testing Connectivity of an IP over PW Service........................................................................................................43
3.9.7 Testing Connectivity of a UNI-NNI L3VPN Service...............................................................................................46
3.10 Testing the Network Protection Switching.................................................................................................................48
3.10.1 Testing MPLS Tunnel APS Protection....................................................................................................................48
3.10.2 Testing LMSP Protection........................................................................................................................................50
3.10.3 Test on Ring Protection Switching..........................................................................................................................51
A Glossary........................................................................................................................................53
Issue 02 (2013-08-10)
This section describes the flow of commissioning the equipment. The commissioning flow
covers preparation and network commissioning.
Figure 1-1 shows the equipment commissioning flow.
Issue 02 (2013-08-10)
Preparation
Network
Commissioning
Setup commissioning
enivronment
Commissioning
items
Synchronize NE time
Enable the NE
performance
monitoring function
Required
Required
Optional
Configure the
services
Issue 02 (2013-08-10)
Issue 02 (2013-08-10)
The U2000 must be installed in the NMS center and the installation must be checked.
Refer to the OptiX iManager U2000 Installation Guide.
The board configuration of the equipment should be consistent with the board configuration
diagram.
Fibers and cables must be connected to interfaces on the equipment and routed to the
distribution frame. The fiber and cable connections must be consistent with the fiber and
cable connection table.
NEs must be correctly connected according to the fiber and cable connection table, and the
networking diagram.
Reference manuals
Prepare the following references for equipment commissioning:
l
OptiX PTN 950 Packet Transport Platform of PTN Series Configuration Guide
OptiX PTN 950 Packet Transport Platform of PTN Series Feature Description
OptiX PTN 950 Packet Transport Platform of PTN Series Maintenance Guide
OptiX PTN 950 Packet Transport Platform of PTN Series Product Description
OptiX PTN 950 Packet Transport Platform of PTN Series Hardware Description
Networking diagram
Issue 02 (2013-08-10)
Tools
Table 2-1 lists the tools required for the commissioning.
Table 2-1 Tool list
Type
Description
Common tool
Adjustable wrench
Special tool
Meter
Materials
NOTE
Issue 02 (2013-08-10)
3 Network Commissioning
Network Commissioning
3.1 Checking the Connection between the Equipment and the NMS Computer
The NMS runs on the NMS computer to manage the NEs. If the NMS computer is
incorrectly connected to the equipment, the NMS cannot manage the NEs. Check the
connection between the equipment and the NMS computer to ensure that the connection is
correct. This section describes how to check the connection between the equipment and the
NMS computer.
2.
3.
4.
5.
6.
Issue 02 (2013-08-10)
3 Network Commissioning
7.
8.
9.
Issue 02 (2013-08-10)
3 Network Commissioning
Prerequisites
l
The NMS computer must be connected to the equipment through a network cable or LAN.
Procedure
l
2.
Observe the indicator for the network interface card of the NMS computer and the
indicator for the network management interface of the gateway NE.
The LINK indicator should stay on and green. If there are packets to be sent or
received, the orange ACT indicator should flash.
2.
----End
3 Network Commissioning
For details on how to start the U2000, see Huawei iManager U2000 Operator Guide .
Prerequisites
The U2000 server must have been configured for gateways.
DCN must have been enabled on ports.
Context
If PTN NEs need to be deployed in a large quantity or for network expansion, usually, field
maintenance engineers have to ensure that the NEs have been connected to the network before
instructing engineers at the network management center to manually acknowledge the NEs and
create them on the U2000. Moreover, resources are wasted and efficiency is low if many NEs
need to connect to the network and the process takes a long time. If the automatic NE connection
function is configured, engineers at the network management center do not need to manually
acknowledge NEs. Instead, the U2000 automatically identifies the NEs, creates them on itself,
and uploads configuration data. NE creation in this manner is faster and more reliable.
Issue 02 (2013-08-10)
3 Network Commissioning
Management
interface
Gateway
NMS
Network management
on the DCN plane
IP tunnel
Third-party
network
Figure 3-1 shows the networking scheme for automatic NE connection. The PTN equipment
are configured for network deployment or expansion and are connected by fibers/cables or IP
tunnels. DCN is enabled on ports on the two sides of each link after the PTN NEs are connected
to the network, or DCN is enabled on IP tunnels after these tunnels are configured, to transmit
NE information over the inband DCN and third-party network. The U2000 manages the PTN
NEs on the DCN plane by using gateways that report information about new non-gateway NEs
to the U2000.
Procedure
Step 1 Operation and maintenance engineers can set a U2000 server IP address and Enable the
automatic NE reporting function for gateways.
1.
In the NE Explorer, select an NE and choose Communication > NMS Server from the
Function Tree.
2.
Set NE Automatic Reporting to Enabled and set a U2000 server IP address for gateways.
Click Apply.
Step 2 Choose File > Discovery > NE Auto Discovery from the shortcut menu.
Step 3 In the Auto Discovery Configuration area, select the Discovery Automatically check box.
Step 4 Optional: Click Filter. In the dialog box that is displayed, set filter criteria for automatic NE
discovery. Click OK.
Step 5 Optional: In the Auto Discovery Configuration area, select the Create Automatically check
box. Set NE User, NE password, and Connection Mode.
Step 6 Optional: In the Auto Discovery Configuration area, select the Upload Automatically check
box.
Step 7 Click Apply.
NOTE
In the NE Found area, information about automatically discovered NEs is displayed. If the Create
Automatically and Upload Automatically check boxes are selected, the U2000 automatically creates and
uploads in batches the NEs that are discovered but not created.
----End
Issue 02 (2013-08-10)
10
3 Network Commissioning
Follow-up Procedure
If the Create Automatically check box is not selected, you can manually create an NE that is
discovered but not created as follows:
1.
In the NE Found area, select an NE that is not created, and then click Create NE.
2.
In the dialog box that is displayed, enter information about the NE and click OK.
Prerequisites
l
The U2000 must normally communicate with the gateway NE and the gateway NE must
normally communicate with the other NEs in the network.
Procedure
Step 1 Choose File > Search > Auto Discovery ... from the Main Menu. The Auto Discovery window
is displayed.
Step 2 Click the Transport NE Search tab.
Step 3 Select the search mode from the drop-down list of Search Mode.
l
Issue 02 (2013-08-10)
Enter the network segment or IP addresses of NEs to search for the NEs.
a.
Click Add and the Input Search Domain dialog box is displayed.
b.
11
3 Network Commissioning
NOTE
l The device supports to search and create NEs by using the LSR ID as the IP address.
l The default NE user is root. The default password is password.
l If you search by IP address:
l Only the NEs (not across routers) in the same network segment can be searched
out normally if you select the IP Address Range of GNE because broadcasting
is usually disabled for the routers in the network (to prevent network storm).
l Search out the NEs in the network segment by using the IP Address of GNE if
you need to search for the NEs across routers.
l Only NSAP Address can be selected If you search for NEs by using the NSAP
address.
l Repeat the above steps to add more search domains. You can also delete the systemdefault search domain.
2.
NOTE
Select Upload after being created. The NE data is uploaded to the U2000 after
the NEs are created.
NOTE
You can select all options in the Search for NE area to search for NEs, create NEs, and upload
the NE data at a time.
If you fail to enter a network segment correctly, enable IP auto discovery. After enabling IP auto
discovery, you can obtain the IP address of the GNE and search out all the NEs related to the GNE.
CAUTION
In the case of NEs that are connected to the U2000 through the router, these NEs cannot
be searched out by IP auto discovery. They can be searched out only by network segment.
Step 4 Click Next and the Result area is displayed.
TIP
You can select the Display uncreated NEs to only display the uncreated NEs.
Step 5 Optional: If you select Search for NE only, you can select the NEs, which are not yet created,
in the Results list after the search for NEs is complete. Click Create and then the Create dialog
box is displayed. Enter User Name and Password in the Create dialog box, and then click
OK.
Issue 02 (2013-08-10)
12
3 Network Commissioning
Step 6 Optional: Click Change NE ID. Then, the Change NE ID dialog box is displayed. Users can
check against the Bar Code List by the value of Bar Code, and then modify the NE Name,
Extend NE ID, Base NE ID, and IP Address fields accordingly.
CAUTION
Change NE ID will make NEs unreachable from the U2000.
NOTE
The Bar Code List is provided by the hardware installation personnel to the software commissioning
personnel. The list contains the bar codes of stations.
Step 7 Optional: Select the NEs from the Results list and click Set Gateway NE. The Set Gateway
NE dialog box is displayed. Enter the message, and click OK.
Step 8 In this case, the NE is in the un-configured state. Choose Configuration > NE Configuration
Data Management from the Main Menu to display the NE Configuration Data
Management interface.
. Right-click the selected NE in the configuration
Step 9 Select the NE for verification and click
data management list and choose Verify from the shortcut menu. Then, click OK to display the
Operation Result dialog box, indicating that the operation is successful. Click Close.
----End
Result
When the verification is complete, the NE is still in the un-configured state. In this case, the NEs
created in batches are grayed out.
Make sure that the number of NEs to be created by searching is consistent with the planning. If
certain NEs cannot be searched out, it indicates that the DCN channels between the NEs and the
gateway NE are unavailable, or the NEs are faulty. In this case, troubleshoot the fault with
reference to "Configuring an Inband DCN" of the OptiX PTN 950 Packet Transport Platform
of PTN Series Feature Description and "Inband DCN Troubleshooting" of the OptiX PTN 950
Packet Transport Platform of PTN Series Maintenance Guide.
Follow-up Procedure
After an NE is created, if you fail to log in to the NE, possible causes are listed as follows:
l
The password for the NE user is incorrect. Enter the correct password for the NE user.
The NE user is invalid or the NE user is already logged in. Change to use a valid NE user.
Creating a Single NE
The U2000 can manage an NE after the NE is created. Although creating a single NE is not as
fast and accurate as creating NEs in batches, you can perform this operation regardless of whether
the data is configured on the NE or not.
Issue 02 (2013-08-10)
13
3 Network Commissioning
Prerequisites
You must be an NM user with "Operator Group" authority or higher.
The license must be installed and the license must support creating the NE of the type.
Background Information
First create a GNE, and then create a non-gateway NE.
If the NE is not created properly or the communication between the NE and the U2000 is
abnormal, the NE is displayed in gray color.
Procedure
Step 1 Right-click in the blank space of the Main Topology and choose New > Device from the shortcut
menu. The Create NE dialog box is displayed.
Step 2 Select the NE type from the Object Type tree.
Step 3 Complete the following information: ID, Extended ID, Name and Remarks.
Step 4 To create a GNE, proceed to Step 5. To create a non-gateway NE, proceed to Step 6.
2.
Do...
IP protocol
Step 6 Select Non-Gateway from the Gateway Type drop-down list. Select the GNE to which the NE
is associated to from the Affiliated Gateway drop-down list.
Step 7 Enter the NE User and Password.
Issue 02 (2013-08-10)
14
3 Network Commissioning
NOTE
Step 8 Click OK. Then, click in the blank space of the Main Topology and the NE icon appears in the
position where you clicked.
----End
Result
After an NE is successfully created, the system automatically saves the information, such as the
IP address, subnet mask to the U2000 database.
Follow-up Procedure
After an NE is created, if you fail to log in to the NE, possible causes are listed as follows:
l
The communication between the U2000 and the NE is abnormal. Check the settings of
communication parameters, such as the IP address of the NE.
The password for the NE user is incorrect. Enter the correct password for the NE user.
The NE user is invalid or the NE user is already logged in. Change to use a valid NE user.
Prerequisites
l
Procedure
l
Issue 02 (2013-08-10)
Upload:
1.
2.
15
3 Network Commissioning
The Confirm dialog box is displayed indicating that the upload may take a long time.
3.
4.
Click Close.
----End
Result
When uploading the NE data is complete, indications of the colors of the NE icon are as follows:
l
If the NE icon is red, it indicates critical alarms on the NE. In this case, check and handle
the alarms.
in the toolbar.
1.
2.
3.
Issue 02 (2013-08-10)
If the NE icon turns to other colors, it indicates major, minor, or warning alarms on the NE.
In this case, check and handle the alarms by performing the preceding steps.
Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
16
3 Network Commissioning
NOTE
An interface without any cable connection reports alarms. For example, an optical interface reports the R_LOS
alarm. Reporting these alarms in this case is normal and does not affect monitoring of other alarms. You can set
alarm reversion so that these alarms, when generated, are not reported. For details on how to set alarm reversion,
see the Online Help of the Huawei iManager U2000.
Prerequisites
l
The PCB electronic label of each NE at each site must be provided to the software
commissioning engineer by the installation personnel.
Procedure
Step 1 Confirm the NE name, NE IP address, and NE ID to be set for the NE.
1.
Choose Inventory > Project Document > Board Manufacturer Information from the
Main Menu to display the Board Manufacturer Information interface.
2.
to display
Select the system control board of the NE for confirmation and click
the slot information of the system control board. Then, click Query in the right corner to
display the Queryprogress dialog box. When the query is complete, the Operation
Result dialog box, indicating that the operation is successful. Click Close.
3.
Check and record the electronic label of the PCB of the system control board. Then,
compare the recorded electronic label with the PCB electronic label table provided by the
hardware engineer to determine the NE name, NE IP address, and NE ID to be set for the
NE.
On the Main Topology, select and right-click the desired NE. In the shortcut menu, choose
NE Explorer to display the NE Explorer window.
2.
Choose Communication > Communication Parameters from the Function Tree on the
left. The Set NE Parameter is displayed on the right.
3.
Modify the IP address and subnet mask according to the engineering planning, and then
click Apply.
Issue 02 (2013-08-10)
17
3 Network Commissioning
NOTE
4.
In the Warning dialog box that is displayed, click OK. In the Warning dialog box
displayed, click OK.
On the Main Topology, select and right-click the desired NE. In the shortcut menu, choose
NE Explorer to display the NE Explorer window.
2.
3.
According to the actual engineering planning, modify Name of the NE, and then click
Apply. The Operation Result dialog box is displayed, indicating that the operation is
successful. Click Close.
4.
5.
According to the actual planning, enter values for the New ID and New Extended ID fields
and then click OK. In the Warning dialog box that is displayed, click OK.
NOTE
The ID ranges from 1 to 49135 and the extended ID ranges from 1 to 254.
The NE ID consists of the ID and extended ID. An NE ID should be unique in the entire network.
On the Main Topology, select and right-click the desired NE. In the shortcut menu, choose
NE Explorer to display the NE Explorer window.
2.
Choose Communication > MPLS Management > Basic Configuration from the
Function Tree on the left.
3.
Modify the LSR ID according to the engineering planning, and then click Apply.
CAUTION
LSR ID of an NE with services cannot be changed.
The LSR ID cannot be the same as the IP address of the NE, nor can they be configured
within the same network segment.
Issue 02 (2013-08-10)
18
4.
3 Network Commissioning
In the Hint dialog box that is displayed, click OK. In the Operation Result dialog box
displayed, click Close.
----End
Result
When setting the NE name, NE IP address, NE ID, and LSR ID is complete, you can query and
verify the settings on the NMS.
Query the NE name, NE IP address, and NE ID to check whether they are set correctly.
1.
On the Main Topology, right-click the NE and choose Attributes to display the Object
Attributes interface.
2.
Check the NE name, NE IP address, and NE ID on the NE Attributes tab to see whether
they are consistent with the planning.
On the Main Topology, right-click the NE and choose NE Explorer to display the NE
Explorer interface.
2.
Choose Configuration > MPLS Management > General Configuration from the
Function Tree on the left.
3.
Prerequisites
l
Link search has been enabled. and the boards to be connected with fibers or cables must
be added.
Procedure
Step 1 Choose File > Discovery > Link from the Main Menu.
Step 2 On the left-hand Object Tree, select one or more NEs, and click
Step 3 In the dialog box that prompts the success, click Close. In the window, the search results for
each links are displayed.
Issue 02 (2013-08-10)
19
3 Network Commissioning
Step 4 Optional: You can select Links not exist in the NMS, Links exist in the NMS, or Conflicting
links to view the status of links. You can select a conflicting link and click Delete Error
Links to delete the link.
NOTE
l Links not exist in the NMS: The link exists only in NEs and is not created in the NMS.
l Links exist in the NMS: The link exists in the NMS and in the NEs.
l Conflicting links: The link has certain different data on NEs and the NMS.
Step 5 Select one or more links whose Status is Not exist and click Create.
Step 6 In the dialog box that prompts the success, click Close.
The Are you sure to import links as fibers/cables dialog box is displayed.
Step 7
l
2.
In the Import Link dialog box, select one or more links and do as follows:
Click
Click
. All links in the Available Link area are moved to the Selected Link
area. This operation is applicable to batch import.
Click
Click
area.
. All links in the Selected Link area are moved to the Available Link
NOTE
For PTN series NEs, when import the link, you can set whether to allot IP address automatic
on the ports of the link.
3.
Click OK. The dialog box for the operation result is displayed. Click Close.
NOTE
l After you successfully create a link in the U2000, the status of the link is displayed as Exist.
l The created links are displayed in the Link Management area. Navigation path: Choose
Inventory > Link Management from the Main Menu.
l The imported fibers/cables are displayed in the Fiber/Cable/Microwave Link Management
area. Navigation path: Choose Inventory > Fiber/Cable/Microwave Link > Fiber/Cable/
Microwave Link Management from the Main Menu.
l After you successfully create a link in the U2000, the status of the link is displayed as Exist.
l The created links are displayed in the Link Management area. Navigation path: Choose
Inventory > Link Management from the Main Menu.
Step 8 Optional: Select conflicted links and click Error Links to delete the records.
----End
Follow-up Procedure
If you want to import links as fibers/cables after clicking the Cancel in the Import Link
displayed dialog box, you can perform the follow steps:
Issue 02 (2013-08-10)
20
3 Network Commissioning
1.
Choose Inventory > Fiber/Cable > Fiber/Cable Management from the Main Menu.
2.
3.
In the Import Link dialog box, select one or more links and do as follows:
l Click
. All links in the Available Link area are moved to the Selected Link area.
l Click
This operation is applicable to batch import.
l Click
l Click
. All links in the Selected Link area are moved to the Available Link area.
NOTE
For PTN/ATN series NEs, when import the link, you can set whether to allot IP address automatic
on the ports of the link.
4.
Click OK. The dialog box for the operation result is displayed. Click Close. The imported
fibers/cables are displayed in the Fiber/Cable/Microwave Link Management area.
Prerequisites
l
Before setting the parameter Automatically Allocate IP Address to No, make sure that
the port is not used by services or logical ports.
Procedure
Step 1 Method 1:
1.
Choose File > Create > Link from the Main Menu.
2.
In the dialog box that is displayed, choose Fiber/Cable > Fiber from the Object Type tree.
3.
4.
5.
When selecting an incorrect source or sink NE, right-click and click OK in the Coordinate
Selection dialog box to exit.
6.
Issue 02 (2013-08-10)
Select the fiber medium type from the Medium Type drop-down list.
Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
21
7.
3 Network Commissioning
Select the sink NE of the fiber from the Sink NE drop-down list.
NOTE
8.
In the Create Link dialog box, set the attributes of the fiber, such as Direction, Length,
Attenuation, Creator, Maintainer, and Automatically Allocate IP Address.
NOTE
If both ends of the fiber/cable are the PTN equipment, when the Automatically Allocate IP
Address is set to Yes and the Port IP Address Management is configured, the system automatically
allocates IP addresses to the ports on the two ends of a fiber after the fiber is created. For details,
refer to Allocating IP Addresses to Ports Automatically.
The virtual NE do not support automatically allocate IP address.
9.
Click OK.
The created fiber is displayed between the source and sink NEs in the Main Topology.
Step 2 Method 2:
in the Main Topology tab. The cursor is displayed as "+".
1.
2.
3.
In the dialog box displayed, select the source board and source port.
4.
Click OK. The Main Topology is displayed and the cursor is displayed as "+" again.
5.
Issue 02 (2013-08-10)
22
3 Network Commissioning
6.
In the dialog box displayed, select the sink board and sink port.
7.
Click OK and set the attributes of the fiber in the Create Fiber/Cable dialog box.
8.
Click OK.
The new fiber is displayed between the source and sink NEs in the Main Topology.
----End
Prerequisites
l
When the Ethernet port is used to carry the DCN packet, the NE distinguishes the DCN
packet from the service packet by an NM-dedicated VLAN ID. When the E1 port is used,
the NE distinguishes the DCN packet from the service packet by a special MPLS label. The
MPLS label of the DCN packet cannot be modified.
The bandwidth used by inband DCN is set to limit the bandwidth used to carry the in-band
DCN information on the physical port.
If the set bandwidth is not fully occupied by the DCN packet, the remaining bandwidth can
be used by the service packets.
Context
Procedure
Step 1 On the Main Topology, select and right-click the desired NE. In the shortcut menu, choose NE
Explorer to display the NE Explorer window.
Step 2 Choose Communication > DCN Management from the Function Tree in the NE Explorer
window.
Step 3 Click the Bandwidth Management tab, and set the VLAN ID for the inband DCN packets and
the bandwidth used by inband DCN according to the actual planning.
Issue 02 (2013-08-10)
23
3 Network Commissioning
For description of bandwidth management parameters of the inband DCN, see Table 3-1.
Table 3-1 Description of bandwidth management parameters of the inband DCN
Parameter
Value
Description
2-4094
Default:
4094
64-2048
Default:
1024
64-2048
Default:
1024
64-2048
Default: 192
Result
When the configuration of the VLAN ID and the bandwidth for the inband DCN is complete,
verify the configuration by performing the preceding steps.
Issue 02 (2013-08-10)
24
3 Network Commissioning
Prerequisites
l
All the NEs in the network must be properly configured according to 3.3 Creating the
Network Topology.
You must log in to the NE as an NE user with system level authority or higher.
NOTE
Procedure
Step 1 Make sure that the time zone of the computer where the U2000 server and the U2000 client
operate is correct and the time of this computer is accurately set.
Step 2 Choose Configuration > NE Batch Configuration > NE Time Synchronization from the
Main Menu on the U2000. Then, the NE Time Synchronization window is displayed.
Step 4 Select all the NEs in the list and right-click the Synchronous Mode field. Choose NM from the
shortcut menu to set Synchronous Mode of all the NEs to NM.
Step 5 Click Apply. The Result dialog box is displayed indicating that the operation is successful. Click
Close.
Step 6 Select all the NEs in the list and right-click them. Choose Synchronize with NM Time from
the shortcut menu.
Step 7 Click Yes in the displayed Time Synchronization Operation dialog box. Then, the Result
dialog box is displayed indicating that the operation is successful. Click Close.
----End
Issue 02 (2013-08-10)
25
3 Network Commissioning
Result
Click the NE in the NE list and choose Current NE Time to check whether the current time is
consistent with that of the NMS. If yes, it indicates successful operations. If not, repeat the
preceding steps.
Prerequisites
l
All the NEs in the network must be properly configured according to Synchronizing NE
Time.
You must log in to the NE as an NE user with system level authority or higher.
NOTE
Procedure
Step 1 In the NE Explorer, select the NE and choose Performance > NE Performance Monitoring
Time from the Function Tree.
Step 2 Enable the 15-minute performance monitoring for the NE.
1.
2.
3.
Select the option button before Enable in the Set 15-Minute Monitoring group box.
4.
Click
NM.
Issue 02 (2013-08-10)
to set from. The starting time must be later than the current time of the NE and
26
5.
3 Network Commissioning
If you need to set the ending time, you can select the check box before To and then click
to set To for the performance monitoring.
6.
Click Apply. Then, the Operation Result dialog box is displayed, indicating that the
operation is successful. Click Close.
Step 3 Follow Step 2 to enable the 24-hour performance monitoring for the NE.
----End
Result
After the NE starts performance monitoring, you can check whether performance monitoring is
started on the NMS.
1.
2.
3.
Click Query in the right corner to display Query Monitoring Time progress bar. When
the progress is 100% complete, the Operation Result dialog box is displayed, indicating
that the operation is successful. Then, click Close.
4.
Follow-up Procedure
After the commissioning tasks for the entire network are complete, keep the performance
monitoring function of the NE enabled or disable it according to the customer requirement.
Prerequisites
l
All the NEs in the network must be properly enabling the NE performance monitoring
function.
You must be a U2000 user with the "Monitor Group" authority or higher.
Optical attenuator
Fiber flange
U2000
Issue 02 (2013-08-10)
27
3 Network Commissioning
Operation Criteria
The mean transmitted optical power and received optical power must be in the corresponding
value ranges that are listed in Technical Specifications of Boards in the OptiX PTN 950 Packet
Transport Platform of PTN Series Product Description manual.
Procedure
Step 1 In NE Explorer, click the target board and choose Configuration > Optical Power Operatio
from the Function Tree.
Query networkwide optical power: choose Configuration > Optical Power Operation from
the main menu.
Step 2 Click Query to read and record the current transmitted or received optical power value. Then,
the Operation Result dialog box is displayed, indicating that the operation is successful.
Step 3 Check the optical port type with reference to related engineering documents.
Step 4 Check whether the transmitted and received optical powers are within the normal range.
NOTE
The received optical power must follow the standard: receiver sensitivity + 3 dBm < received optical power
(tested) < overload threshold - 5 dBm.
Step 5 Optional: If the transmitted optical power is not within the normal range, handle the fault with
reference to the following.
1.
2.
3.
Check the transmitted optical power of the optical port again, until the transmitted optical
power obtained is within the normal range.
Step 6 Optional: If the received optical power is not within the normal range, handle the fault with
reference to the following.
l
Issue 02 (2013-08-10)
Check whether the fiber connector, the optical attenuator, and the fiber flange are
clean.
2.
3.
4.
If the fiber flange or the optical attenuator on the ODF side is not clean, replace the
fiber flange or the optical attenuator.
5.
Check the received optical power of the optical port again, until the received optical
power obtained is within the normal range.
2.
If the optical attenuator is normal, add an optical attenuator on the ODF side.
3.
4.
Check the received optical power of the optical port again, until the received optical
power obtained is within the normal range.
Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
28
3 Network Commissioning
Step 7 Check whether the transmitted and received optical powers at all the other optical ports of the
equipment are within the normal range one by one with reference to the previous steps.
----End
Prerequisites
3.3 Creating the Network Topology must be performed on the U2000.
Operation Procedure
Table 3-2 lists details on configuration of the network services.
Table 3-2 Configuration of services
Configuration items
Reference
E-Line service
E-LAN service
ATM service
CES service
L3VPN service
Issue 02 (2013-08-10)
29
3 Network Commissioning
Prerequisites
l
MA
MEP2
MEP1
PSN
PE 2
PE 1
RMEP:MEP2
RMEP:MEP1
Procedure
Step 1 Choose Service > PWE3 Service > Manage PWE3 Service from the Main Menu to display
the Manage PWE3 Service and Set Filter Criteria windows.
Step 2 In the Set Filter Criteria window, specify the criteria for filtering E-Line services under test
and then click Filter.
Step 3 Right-click an E-Line service and choose Ethernet OAM > Ethernet Test to display the LB
Test window.
Step 4 In theTest type , ChooseLB.
Step 5 Click Run in the lower right corner. When Progress is 100% complete, check Test Result. If
Test Result is Test Succeeded, it indicates that the E-Line service passes the LB test.
Issue 02 (2013-08-10)
30
3 Network Commissioning
Prerequisites
You must be an NM user with "Operator Group" authority or higher.
E-LAN service must be configured.
The Ethernet service must be configured with the Ethernet OAM.
Context
As shown in Figure 3-3, to verify the correctness of service configuration, the Ethernet OAM
should be configured.
Figure 3-3 OAM of the E-LAN service
CE 1
MD
MEP
NE 1
MA3
MEP
NE 3
PSN
MA1
CE 3
MA2
NE 2
MEP
CE 2
PW
MEP: Maintenance End Point
Issue 02 (2013-08-10)
31
3 Network Commissioning
As shown in the preceding figure, services carried by PWs are available among CE networks.
To verify the configuration correctness of the service configuration, the Ethernet OAM should
be configured.
Procedure
Step 1 On the U2000, select NE1 to create the maintenance domain. For the creation method, see
Creating an MD.
The parameters of the maintenance domain are as follows:
l Maintenance Domain Name: MD
l Maintenance Domain Level: 4
Step 2 On the U2000, select NE2 to create the maintenance domain. For the creation method, see
Creating an MD.
The parameters of the maintenance domain are as follows:
l Maintenance Domain Name: MD
l Maintenance Domain Level: 4
Step 3 On the U2000, select NE3 to create the maintenance domain. For the creation method, see
Creating an MD.
The parameters of the maintenance domain are as follows:
l Maintenance Domain Name: MD
l Maintenance Domain Level: 4
NOTE
The MD name and MD level for each NE should be consistent. In this way, the NEs belong to the same
maintenance domain.
Step 4 On the U2000, select NE1 and NE2 separately to create the maintenance association for the
service between NE1 and NE2. For the creation method, see Creating an MA.
The parameters of the maintenance association are as follows:
l Maintenance Domain Name: MD
l Maintenance Association Name: MA1
l Relevant Service: 1-E-LAN-1
l CC Test Transmit Period (ms): 3.33 ms
Step 5 On the U2000, select NE2 and NE3 separately to create the maintenance association for the
service between NE2 and NE3. For the creation method, see Creating an MA.
The parameters of the maintenance association are as follows:
l Maintenance Domain Name: MD
l Maintenance Association Name: MA2
l Relevant Service: 1-E-LAN-2
l CC Test Transmit Period (ms): 3.33 ms
Issue 02 (2013-08-10)
32
3 Network Commissioning
Step 6 On the U2000, select NE1 and NE3 separately to create the maintenance association for the
service between NE1 and NE3. For the creation method, see Creating an MA.
The parameters of the maintenance association are as follows:
l Maintenance Domain Name: MD
l Maintenance Association Name: MA3
l Relevant Service: 1-E-LAN-3
l CC Test Transmit Period (ms): 3.33 ms
Step 7 On the U2000, select NE1 to create the MEP. For the creation method, see Creating a MEP
Maintenance Point.
The parameters of the MEP of MA1 are as follows:
l Maintenance Domain Name: MD
l Maintenance Association Name: MA1
l Board:
3-EF8T
l Port: 1 (Port-1)
l VLAN: 100
l MEP ID: 1
l Direction: Ingress
l CC Status: Active
The parameters of the MEP of MA3 are as follows:
l Maintenance Domain Name: MD
l Maintenance Association Name: MA3
l Board:
3-EF8T
l Port: 2 (Port-2)
l VLAN: 300
l MEP ID: 1
l Direction: Ingress
l CC Status: Active
Step 8 On the U2000, select NE2 to create the MEP. For the creation method, see Creating a MEP
Maintenance Point.
The parameters of the MEP of MA1 are as follows:
l Maintenance Domain Name: MD
l Maintenance Association Name: MA1
l Board:
3-EF8T
l Port: 1 (Port-1)
l VLAN: 100
l MEP ID: 2
l Direction: Ingress
l CC Status: Active
Issue 02 (2013-08-10)
33
3 Network Commissioning
34
3 Network Commissioning
After the CC is activated at the source and sink of a service, the source periodically builds and sends CC
cells. The end automatically reports the ETH_CFM_LOC alarm if it does not receive the CC cells from
the source within the required time.
If a link is already faulty when CC is initiated, TND1CXP boards will report the ETH_CFM_FAIL
alarm. TND2CXP, and TND2CXPC boards will report the ETH_CFM_LOC alarm.
----End
Prerequisites
l
Issue 02 (2013-08-10)
35
3 Network Commissioning
Inloop
PSN
PE1
PE2
Procedure
Step 1 Set the loopback automatic disabling function to Disabled for the UNI interfaces accessing the
tested ATM service on the PE1 and PE2 equipment.
1.
2.
3.
Set Auto Disabling to Disabled for SDH Optical/Electrical Interface Loopback of the
PE1 and PE2.
NOTE
When the automatic disabling function of SDH Optical/Electrical Interface Loopback on the NE is set
to Disabled, the loopback automatic disabling function for all of the SDH optical interfaces, PDH electrical
interfaces and ATM IMA groups on the NE is disabled.
Step 2 Set inloop for the UNI interface (to be tested) accessing the ATM service on PE1 by using the
U2000.
l The UNI interface accessing the ATM service is IMA group.
Issue 02 (2013-08-10)
1.
On the Main Topology, select and right-click the PE1 NE. In the shortcut menu, choose
NE Explorer to display the NE Explorer window.
2.
In the NE Explorer window, select the NE, and choose Configuration > Interface
Management > ATM IMA Management from the Function Tree.
Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
36
3 Network Commissioning
3.
Select the ATM Interface Management tab and then select the IMA group carrying
the tested ATM service.
4.
Double-click the Loopback of the IMA group, and then select Inloop in the shortcut
menu.
5.
Click Apply. A dialog box is displayed for confirmation, click OK. The Operation
Result dialog box is displayed indicating that the operation is successful. Click Close.
On the Main Topology, select and right-click the PE1 NE. In the shortcut menu, choose
NE Explorer to display the NE Explorer window.
2.
In the NE Explorer window, select the ATM carrying the tested ATM service, and
choose Configuration > Interface Management > SDH Interface from the Function
Tree.
3.
Select the Advanced Attributes tab and then select the ATM interface carrying the
ATM service.
4.
Double-click the Loopback of ATM interface, and then select Inloop in the shortcut
menu.
5.
Click Apply. A dialog box is displayed for confirmation, click OK. The Operation
Result dialog box is displayed indicating that the operation is successful. Click Close.
Step 3 Set inloop for the UNI interface (to be tested) accessing the ATM service on PE2 with reference
to Step 2.
Step 4 In the NE Explorer window, select the PE1 NE, and choose Configuration > ATM OAM
Management from the Function Tree.
Step 5 Select the Remote Loopback Test tab, and then select the tested ATM service.
Step 6 Set Segment and End Attribute of the service whose Connection Direction is Sink to
Segment point.
NOTE
Segment End Attribute of ATM service specifies the type of the transmitted OAM cells during the LB test.
l If Segment End Attribute is set to Segment point, seg_LB cells is transmitted.
l If Segment End Attribute is set to Endpoint, e-t-e_LB cells is transmitted.
Step 7 Set the Loopback Point NE of the tested ATM service to PE2 NE.
Step 8 Click Test to start the LB test. Then, a progress bar is displayed. After the test is complete, the
Operation Result dialog box, indicating that the operation is successful, is displayed. Then,
click Close.
Issue 02 (2013-08-10)
37
3 Network Commissioning
Step 9 After the test is finished, check the Test Result of the tested ATM service. Normally, the Test
Result should be Test succeeded.
l Normally, Test Result should be Test Succeeded. After a message indicating that the test
is successful is displayed, view the new performance events to determine whether the LB
test is successful.
1.
2.
l If the test result is Test Failed or another failure message, handle the fault with reference to
the Test Result hint and "IMA Troubleshooting" in the OptiX PTN 950 Packet Transport
Platform of PTN Series Maintenance Guide.
Step 10 Release the inloop of the UNI interface accessing the ATM service on PE1 and PE2 with
reference to Step 2.
Step 11 Follow Step 2 - Step 10 to test the connectivity of all the other ATM services on PE1 and PE2.
Step 12 Set Automatic Disabling to Enabled for SDH Optical/Electrical Interface Loopback on PE1
and PE2 with reference to Step 1.
Step 13 Test the connectivity of the ATM services on all the other NEs with reference to Step 1 - Step
12.
----End
Prerequisites
l
The board under test, which carries CES services, must support the PRBS function.
U2000
Huawei Proprietary and Confidential
Copyright Huawei Technologies Co., Ltd.
38
3 Network Commissioning
Precautions
CAUTION
On an NE, when using the PRBS function to test connectivity of a CES service, make sure that
no activated service is running at the optical port or E1 port where a loopback is performed.
Otherwise, the service is interrupted.
NOTE
On the UNI/NNI side of the equipment, connectivity of an E1 service in framed or unframed mode can be tested
by using the PRBS function.
On the UNI/NNI side of the equipment, connectivity of a VC-12 service in framed or unframed mode can be
tested by using the PRBS function.
Fractional E1 services do not support the connectivity test.
PE2
Procedure
Step 1 Set the loopback automatic disabling function to Disabled for the CES service interface under
test on PE2 by using the U2000.
1.
2.
3.
Issue 02 (2013-08-10)
39
3 Network Commissioning
The loopback automatic disabling function for all PDH electrical interfaces and otherwise
of PE2 is set to Disabled.
4.
Click Apply. The Operation Result dialog box is displayed indicating that the operation
is successful. Click Close.
Step 2 On the U2000, perform an inloop at the UNI port for the CES service under test on PE2.
1.
On the Main Topology, right-click PE2. In the shortcut menu, choose NE Explorer to
display the NE Explorer window.
2.
In the NE Explorer window, select the NE, and choose Configuration > Interface
Management > PDH Interface from the Function Tree.
NOTE
At this step, the test is based on the condition that an inloop is performed at the E1 port. If the port under
test is a VC-12 port, choose Configuration > Interface Management > SDH Interface from the
Function Tree.
3.
Select the Advanced Attributes tab and then select the interface receiving/transmitting
the CES service under test.
4.
Right-click the Loopback Mode field of the interface, and then select Inloop from the
shortcut menu.
5.
Click Apply. A dialog box is displayed for confirmation, click OK. The Operation
Result dialog box is displayed indicating that the operation is successful. Click Close.
Step 3 Start the PRBS test at the corresponding port for the CES service under test on PE1.
1.
On the U2000, right-click PE1 in the Main Topology. Then, choose NE Explorer to display
the NE Explorer.
2.
Choose the board under test from the Object Tree on the upper right side and choose
Configuration > PRBS Test from the Function Tree on the lower left side.
3.
Select the CES service port under test. Then, set PRBS Frame Modeto Frame or No
Frame. The framing modes of interconnected service ports must be consistent.
4.
In the Set Test Parameters areaon the lower right side,set Direction, Duration, and
Measured in times for the CES service under test.
5.
Click Start to test to display the confirmation dialog box. Then, click OK. The Operation
Result dialog box is displayed. Then, click Close.
6.
WhenProgressis displayed as 100%, click Query and observe the test result.
l If bit errors are indicated in the test result, go to Step 4.
l If no bit error is indicated in the test result, go to Step 5.
Issue 02 (2013-08-10)
40
3 Network Commissioning
Step 4 Check for abnormal CES-related alarms and rectify faults by referring to CES Service
Troubleshooting in the OptiX PTN950 Packet-Based Transport Platform of Optical PTN
Series Maintenance Guide.
Step 5 Release the inloop at the port under test on PE2 by referring to Step 2.
Step 6 Set Auto Disabling on the loopback at the optical/electrical interface on PE2 to Enabled by
referring to Step 1.
Step 7 Test connectivity of CES services on other NEs by referring to Step 1 to Step 6.
----End
Prerequisites
l
The board under test, which carries CES services, must support the PRBS function.
U2000
Precautions
CAUTION
When using the NE's PRBS function to check CES connectivity,make sure that no active service
is running at the interface to be loopbacked, otherwise, the service is interrupted.
Remote Loopback
PSN
PE1
Issue 02 (2013-08-10)
PE2
CE
41
3 Network Commissioning
Procedure
Step 1 On the U2000, configure a CE side remote loopback for the CES service under testing, at PE2's
UNI.
1.
On the main topology of the U2000, right-click and select the PE2 NE. Right-click and
select NE Explorer. The NE Explorer window is displayed.
2.
Select the TND1CQ1 board to be tested on the upper left of the window and then select
Configuration > Remote Loopback on the lower left function tree of the window.
3.
Select the CES service port in the displayed window, and set Remote Loopback to
Enabled on the lower right of the window.Click Apply.
Figure 3-7 shows the bit sequence of the Z2 byte. The b8 bit is the least significant bit and is
on the most right; the b1 bit is the most significant bit and is on the most left.
Figure 3-7 Bit sequence of the Z2 byte
b1
b2
b3
b4
b5
b6
b7
b8
PE2 repeatedly sends Z2 (b7=1) in SDH frames so that the remote CE performs a loopback.
2.
PE2 confirms a loopback start at the CE after receiving six consecutive Z2 (b6=1) from the
CE.
PE2 repeatedly sends Z2 (b7=0) so that the remote CE releases the loopback.
2.
PE2 confirms the loopback release at the CE after receiving six consecutive Z2 (b6=0) from
the CE.
Step 2 Start the PRBS test on the CES service port on PE1.
1.
Right-click the PE1 NE on the main topology of the U2000. Select NE Explorer. The NE
Explorer window is displayed.
2.
Select the TND1CQ1 board to be tested on the upper right of the window and then select
Configuration > PRBS Test on the lower left function tree of the window.
3.
Select the CES service port to be tested, select PRBS15 or PRBS23for the PRBS Frame
Mode of this port and select UNI or NNI for the PRBS Insertion Direction.
NOTE
For the TND1CQ1 board, CES services support two working modes for VC3 or VC4 channels. VC3
channel can support only thePRBS15 code pattern and the VC4 channel support PRBS15 and PRBS23
two code patterns.
UNI indicates that PRBS is sent to the UNI side, and NNI indicates that PRBS is sent to the NNI side.
4.
In the lower right Set Test Parameters area, set the parameters of the Duration and
Measured in times for the CES service under testing.
5.
Click Start to test and click OK in the dialog box displayed.The Operation Result dialog
box is displayed. Click Close.
6.
Issue 02 (2013-08-10)
42
3 Network Commissioning
Prerequisites
l
U2000
NodeB
PE1
Tunnel
Issue 02 (2013-08-10)
PE2
RNC
OptiX PTN
1900/3900/3900-8
PW
43
3 Network Commissioning
CAUTION
l Ensure that only commissioning engineers are present on the test site.
l Do not touch cables, unless necessary.
l Do not insert or remove any power supply device near the test site.
Procedure
Step 1 On the U2000, confirm the PW of the IP over PW service under test on PE1 or PE2.
Step 2 Perform a PW ping test to test connectivity of the IP over PW service.
1.
In the NE Explorer, click PE1 or PE2. Then, choose Configuration > MPLS
Management > PW Management from the Function Tree.
2.
Click PW OAM Parameters tab, select a PW and choose OAM Operation > Ping
Test. The Ping Test dialog box is displayed.
Issue 02 (2013-08-10)
44
3 Network Commissioning
NOTE
You can perform only one ping test for each PW at any time.
The packet length ranges from 64 to 1400. If you set Packet Length to a value beyond the range,
the ping test fails.
3.
4.
Set the associated parameters.For the parameters of the ping test, see Table 2.
Click Start Test to check the ping test result.
Step 3 Check the test result and determine whether any packets are lost.
l If packets are lost, check for abnormal alarms associated with the IP over PW service. Then,
handle the alarms according to Alarms Handling in the OptiX PTN950Packet Transport
Platform of PTN SeriesMaintenance Guide.
l If no packet is lost, it indicates that the connectivity test of the IP over PW service is
successful.
Step 4 For how to test another IP over PW service, see Step 1 to Step 3.
----End
Issue 02 (2013-08-10)
45
3 Network Commissioning
Prerequisites
You must be an NM user with "Operator Group" authority or higher.
An L3VPN service must be created.
Context
In the scenario, there is service communication between Site1 and Site3, Site2 and Site3, but
not between Site1 and Site2. On the PTN equipment, create a CE1-CE3 L3VPN service and a
CE2-CE3 L3VPN service.
Start a ping test from PE1 to PE3 and from PE2 to PE3 to check the network connectivity.
Figure 3-9 Networking application of an Extranet VPN service
UNI: 1-EG2-1
192.168.1.1/24
UNI: 1-EG16-1
192.168.9.1/24
CE1
Site1
NE1
PE1
192.168.9.2
NE2
Backbone
AS: 100
CE3
NE3
PE3
Site3
CE2
Site2
PE2
NE5
NE4
UNI: 1-EG2-1
192.168.2.1/24
OptiX PTN
Router
Procedure
Step 1 Choose Service > BGP/MPLS VPN Service > Manage BGP/MPLS VPN Service from the
Main Menu. The Manage BGP/MPLS VPN Service window is displayed. ClickFliter and to
display Set Fliter Condition dialog box.
Step 2 In the Service ID field, enter the ID of the L3VPN service for the connectivity test and click
Filter. Then, the created L3VPN service is displayed.
Step 3 Select the service, click the PE tab, select NE1, and click Ping to display the Ping dialog box.
Then, set the test parameters. Start a ping test from NE1 to NE3.
Issue 02 (2013-08-10)
46
3 Network Commissioning
Issue 02 (2013-08-10)
47
3 Network Commissioning
Result
1.
In L3VPN Service Management, check Alarm Status for alarms related to the service.
2.
If Alarm Status displays alarms, choose Alarm > Current Alarm to display the alarms
related to the service in Current Alarms. Handle the related alarms with reference to
Alarms Handling in the OptiX PTN 950 Packet Transport Platform of PTN Series
Maintenance Guide.
3.
If there is no alarm, repeat Step 3 through Step 4 in "Procedure" to start another ping test.
Then, check the test result. When the service is normal, the test is complete.
4.
In case of a service fault, rectify it with reference to Handling L3VPN Service Faults in the
OptiX PTN 950 Packet Transport Platform of PTN Series Maintenance Guide.
Prerequisites
l
Context
l
1+1 protection
Services are transmitted over the working tunnel and protection tunnel at the same time.
Then, the receive end selects a tunnel according to the status of the two tunnels and receives
the services from the tunnel. That is, the services are dually fed and selectively received.
When the receive end detects loss of signals over the working tunnel or when the working
tunnel is detected as faulty by the MPLS OAM, the receive end receives the signals from
the protection tunnel. In this manner, the services are switched.
1:1 protection
Normally, services are transmitted over the working tunnel. That is, the services are singly
fed and received. When the working tunnel is faulty, the equipment at the two ends
negotiates through the APS protocol. Then, the transmit end transmits the services over the
protection tunnel and the receive end receives the services from the protection tunnel. In
this manner, the services are switched.
Issue 02 (2013-08-10)
48
3 Network Commissioning
Procedure
Step 1 Check the switching status of the 1+1 or 1:1 MPLS tunnel protection group.
1.
On the Main Topology of the U2000, right-click the source NE of the tunnels under test.
Choose NE Explorer from the shortcut menu to display the NE Explorer window.
2.
3.
Click the Tunnel APS Configuration tab, right-click the protection group under test, and
choose Query Switching Status from the shortcut menu to refresh the status of the MPLS
tunnel protection group configured on the NE.
4.
Select the MPLS tunnel protection group under test and check the switching status of the
MPLS tunnel protection group. Normally, the status of the protection group is No Request
(Working Active).
2.
Click the Tunnel APS Configuration tab and select the protection group for service
switching.
3.
Right-click the protection group under test and choose Forced Switching from the shortcut
menu. In this case, a message indicating that this operation will interrupt service is
displayed. Then, click OK to perform the manual switching.
Step 3 Right-click the protection group under test and choose Query Switching Status from the
shortcut menu. Check Switching Status of the protection group, which should be in Forced
Switching state normally. Then, query Active Tunnel of the protection group. After a normal
switching, Working matches Standby and Protection matches Active.
NOTE
l If Forced Switching is performed at the previous step, the state of the protection group should be
Forced Switching.
l If Manual Switching to Protection is performed at the previous step, the state of the protection group
should be Manual Switching to Protection.
Issue 02 (2013-08-10)
49
3 Network Commissioning
Step 4 Right-click the protection group under test and choose Clear from the shortcut menu to revert
the services to the working tunnel.
----End
Prerequisites
l
Procedure
Step 1 Check the switching status of the LMSP protection group under test.
1.
On the Main Topology of the U2000, right-click the NE configured with LMSP. Choose
NE Explorer from the shortcut menu to display the NE Explorer window.
2.
3.
Click Query and choose Query Protection Group from the shortcut menu to refresh the
configuration of protection groups on the NE.
4.
Click Query and choose Query Switching Status from the shortcut menu. Then, check
West Switching Status of the working and protection units in the protection group under
test. West Switching Status of both units should be Normal.
Step 2 Disable the working port of the LMSP protection group under test.
1.
In NE Explorer, select the board configured with the LMSP protection and choose
Configuration > Interface Management > SDH Interface from the Function Tree.
2.
On the General Attributes tab, select the working port in the LMSP protection group and
set Laser Interface Enabling Status to Close.
Step 3 Check the switching status. If West Switching Status of the protection unit is Idle, it indicates
a successful switching.
Step 4 Enble the working port of the LMSP protection group under test with reference to Step 2.
Step 5 Revert the services to the working tunnel of the LMSP protection group.
l
If Revertive Mode of the LMSP protection group is set to Revertive, the services are
reverted to the working tunnel when WTR expires.
If Revertive Mode of the LMSP protection group is set to Non-Revertive, select the
protection group and click the Slot Mapping Relation list, select Protection Unit in
Protection Unit and right-click Protection Unit, and choose Manual Switching to
Issue 02 (2013-08-10)
50
3 Network Commissioning
Working from the shortcut menu. After the services reverting to the working tunnel, select
and then right-click Protection Unit in Protection Unit, and choose Clear from the
shortcut menu. The status of Protection Unit is Idle.
----End
Prerequisites
l
Procedure
Step 1 Check the switching status of the ring protection to be tested.
1.
Choose Service > IP Protection Subnet > Manage MPLS Protection Ring from the main
menu, and then the Manage MPLS Protection Ring and Set Filter Criteria windows are
displayed.
2.
Enter the filter criteria in the Set Filter Criteria window to filter the ring protection to be
tested, and click Filter.
3.
Right-click on the ring protection to be tested, and choose a window is displayed. Choose
the Topo tab, and check the West Status or East Status of the ring protection to be tested.
Normally, the status is Idle State.
Step 2 Perform a forced switching to the east or west ring protection and check its status after the
switching.
Issue 02 (2013-08-10)
51
3 Network Commissioning
1.
Select the ring node to be tested, click East Maintance or West Maintance at the right
bottom of the Topo tab, and select Force Switching from the drop-down list. A warning
dialog box is displayed prompting that services will be interrupted by this action, and click
OK to proceed the forced switching.
2.
Check West Status or East Status of the ring node to be tested. If the status is Forced
switch, the forced switching succeeds.
Step 3 Click Clear All at the right bottom of the window, and then the ring protection is restored to
normal status.
----End
Issue 02 (2013-08-10)
52
A Glossary
Glossary
Numerics
1+1 hot backup
A backup mode in which two systems with the same functions are deployed, one in the
active state and the other in the standby state with power on. The standby system backs
up the data of the active system automatically. Once the active system encounters a fault,
the standby system takes over the service of the active system automatically or by manual
intervention.
1000BASE-T
Twisted cable with the transmission speed as 1000 Mbit/s and the transmission distance
as 100 m.
100BASE-TX
IEEE 802.3 Physical Layer specification for a 100 Mb/s CSMA/CD local area network
over two pairs of Category 5 unshielded twisted-pair (UTP) or shielded twisted-pair
(STP) wire.
10BASE-TX
IEEE 802.3 Physical Layer specification for a 10 Mb/s CSMA/CD local area network
over two pairs of Category 5 unshielded twisted-pair (UTP) or shielded twisted-pair
(STP) wire.
A
AAL
ABR
AC
A list of entities, together with their access rights, which are authorized to have access
to a resource.
ACL
active link
In the link aggregation group, the links connected to active interfaces are active links.
active/standby
switchover
address pool
Issue 02 (2013-08-10)
53
A Glossary
Address Resolution
Protocol
administrative unit
The information structure which provides adaptation between the higher order path layer
and the multiplex section layer. It consists of an information payload (the higher order
VC) and an AU pointer which indicates the offset of the payload frame start relative to
the multiplex section frame start.
Administrator
A user who has authority to access all the Management Domains of the EMLCore
product. He has access to the whole network and to all the management functionalities.
ADSL
advanced ACL
An advanced ACL can define ACL rules based on the source addresses, target addresses,
protocol type, such as TCP source or target port, the type of the ICMP protocol, and
message codes.
AF
aggregated link
aggregation
AIS
alarm automatic report When an alarm is generated on the device side, the alarm is reported to the Network
Management System (NMS) . Then, an alarm panel prompts and the user can view the
details of the alarm.
alarm cascading
alarm cause
A single disturbance or fault may lead to the detection of multiple defects. A fault cause
is the result of a correlation process which is intended to identify the defect that is
representative of the disturbance or fault that is causing the problem.
alarm clearance
alarm indication signal A code sent downstream in a digital network as an indication that an upstream failure
has been detected and alarmed. It is associated with multiple transport layers.
Issue 02 (2013-08-10)
54
A Glossary
alarm inversion
For the port that has already been configured but has no service, this function can be
used to avoid generating relevant alarm information, thus preventing alarm interference.
The alarm report condition of the NE port is related to the alarm inverse mode (not
inverse, automatic recovery and manual recovery) setting of the NE and the alarm
inversion status (Enable and Disable) setting of the port. When the alarm inversion mode
of NE is set to no inversion, alarms of the port will be reported as usual no matter whatever
the inversion status of the port is. When the alarm inversion mode of the NE is set to
automatic recovery, and the alarm inversion state of the port is set to Enabled, then the
alarm of the port will be suppressed. The alarm inversion status of the port will
automatically recover to "not inverse" after the alarm ends. For the port that has already
been configured but not actually loaded with services, this function can be used to avoid
generating relevant alarm information, thus preventing alarm interference. When the
alarm inverse mode of the NE is set as "not automatic recovery", if the alarm inversion
status of the port is set as Enable, the alarm of the port will be reported.
alarm mask
On the host, an alarm management method through which users can set conditions for
the system to discard (not to save, display, or query for) the alarm information meeting
the conditions.
alarm name
Alarm name is a brief description of the symptom of the failure related to this alarm.
Alarm notification
When an error occurs, the performance measurement system sends performance alarms
to the destination (for example, a file and/or fault management system) designated by
users.
alarm parameter
Alarm parameters describe the location where the fault has occurred. For example, for
an alarm on a board, the parameters include the shelf ID, slot ID and port ID.
alarm severity
alarm status
The devices in the network report traps to the Network Management System (NMS),
which displays the alarm statuses in the topological view. The status of an alarm can be
critical, major, minor and prompt.
alarm suppression
A function used not to monitor alarms for a specific object, which may be the
networkwide equipment, a specific NE, a specific board and even a specific function
module of a specific board.
ALS
APS
ARP
AS
assured forwarding
One of the four per-hop behaviors (PHB) defined by the Diff-Serv workgroup of IETF.
It is suitable for certain key data services that require assured bandwidth and short delay.
For traffic within the bandwidth limit, AF assures quality in forwarding. For traffic that
exceeds the bandwidth limit, AF degrades the service class and continues to forward the
traffic instead of discarding the packets.
Issue 02 (2013-08-10)
55
A Glossary
asymmetric digital
subscriber line
asynchronization
Asynchronization does not use the exact data signals timed by the clock. The signals
have different frequencies and phases. The asynchronization usually encapsulates the
bits into the control flag, which specifies the beginning and end of the bits.
Asynchronous
Transfer Mode
A protocol for the transmission of a variety of digital signals using uniform 53 byte cells.
A transfer mode in which the information is organized into cells; it is asynchronous in
the sense that the recurrence of cells depends on the required or instantaneous bit rate.
Statistical and deterministic values may also be used to qualify the transfer mode.
ATM
ATM Adaptation
Layer
ATM PVC
attachment circuit
attenuation
AU
auto-negotiation
An optional function of the IEEE 802.3u Fast Ethernet standard that enables devices to
automatically exchange information over a link about speed and duplex abilities.
automatic laser
shutdown
automatic protection
switching
Autonomous System
A network set that uses the same routing policy and is managed by the same technology
administration department. Each AS has a unique identifier that is an integer ranging
from 1 to 65535. The identifier is assigned by IANA. An AS can be divided into areas.
A kind of service categories defined by the ATM forum. ABR only provides possible
forwarding service and applies to the connections that does not require the real-time
quality. It does not provide any guarantee in terms of cell loss or delay.
B
B-ISDN
backward
backward defect
indication
When detecting a defect, the sink node of a LSP uses backward defect indication (BDI)
to inform the upstream end of the LSP of a downstream defect along the return path.
Issue 02 (2013-08-10)
56
A Glossary
A logical entity that connects the BTS with the MSC in a GSM network. It interworks
with the BTS through the Abis interface, the MSC through the A interface. It provides
the following functions: radio resource management, base station management, power
control, handover control, and traffic measurement. One BSC controls and manages one
or more BTSs in an actual network.
base transceiver station A Base Transceiver Station terminates the radio interface. It allows transmission of traffic
and signaling across the air interface. The BTS includes the baseband processing, radio
equipment, and the antenna.
Basic ACL
A basic ACL can define ACL rules based on only source addresses.
basic input/output
system
bayonet-neillconcelman
BC
BDI
BE
BER
best effort
A traditional IP packet transport service. In this service, the diagrams are forwarded
following the sequence of the time they reach. All diagrams share the bandwidth of the
network and routers. The amount of resource that a diagram can use depends of the time
it reaches. BE service does not ensure any improvement in delay time, jitter, packet loss
ratio, and high reliability.
BFD
BGP
bidirectional
forwarding detection
A simple Hello protocol, similar to the adjacent detection in the route protocol. Two
systems periodically send BFD detection messages on the channel between the two
systems. If one system does not receive the detection message from the other system for
a long time, you can infer that the channel is faulty. Under some conditions, the TX and
RX rates between systems need to be negotiated to reduce traffic load.
BIOS
BIP
bit error
Ratio of received bits that contain errors. BER is an important index used to measure the
communications quality of a network.
Issue 02 (2013-08-10)
57
A Glossary
bit-interleaved parity
A method of error monitoring. With even parity an X-bit code is generated by the
transmitting equipment over a specified portion of the signal in such a manner that the
first bit of the code provides even parity over the first bit of all X-bit sequences in the
covered portion of the signal, the second bit provides even parity over the second bit of
all X-bit sequences within the specified portion, etc. Even parity is generated by setting
the BIP-X bits so that there is an even number of 1s in each monitored partition of the
signal. A monitored partition comprises all bits which are in the same bit position within
the X-bit sequences in the covered portion of the signal. The covered portion includes
the BIP-X.
BITS
BMC
BNC
See bayonet-neill-concelman
Border Gateway
Protocol
boundary clock
A clock with a clock port for each of two or more distinct PTP communication paths.
BPDU
The data messages that are exchanged across the switches within an extended LAN that
uses a spanning tree protocol (STP) topology. BPDU packets contain information on
ports, addresses, priorities and costs and ensure that the data ends up where it was
intended to go. BPDU messages are exchanged across bridges to detect loops in a
network topology. The loops are then removed by shutting down selected bridges
interfaces and placing redundant switch ports in a backup, or blocked, state.
Broadband Integrated A standard defined by the ITU-T to handle high-bandwidth applications, such as voice.
Services Digital
It currently uses the ATM technology to transmit data over SONNET-based circuits at
Networks
155 to 622 Mbit/s or higher speed.
broadband TV
broadcast address
broadcast domain
A group of network stations that receives broadcast packets originating from any device
within the group. Broadcasts do not pass through a router, which bound the domains. In
addition, the set of ports between which a device forwards a multicast, broadcast, or
unknown destination frame.
BSC
BTS
BTV
See broadband TV
building integrated
timing supply
In the situation of multiple synchronous nodes or communication devices, one can use
a device to set up a clock system on the hinge of telecom network to connect the
synchronous network as a whole, and provide satisfactory synchronous base signals to
the building integrated device. This device is called BITS.
bus
A path or channel for signal transmission. The typical case is that, the bus is an electrical
connection that connects one or more conductors. All devices that are connected to a
bus, can receive all transmission contents simultaneously.
Issue 02 (2013-08-10)
58
A Glossary
C
cable distribution plate A component which is used to arrange the cables in order.
cable tie
CAR
A network access method in which devices that are ready to transmit data first check the
channel for a carrier. If no carrier is sensed, a device can transmit. If two devices transmit
at once, a collision occurs and each computer backs off and waits a random amount of
time before attempting to retransmit. This is the access method used by Ethernet.
CBR
CBS
CC
CCF
CCM
CDR
CDV
CDVT
CE
This parameter measures the tolerance level a network interface has to aggressive
sending (back-to-back or very closely spaced cells) by a connected device, and does not
apply to end-systems.
Field in the ATM cell header that determines the probability of a cell being dropped if
the network becomes congested. Cells with CLP = 0 are insured traffic, which is unlikely
to be dropped. Cells with CLP = 1 are best-effort traffic, which might be dropped.
CEP
CES
CF
CFM
chain network
One type of network that all network nodes are connected one after one to be in series.
channel
CID
CIR
circuit emulation
service
A function with which the E1/T1 data can be transmitted through ATM networks. At the
transmission end, the interface module packs timeslot data into ATM cells. These ATM
cells are sent to the reception end through the ATM network. At the reception end, the
interface module re-assigns the data in these ATM cells to E1/T1 timeslots. The CES
technology guarantees that the data in E1/T1 timeslots can be recovered to the original
sequence at the reception end.
Issue 02 (2013-08-10)
59
CIST
CLNP
A Glossary
clock synchronization A type of high-decision clock defined by the IEEE 1588 V2 standard. The IEEE 1588
compliant with
V2 standard specifies the precision time protocol (PTP) in a measurement and control
precision time protocol system. The PTP protocol ensures clock synchronization precise to sub-microseconds.
clock tracing
The method to keep the time on each node being synchronized with a clock source in a
network.
CLP
coarse wavelength
division multiplexing
colored packet
A traffic control method that uses a set of rate limits to be applied to a router interface.
CAR is a configurable method by which incoming and outgoing packets can be classified
into QoS (Quality of Service) groups, and by which the input or output transmission rate
can be defined.
committed burst size. A parameter used to define the capacity of token bucket C, that is,
the maximum burst IP packet size when the information is transferred at the committed
information rate. This parameter must be larger than 0. It is recommended that this
parameter should be not less than the maximum length of the IP packet that might be
forwarded.
committed information The rate at which a frame relay network agrees to transfer information in normal
rate
conditions. Namely, it is the rate, measured in bit/s, at which the token is transferred to
the leaky bucket.
common and internal
spanning tree
The single spanning tree calculated by STP and RSTP together with the logical
continuation of that connectivity by using MST Bridges and regions, calculated by MSTP
to ensure that all LANs in the bridged local area network are simply and fully connected.
common spanning tree A single spanning tree that connects all the MST regions in a network. Every MST region
is considered as a switch; therefore, the CST can be regarded as their spanning tree
generated with STP/RSTP.
compact flash
Compact flash (CF) was originally developed as a type of data storage device used in
portable electronic devices. For storage, CompactFlash typically uses flash memory in
a standardized enclosure.
congestion
congestion
management
A flow control measure to solve the problem of network resource competition. When
the network congestion occurs, it places the packet into the queue for buffer and
determines the order of forwarding the packet.
connection control
The set of functions used for setting up, maintaining and releasing a communication path
between two or more users or a user and a network entity, e.g. a dual tone multi-frequency
receiver.
connection control
function
A functional entity in the distributed functional plane of the intelligent network (IN)
conceptual model, which provides the basic call services of the bearer (telecom) network
and the advanced switch-based services with the call processing and controlling
functions.
Issue 02 (2013-08-10)
60
A Glossary
connection identifier
The MAC layer defined in the IEEE802.16 protocol is based on connection. Each
connection is uniquely identified with a CID.
connectivity check
Ethernet CFM can detect the connectivity between MEPs. The detection is achieved by
each MEP transmitting a Continuity Check Message (CCM) periodically.
connectivity fault
management
A kind of service categories defined by the ATM forum. CBR transfers cells based on
the constant bandwidth. It is applicable to service connections that depend on precise
clocking to ensure undistorted transmission.
constraint shortest path An extension of shortest path algorithms like OSPF and IS-IS. The path computed using
first
CSPF is a shortest path fulfilling set of constrains. It simply means that it runs shortest
path algorithm after pruning those links that violate a given set of constraints. A
constraint could be minimum bandwidth required per link (also know as bandwidth
guaranteed constraint), end-to-end delay, maximum number of link traversed etc. CSPF
is widely used in MPLS Traffic Engineering. The routing using CSPF is known as
Constraint Based Routing (CBR).
constraint-based
routed label switched
path
continuity check
message
control plane
The control plane performs the call control and connection control functions. Through
signaling, the control plane sets up and releases connections, and may restore a
connection in case of a failure. The control plane also performs other functions in support
of call and connection control, such as routing information dissemination.
control word
convergence layer
The convergence layer is a "bridge" between the access layer and the core layer. It
provides the convergence and forwarding functions for the access layer. It processes all
the traffic from the access layer devices, and provides the uplinks to the core layer.
Compared with the access layer, the convergence layer devices should have higher
performances, fewer interfaces and higher switching rate. In the real network, the
convergence layer refers to the network between UPEs and PE-AGGs.
core layer
The core layer functions as the backbone of high speed switching for networks, and it
provides high speed forwarding communications. It has a backbone transmission
structure that provides high reliability, high throughput, and low delay. The core layer
devices must have a good redundancy, error tolerance, manageability, adaptability, and
they support dual-system hot backup or load balancing technologies. In a real network,
the core layer includes the IP/MPLS backbone network consisting of NPEs and backbone
routers.
CPE
CPN
CR-LSP
CRC
Issue 02 (2013-08-10)
61
A Glossary
crossover cable
A twisted pair patch cable wired in such a way as to route the transmit signals from one
piece of equipment to the receive signals of another piece of equipment, and vice versa.
CSMA/CD
CSPF
CST
CTD
current alarm
current performance
data
customer edge
A part of BGP/MPLS IP VPN model. It provides interfaces for direct connection to the
Service Provider (SP) network. A CE can be a router, switch, or host.
customer premises
equipment
CV
connectivity verification
CW
CWDM
cyclic redundancy
check
A procedure used in checking for errors in data transmission. CRC error checking uses
a complex calculation to generate a number based on the data transmitted. The sending
device performs the calculation before transmission and includes it in the packet that it
sends to the receiving device. The receiving device repeats the same calculation after
transmission. If both devices obtain the same result, it is assumed that the transmission
was error free. The procedure is known as a redundancy check because each transmission
includes not only data but extra (redundant) error-checking values.
D
data communication
network
data communications
channel
The data channel that uses the D1-D12 bytes in the overhead of an STM-N signal to
transmit information on operation, management, maintenance and provision (OAM&P)
between NEs. The DCC channels that are composed of bytes D1-D3 is referred to as the
192 kbit/s DCC-R channel. The other DCC channel that are composed of bytes D4-D12
is referred to as the 576 kbit/s DCC-M channel.
data connection
equipment
Data connection equipment including analog, DSL, ISDN, cable modem circuits.
Layer 2 in the open system interconnection (OSI) architecture; the layer that provides
services to transfer data over the transmission link between open systems.
data terminal
equipment
A user device composing the UNI. The DTE accesses the data network through the DCE
equipment (for example, model) and usually uses the clock signals produced by DCE.
Issue 02 (2013-08-10)
62
A Glossary
Datagram
DC
DCC
DCE
DCN
DDF
DDN
DE
DEI
delay variation
dense wavelength
division multiplexing
Technology that utilizes the characteristics of broad bandwidth and low attenuation of
single mode optical fiber, employs multiple wavelengths with specific frequency spacing
as carriers, and allows multiple channels to transmit simultaneously in the same fiber.
desired Min Tx interval The minimum interval that the local system would like to use when transmitting BFD
control packets.
Detection multiplier
The desired detect time multiplier for BFD control packets. It determines the session
detection time together with the DMTI and RMRI.
DHCP
DHCP Relay
Dynamic Host Configuration Protocol relay (DHCP relay) is a function that enables
forwarding of DHCP data between the device that requests the IP address and the DHCP
server.
DHCP Server
A program that allocates the IP addresses of the local address pool to the users at the
user side and allocates the IP addresses of the relay address pool to the users that pass
through the DHCP proxy at the network side.
differentiated services
A service architecture that provides the end-to-end QoS function. It consists of a series
of functional units implemented at the network nodes, including a small group of perhop forwarding behaviors, packet classification functions, and traffic conditioning
functions such as metering, marking, shaping and policing.
DiffServ
A high-quality data transport tunnel that combines the digital channel (such as fiber
channel, digital microwave channel, or satellite channel) and the cross multiplex
technology.
digital distribution
frame
A type of equipment used between the transmission equipment and the exchange with
transmission rate of 2 to 155 Mbit/s to provide the functions such as cables connection,
cable patching, and test of loops that transmitting digital signals.
A technology for providing digital connections over the copper wire or the local
telephone network. DSL performs data communication over the POTS lines without
affecting the POTS service.
A network device, usually situated in the main office of a telephone company that
receives signals from multiple customer Digital Subscriber Line (DSL) connections and
puts the signals on a high-speed backbone line using multiplexing techniques.
Issue 02 (2013-08-10)
63
A Glossary
direct current
Electrical current whose direction of flow does not reverse. The current may stop or
change amplitude, but it always flows in the same direction.
discard eligible
A bit in the frame relay header. It indicates the priority of a packet. If a node supports
the FR QoS, the rate of the accessed FR packets is controlled. When the packet traffic
exceeds the specified traffic, the DE value of the redundant packets is set to 1. In the
case of network congestion, the packets with DE value as 1 are discarded at the node.
Discrete service
The cross-connection that exists on an NE but cannot form trails on the network
management system.
dispersion
DLL
DMTI
DNI
DNS
A hierarchical naming system for computers, services, or any resource connected to the
Internet or a private network. It associates various information with domain names
assigned to each of the participants. The Domain Name System distributes the
responsibility of assigning domain names and mapping those names to IP addresses by
designating authoritative name servers for each domain.
DRDB
DEI indicates the eight transmission precedence in the PRI field can be combined with
drop precedence.
DS
DS boundary node
DS domain
DS interior node
DS node
A DS-compliant node, which is subdivided into DS boundary node and ID interior node.
DSL
DSLAM
DTE
dual homing
dual node
interconnection
DNI provides an alternative physical interconnection point, between the rings, in case
of an interconnection failure scenario.
dual-ended switching
A protection operation method which takes switching action at both ends of the protected
entity (e.g. "connection", "path"), even in the case of a unidirectional failure.
DWDM
Issue 02 (2013-08-10)
64
A Glossary
Dynamic Host
Dynamic Host Configuration Protocol (DHCP) is a client-server networking protocol.
Configuration Protocol A DHCP server provides configuration parameters specific to the DHCP client host
requesting, generally, information required by the host to participate on the Internet
network. DHCP also provides a mechanism for allocation of IP addresses to hosts.
dynamic service
A term used in IEEE (Institute of Electrical and Electronic Engineers) 802.16 networks
to describe a set of messages and protocols that allow a base station and subscriber station
to add, modify, or delete the characteristics of s service flow.
E
E-LAN
E-Tree
See Ethernet-tree
E1
EBS
ECC
Edge LSR
The basic unit of the MPLS network is LSR. The network composed by LSR is named
MPLS domain. LSR is located at the edge of the MPLS domain. LSR used to connect
other user network is named Label Edge Router (LER). The LSR in the core of the
internal area is the core LSR. The core LSR can be the router that supports MPLS and
be the ATM-LSR generated after the ATM switch is ungraded. LSRs in the domain
communicated by MPLS.
EF
EFM
EGP
Egress
The group is transferred along the LSP consisting of a series of LSRs after the group is
labeled. The egress LER is named Egress.
electromagnetic
compatibility
electromagnetic
interference
electromagnetic
shielding
The process of limiting the coupling of an electromagnetic field between two locations.
Typically, it is applied to enclosures, separating electrical circuits from external
surroundings, and to cables, separating internal wires from the surroundings that the
cable passes through.
electrostatic discharge
The sudden and momentary electric current that flows between two objects at different
electrical potentials caused by direct contact or induced by an electrostatic field.
embedded control
channel
A logical channel that uses a data communications channel (DCC) as its physical layer,
to enable transmission of operation, administration, and maintenance (OAM)
information between NEs.
EMC
EMI
Issue 02 (2013-08-10)
65
A Glossary
EMS
Engineering label
EPL
EPLAN
error tolerance
The ability of a system or component to continue normal operation despite the presence
of erroneous inputs.
ESD
ESD jack
Electrostatic discharge jack. A hole in the cabinet or shelf, which connect the shelf or
cabinet to the insertion of ESD wrist strap.
ETH-LT
Last mile access from the broadband device to the user community. The EFM takes the
advantages of the SHDSL.b is technology and the Ethernet technology. The EFM
provides both the traditional voice service and internet access service of high speed. In
addition, it meets the users' requirements on high definition television system (HDTV)
and Video On Demand (VOD).
Ethernet LAN
A type of Ethernet service that is provided with dedicated bandwidth and point-to-point
connections on an SDH, PDH, ATM, or MPLS server layer network.
Ethernet virtual
private LAN
Ethernet virtual
private LAN service
An Ethernet service type, which carries Ethernet characteristic information over a shared
bridge, point-to-multipoint connections, provided by SDH, PDH, ATM, or MPLS server
layer networks.
Ethernet-tree
ETS
ETSI
European
Telecommunications
Standards Institute
A standards-setting body in Europe. Also the standards body responsible for GSM.
EVPLAN
EVPLn
Issue 02 (2013-08-10)
66
A Glossary
A parameter related to traffic. In the single rate three color marker (srTCM) mode, the
traffic control is achieved by the token buckets C and E. Excess burst size is a parameter
used to define the capacity of token bucket E, that is, the maximum burst IP packet size
when the information is transferred at the committed information rate. This parameter
must be larger than 0. It is recommended that this parameter should be not less than the
maximum length of the IP packet that might be forwarded.
Exercise Switching
EXP
expedited forwarding
The highest order QoS in the Diff-Serv network. EF PHB is suitable for services that
demand low packet loss ratio, short delay, and broad bandwidth. In all the cases, EF
traffic can guarantee a transmission rate equal to or faster than the set rate. The DSCP
value of EF PHB is "101110".
experimental bits
A field in the MPLS packet header, three bits long. This field is always used to identify
the CoS of the MPLS packet.
Extended ID
The number of the subnet that an NE belongs to, for identifying different network
segments in a WAN. The extended ID and ID form the physical ID of the NE.
Exterior Gateway
Protocol
A protocol for exchanging routing information between two neighbor gateway hosts
(each with its own router) in a network of autonomous systems.
extra traffic
The traffic that is carried over the protection channels when that capacity is not used for
the protection of working traffic. Extra traffic is not protected.
F
fair queue
A mechanism for queue scheduling in which network resource is allocated equally and
delay and jitter time of all traffic are optimized.
fast Ethernet
Any network that supports transmission rate of 100Mbits/s. The Fast Ethernet is 10 times
faster than 10BaseT, and inherits frame format, MAC addressing scheme, MTU, and so
on. Fast Ethernet is extended from the IEEE802.3 standard, and it uses the following
three types of transmission media: 100BASE-T4 (4 pairs of phone twisted-pair cables),
100BASE-TX (2 pairs of data twisted-pair cables), and 100BASE-FX (2-core optical
fibers).
fast reroute
A technology to locally protect MPLS TE network. Only the interface with the speed of
100 Mbps can support FRR. If the switching speed of FRR can reach 50ms, the packet
loss decreases when some faults occur on the network. FRR is applicable to services that
are very sensitive to packet loss and delay. When a fault is detected at the lower layer,
the lower layer informs the upper routing system of the fault. Then the routing system
forwards packets through a backup link. In this manner, the impact of the link fault on
services is minimized. FRR is local and temporary. Once the protected LSP recovers or
a new LSP is set up, traffic is switched to the original or the new LSP. After you configure
FRR on LSP and some link or some node on LSP is invalid, traffic is switched to the
protected link and a new LSP is trying to be set up on the LSP ingress.
FDI
FE
FEC
FF
Issue 02 (2013-08-10)
67
A Glossary
FFD
FFD packet
FFD is a path failure detection method independent from CV. Different from a CV
packet, the frequency for generating FFD packets is configurable to satisfy different
service requirements. An FFD packet contains information the same as that in a CV
packet. The destination end LSR processes FFD packets in the same way for processing
CV packets.
FIB
A kind of fiber used for connections between the subrack and the ODF, and for
connections between subracks or inside a subrack.
field programmable
gate array
FIFO
A member of the TCP/IP suite of protocols, used to copy files between two computers
on the Internet. Both computers must support their respective FTP roles: one must be an
FTP client and the other an FTP server.
filler panel
A piece of board to cover vacant slots, to keep the frame away from dirt, to keep proper
airflow inside the frame, and to beautify the frame appearance.
first in first out queuing A queuing policy that features that the packet reaching earlier can be allocated resource
firstly.
fixed filter style
On an MPLS network, an RSVP node creates a distinct reservation for data packets from
a particular sender. This sender does not share its resource reservation with other senders.
flash memory
flow control
A set of mechanisms used to prevent the network from being overloaded by regulating
the input rate transmissions.
flow queue
The same type of services of a user is considered one service flow; HQoS performs queue
scheduling according to the services of each user. The service flows of each user are
classified into four FQs, namely, CS, EF, AF, and BE. CS is assigned a traffic shaping
percentage for Priority Queuing (PQ); EF, AF, and BE are assigned weights for Weighted
Fair Queuing (WFQ). The preceding two scheduling modes occupy a certain bandwidth
each; they can act at the same time without interfering each other.
Forward
forward defect
indication
Forward defect indication (FDI) is generated and traced forward to the sink node of the
LSP by the node that first detects defects. It includes fields to indicate the nature of the
defect and its location. Its primary purpose is to suppress alarms being raised at affected
higher level client LSPs and (in turn) their client layers.
forward information
base
Issue 02 (2013-08-10)
68
A Glossary
forwarding equivalence As a class-based forwarding technology, MPLS classifies the packets with the same
class
forwarding mode, and the process is called Forwarding Equivalence Class. Packets with
the same FEC are processed similarly on an MPLS network. It is flexible to divide FECs,
and it can be a combination of the source address, the destination address, the source
port, the destination port, the protocol type, the VPN, and so on.
Forwarding plane
Also referred to as the data plane. The forwarding plane is connection-oriented, and can
be used in Layer 2 networks such as an ATM network.
FPGA
FPS
PW fast protection switching (FPS) achieves dual-homing protection for E-Line services.
FQ
FR
frame relay
A packet-switching protocol for use on WANs (wide area networks). Frame relay
transmits variable-length packets at up to 2 Mbps over predetermined, set paths known
as PVCs (permanent virtual circuits). It is a variant of X.25 but dispenses with some of
X.25's error detection for the sake of speed. See also ATM (definition 1), X.25.
Free-run mode
FRR
FTP
full-duplex
G
Gateway IP
When an NE accesses a remote network management system or NE, a router can be used
to enable the TCP/IP communication. In this case, the IP address of the router is the
gateway IP. Only the gateway NE requires the IP address. The IP address itself cannot
identify the uniqueness of an NE. The same IP addresses may exist in different TCP/IP
networks. An NE may have multiple IP addresses, for example, one IP address of the
network and one IP address of the Ethernet port.
gateway network
element
A network element that is used for communication between the NE application layer and
the NM application layer
GE
generic framing
procedure
A framing and encapsulated method which can be applied to any data type. It has been
standardized by ITU-T SG15.
Issue 02 (2013-08-10)
69
A Glossary
generic routing
encapsulation
GFP
gigabit Ethernet
GE adopts the IEEE 802.3z. GE is compatible with 10 Mbit/s and 100 Mbit/s Ethernet.
It runs at 1000 Mbit/s. Gigabit Ethernet uses a private medium, and it does not support
coaxial cables or other cables. It also supports the channels in the bandwidth mode. If
Gigabit Ethernet is, however, deployed to be the private bandwidth system with a bridge
(switch) or a router as the center, it gives full play to the performance and the bandwidth.
In the network structure, Gigabit Ethernet uses full duplex links that are private, causing
the length of the links to be sufficient for backbone applications in a building and campus.
Global Positioning
System
GND
Ground
GNE
GPS
GR
graceful restart
graphical user interface A visual computer environment that represents programs, files, and options with
graphical images, such as icons, menus, and dialog boxes, on the screen.
GRE
GSM
GUI
H
half-duplex
Hardware loopback
A connection mode in which a fiber jumper is used to connect the input optical interface
to the output optical interface of a board to achieve signal loopback.
HDSL
Issue 02 (2013-08-10)
70
A Glossary
hello packet
In an SDH network, the higher order path layers provide a server network from the lower
order path layers.
History Performance
Data
The performance data that is stored in the history register or that is automatically reported
and stored in the NMS.
Hold priority
The priority of the tunnel with respect to holding resources, ranging from 0 (indicates
the highest priority) to 7. It is used to determine whether the resources occupied by the
tunnel can be preempted by other tunnels.
hot plugging
hot standby
HP
HSB
HSDPA
I
I/O
input/output
IANA
ICMP
IE
IEC
IEEE
IETF
IGMP
IGMP snooping
IGP
IGRP
Issue 02 (2013-08-10)
71
A Glossary
IMA
IMA frame
The IMA frame is used as the unit of control in the IMA protocol. It is a logical frame
defined as M consecutive cells, numbered 0 to M-l, transmitted on each of the N links
in an IMA group.
information element
Ingress
The group is transferred along the LSP consisting of a series of LSRs after the group is
labeled. The ingress LER is named Ingress.
Inloop
A method of looping the signals from the cross-connect unit back to the cross-connect
unit.
Institute of Electrical
and Electronics
Engineers
A society of engineering and electronics professionals based in the United States but
boasting membership from numerous other countries. The IEEE focuses on electrical,
electronics, computer engineering, and science-related matters.
integrated services
digital network
Interior Gateway
Protocol
A routing protocol that is used within an autonomous system. The IGP runs in smallsized and medium-sized networks. The commonly used IGPs are the routing information
protocol (RIP), the interior gateway routing protocol (IGRP), the enhanced IGRP
(EIGRP), and the open shortest path first (OSPF).
Interior Gateway
Routing Protocol
A routing protocol from Cisco that was developed in 1988 to overcome the shortcomings
of RIP. IGRP takes bandwidth, latency, reliability and current traffic load into
consideration. It is typically used within an autonomous system, such as an Internet
domain. IGRP was superseded by Enhanced IGRP (EIGRP).
International
Electrotechnical
Commission
The International Electrotechnical Commission (IEC) is an international and nongovernmental standards organization dealing with electrical and electronical standards.
International
Telecommunication
Union
A United Nations agency, one of the most important and influential recommendation
bodies, responsible for recommending standards for telecommunication (ITU-T) and
radio networks (ITU-R).
Internet assigned
numbers authority
The organization operated under the IAB. IANA delegates authority for IP address-space
allocation and domain-name assignment to the NIC and other organizations. IANA also
maintains a database of assigned protocol identifiers used in the TCP/IP suite, including
autonomous system numbers.
Internet Control
Message Protocol
A network-layer (ISO/OSI level 3) Internet protocol that provides error correction and
other information relevant to IP packet processing. For example, it can let the IP software
on one machine inform another machine about an unreachable destination. See also
communications protocol, IP, ISO/OSI reference model, packet (definition 1).
Issue 02 (2013-08-10)
72
A Glossary
Internet Engineering
Task Force
Internet Group
Management Protocol
The protocol for managing the membership of Internet Protocol multicast groups among
the TCP/IP protocols. It is used by IP hosts and adjacent multicast routers to establish
and maintain multicast group memberships.
Internet Protocol
The TCP/IP standard protocol that defines the IP packet as the unit of information sent
across an internet and provides the basis for connectionless, best-effort packet delivery
service. IP includes the ICMP control and error message protocol as an integral part. The
entire protocol suite is often referred to as TCP/IP because TCP and IP are the two
fundamental protocols. IP is standardized in RFC 791.
Internet protocol
television
Internet Protocol
version 4
The current version of the Internet Protocol (IP). IPv4 utilizes a 32bit address which is
assigned to hosts. An address belongs to one of five classes (A, B, C, D, or E) and is
written as 4 octets separated by periods and may range from 0.0.0.0 through to
255.255.255.255. Each IPv4 address consists of a network number, an optional
subnetwork number, and a host number. The network and subnetwork numbers together
are used for routing, and the host number is used to address an individual host within the
network or subnetwork.
Internet protocol
version 6
A update version of IPv4. It is also called IP Next Generation (IPng). The specifications
and standardizations provided by it are consistent with the Internet Engineering Task
Force (IETF). IPv6 is also called. It is a new version of the Internet Protocol, designed
as the successor to IPv4. The difference between IPv6 and IPv4 is that an IPv4 address
has 32 bits while an IPv6 address has 128 bits.
Internet service
provider
An organization that offers users access to the Internet and related services.
interworking
A way to connect telecom devices so that they can communicate with each other.
inverse multiplexing
over ATM
The ATM inverse multiplexing technique involves inverse multiplexing and demultiplexing of ATM cells in a cyclical fashion among links grouped to form a higher
bandwidth logical link whose rate is approximately the sum of the link rates. This is
referred to as an IMA group.
IP
IP address
A 32-bit (4-byte) binary number that uniquely identifies a host (computer) connected to
the Internet for communication with other hosts in the Internet by transferring packets.
An IP address is expressed in dotted decimal notation, consisting of the decimal values
of its 4 bytes, separated with periods; for example, 127.0.0.1. The first three bytes of the
IP address identify the network to which the host is connected, and the last byte identify
the host itself.
Issue 02 (2013-08-10)
73
A Glossary
IP Protocol
IPTV
IPv4
IPv6
ISDN
ISP
IST
ITU
J
jumper
L
L2VPN
Label distribution
Packets with the same destination address belong to an FEC. A label out of an MPLS
label resource pool is allocated to the FEC. LSRs record the relationship of the label and
the FEC. Then, LSRs sends a message and advertises to upstream LSRs about the label
and FEC relationship in message. The process is called label distribution.
Label Distribution
Protocol
A protocol defined for distributing labels in MPLS network. It is the set of procedures
and messages by which Label Switched Routers (LSRs) establish Label Switched Paths
(LSPs) through a network by mapping network-layer routing information directly to
data-link layer switched paths. More information about the applicability of LDP can be
found in [RFC3037].
A device that sits at the edge of an MPLS domain, that uses routing information to assign
labels to datagrams and then forwards them into the MPLS domain.
Label space
Basic element of MPLS network. All LSRs support the MPLS protocol. The LSR is
composed of two parts: control unit and forwarding unit. The former is responsible for
allocating the label, selecting the route, creating the label forwarding table, creating and
removing the label switch path; the latter forwards the labels according to groups
received in the label forwarding table.
LACP
LAG
LAN
LAN switch
Issue 02 (2013-08-10)
74
A Glossary
Layer 2 Multicast
When Ethernet is used as the link layer, Layer 2 multicast uses multicast MAC addresses
for traffic transmission. Therefore, a technology must exist to map the IP multicast
address to the multicast MAC address.
layer 2 switch
A data forwarding method. In LAN, a network bridge or 802.3 Ethernet switch transmits
and distributes packet data based on the MAC address. Since the MAC address is the
second layer of the OSI model, this data forwarding method is called layer 2 switch.
Layer 2 virtual private A virtual private network achieved by Layer 2 switching technologies in the packet
network
switched (IP/MPLS) network.
LB
See loopback
LBM
LBR
LC
Lucent connector
LCT
LDP
LDP peer
Two LSRs that use LDP to exchange labels or FEC mappings. LDP sessions exist
between them.
LER
limit rate
A traffic management technology used to limit the total rate of packet sending on a
physical interface or a Tunnel interface. LR is directly enabled on the interface to control
the traffic passing the interface.
line rate
The maximum packet forwarding capacity on a cable. The value of line rate equals the
maximum transmission rate capable on a given type of media.
Link Aggregation
Control Protocol
link aggregation group An aggregation that allows one or more links to be aggregated together to form a link
aggregation group so that a MAC client can treat the link aggregation group as if it were
a single link.
Link Control Protocol
In the Point-to-Point Protocol (PPP), the Link Control Protocol (LCP) establishes,
configures, and tests data-link Internet connections.
Link Group
According to some principles, links are divided into the set in the logical term. A set of
links is called the link group. The division makes management more convenient.
The Link Layer Discovery Protocol (LLDP) is an L2D protocol defined in IEEE 802.1ab.
Using the LLDP, the NMS can rapidly obtain the Layer 2 network topology and changes
in topology when the network scales expand.
Link Monitoring
Link monitoring is a mechanism for an interface to notify the peer of the fault when the
interface detects that the number of errored frames, errored codes, or errored frame
seconds reaches or exceeds the specified threshold.
Link Protection
Protection provided by the bypass tunnel for the link on the working tunnel. The link is
a downstream link adjacent to the PLR. When the PLR fails to provide node protection,
the link protection should be provided.
link state
advertisement
The link in LSA is any type of connection between OSPF routers, while the state is the
condition of the link.
Issue 02 (2013-08-10)
75
A Glossary
Link status
The running status of a link, which can be Up, Down, backup, or unknown.
linktrace message
The message sent by the initiator MEP of 802.1ag MAC Trace to the destination MEP
is called Linktrace Message(LTM). LTM includes the Time to Live (TTL) and the MAC
address of the destination MEP2.
linktrace reply
For 802.1ag MAC Trace, the destination MEP replies with a response message to the
source MEP after the destination MEP receives the LTM, and the response message is
called Linktrace Reply (LTR). LTR also includes the TTL that equals the result of the
TTL of LTM minus 1.
LLC
LLDP
LLID
locate loopback ID
LMP
LMSP
load sharing
A device running mode. Two or more hardware units can averagely share the system
load according to their processing capabilities when they work normally. When a
hardware unit becomes faulty, the other units fulfill the tasks of the faulty unit on the
precondition of guaranteeing the system performance, for example, few call loss.
A network formed by the computers and workstations within the coverage of a few square
kilometers or within a single building. It features high speed and low error rate. Ethernet,
FDDI, and Token Ring are three technologies used to implement a LAN. Current LANs
are generally based on switched Ethernet or Wi-Fi technology and running at 1,000 Mbit/
s (that is, 1 Gbit/s).
Lock status
Services are not switched to the protection board or channel when a fault occurs, if
currently no switching takes place. If currently the switching takes place, after the
working board or channel recovers to normal, the services are not switched back to the
working board or channel.
Locked switching
When the switching condition is satisfied, this function disables the service from being
switched from the working channel to the protection channel. When the service has been
switched, the function enables the service to be restored from the protection channel to
the working channel.
LOF
According to the IEEE 802 family of standards, Logical Link Control (LLC) is the upper
sublayer of the OSI data link layer. The LLC is the same for the various physical media
(such as Ethernet, token ring, WLAN).
LOM
loss of multiframe
loopback
A troubleshooting technique that returns a transmitted signal to its source so that the
signal or message can be analyzed for errors.
loopback message
The loopback packet sent by the node that supports 802.2ag MAC Ping to the destination
node. LBM message carries its own sending time.
loopback reply
For 802.2ag MAC Ping, the destination MEP replies with a response message to the
source MEP after the destination MEP receives the LBM, and the response message is
called Loopback Reply. The LBR carries the sending time of LBM, the receiving time
of LBM and the sending time of LBR.
Issue 02 (2013-08-10)
76
A Glossary
LOP
LOS
Loss Of Frame
loss of pointer
Loss Of Signal
Loss of signal (LOS) indicates that there are no transitions occurring in the received
signal.
LPQ is performed after WFQ. It also means the device schedules queues strictly based
on the priority of queues.
Lower subrack
The subrack close to the bottom of the cabinet when a cabinet contains several subracks.
Lower Threshold
When the performance event count value is smaller than a certain value, a thresholdcrossing event occurs. The value is the lower threshold.
LP
LPQ
LPT
LR
LSA
LSDB
LSP
LSP tunnel
For an LSP, after a label is assigned to an FEC on the ingress, the label determines the
traffic forwarding. The traffic is transparent to the intermediate nodes. In this sense, an
LSP can be regarded as an LSP tunnel.
LSR
LSS
LT
linktrace
LTM
LTR
M
MA
MAC
MAC address learning Service that characterizes a learning bridge, in which the source MAC address of each
received packets is stored so that future packets destined for that address can be
forwarded only to the bridge interface on which that address is located. Packets destined
for unrecognized addresses are forwarded out every bridge interface. This scheme helps
minimize traffic on the attached LANs. MAC address learning is defined in the IEEE
802.1 standard.
Issue 02 (2013-08-10)
77
A Glossary
main distribution
frame
mains supply
The commercial power supply of a nation. In China, the nominal voltage of the mains
supply is 220 V AC and the frequency is 50 Hz.
maintenance
association
maintenance
association end point
A MEP is an actively managed CFM Entity, associated with a specific DSAP of a Service
Instance, which can generate and receive CFM frames and track any responses. It is an
end point of a single Maintenance Association, and terminates a separate Maintenance
Entity for each of the other MEPs in the same Maintenance Association.
maintenance
association
intermediate point
A CFM Entity, associated with a specific pair of ISS Service Access Points or EISS
Service Access Points, which reacts and responds to CFM frames. It is associated with
a single Maintenance Association, and is an intermediate point within one or more
Maintenance Entities.
maintenance domain
The network or the part of the network for which connectivity is managed by CFM. The
devices in an MD are managed by a single ISP.
maintenance point
MAN
Management right
The right enabling a user to manage the specified devices and boards or the group of a
user to manage specified domains.
manual switch
Switches normal traffic signal to the protection section, unless a failure condition exists
on other sections (including the protection section) or an equal or higher priority switch
command is in effect, by issuing a manual switch request for that normal traffic signal.
master-slave
synchronization
In the master-slave mode, a designated master clock disseminates its frequency reference
to all other slave clocks.
maximum transmission The largest packet of data that can be transmitted on a network. MTU size varies,
unit
depending on the network, 576 bytes on X.25 networks, for example, 1500 bytes on
Ethernet, and 17,914 bytes on 16 Mbps Token Ring. Responsibility for determining the
size of the MTU lies with the link layer of the network. When packets are transmitted
across networks, the path MTU, or PMTU, represents the smallest packet size (the one
that all networks can transmit without breaking up the packet) among the networks
involved.
MBS
MCF
MCR
MD
MD5
MDF
MDP
The average time that a device will take to recover from a failure.
Issue 02 (2013-08-10)
78
A Glossary
A protocol at the media access control sublayer. The protocol is at the lower part of the
data link layer in the OSI model and is mainly responsible for controlling and connecting
the physical media at the physical layer. When transmitting data, the MAC protocol
checks whether to be able to transmit data. If the data can be transmitted, certain control
information is added to the data, and then the data and the control information are
transmitted in a specified format to the physical layer. When receiving data, the MAC
protocol checks whether the information is correct and whether the data is transmitted
correctly. If the information is correct and the data is transmitted correctly, the control
information is removed from the data and then the data is transmitted to the LLC layer.
media gateway
A logical entity that converts the format of the media of a network to meet the format
requirement of another network. It can process audio services, video services and data
services, and convert the media format in full duplex mode. In addition, it can play certain
audio and video signals, and provide the IVR function and media conference.
MEP
merge point
The LSR where one or more backup tunnels rejoin the path of the protected LSP
downstream of the potential failure. The same LSR may be both an MP and a PLR
simultaneously.
message
communication
function
message digest
algorithm 5
message dispatch
processor
The MDP roughly processes the received messages, and then sends the messages to the
destinations.
metropolitan area
network
A metropolitan area network (MAN) is a network that interconnects users with computer
resources in a geographic area or region larger than that covered by even a large local
area network (LAN) but smaller than the area covered by a wide area network (WAN).
The term is applied to the interconnection of networks in a city into a single larger
network (which may then also offer efficient connection to a wide area network). It is
also used to mean the interconnection of several local area networks by bridging them
with backbone lines. The latter usage is also sometimes referred to as a campus network.
MGW
microwave
The portion of the electromagnetic spectrum with much longer wavelengths than infrared
radiation, typically above about 1 mm.
Minimum Cell Rate (MCR). Parameter defined by the ATM Forum for ATM traffic
management. MCR is defined only for Available Bit Rate (ABR) transmissions, and
specifies the minimum value for the ACR.
MIP
mirror
It is an action to store a copy of a file to another archive site to release the load of the
original site, or to provide an archive site closer to the users geographically.
MLD
MLPPP
Issue 02 (2013-08-10)
79
A Glossary
MP
MP
MP-BGP
MPLS L2VPN
The MPLS L2VPN provides the Layer 2 VPN service based on an MPLS network. In
this case, on a uniform MPLS network, the carrier is able to provide Layer 2 VPNs of
different media types, such as ATM, FR, VLAN, Ethernet, and PPP.
MPLS OAM
The MPLS OAM provides continuity check for a single LSP, and provides a set of fault
detection tools and fault correct mechanisms for MPLS networks. The MPLS OAM and
relevant protection switching components implement the detection function for the CRLSP forwarding plane, and perform the protection switching in 50 ms after a fault occurs.
In this way, the impact of a fault can be lowered to the minimum.
MPLS TE tunnel
MS
MSP
MST
MSTI
MSTP
MTBF
MTTR
MTU
Multi-link Point to
Point Protocol
A protocol used in ISDN connections. MLPPP lets two B channels act as a single line,
doubling connection rates to 128 kbit/s.
Multi-protocol
Extensions for Border
Gateway Protocol
Multicast
A process of transmitting packets of data from one source to many destinations. The
destination address of the multicast packet uses Class D address, that is, the IP address
ranges from 224.0.0.0 to 239.255.255.255. Each multicast address represents a multicast
group rather than a host.
multicast group
A set of members participating in the packet multicast service. The multicast group is
defined by a rule (or set of rules) which identifies a collection of members implicitly or
explicitly. This rule may associate members for the purpose of participating in a call, or
may associate members who do not participate in data transfer but do participate in
management, security, control, and accounting for the multicast group.
multicast listener
discovery
The MLD is used by the IPv6 router to discover the multicast listeners on their directly
connected network segments, and set up and maintain member relationships. On IPv6
networks, after MLD is configured on the receiver hosts and the multicast router to which
the hosts are directly connected, the hosts can dynamically join related groups and the
multicast router can manage members on the local network.
Issue 02 (2013-08-10)
80
A Glossary
multiple spanning tree Multiple spanning tree instance. One of a number of Spanning Trees calculated by MSTP
instance
within an MST Region, to provide a simply and fully connected active topology for
frames classified as belonging to a VLAN that is mapped to the MSTI by the MST
Configuration. A VLAN cannot be assigned to multiple MSTIs.
Multiple Spanning
Tree Protocol
Multiple spanning tree protocol. The MSTP can be used in a loop network. Using an
algorithm, the MSTP blocks redundant paths so that the loop network can be trimmed
as a tree network. In this case, the proliferation and endless cycling of packets is avoided
in the loop network. The protocol that introduces the mapping between VLANs and
multiple spanning trees. This solves the problem that data cannot be normally forwarded
in a VLAN because in STP/RSTP, only one spanning tree corresponds to all the VLANs.
Multiple Spanning
Tree Region
The MST region consists of switches that support the MSTP in the LAN and links among
them. Switches physically and directly connected and configured with the same MST
region attributes belong to the same MST region. The attributes for the same MST region
are as follows: Same region name Same revision level Same mapping relation between
the VLAN ID to MSTI
multiplex section
The trail between and including two multiplex section trail termination functions.
multiplex section
protection
A function, which is performed to provide capability for switching a signal between and
including two multiplex section termination (MST) functions, from a "working" to a
"protection" channel.
multiplex section
termination
The function performed to generate the MSOH in the process of forming an SDH frame
signal and terminates the MSOH in the reverse direction.
Multiplexing
A procedure by which multiple lower order path layer signals are adapted into a higher
order path or the multiple higher order path layer signals are adapted into a multiplex
section.
Multiservice capability It specifies whether multiple services can be independently processed during a session.
N
NA
NCP
NE database
There are three types of database on NE SCC board as following: (1) DRDB: a dynamic
database in a dynamic RAM, powered by battery; (2) SDB: a static database in a powerdown RAM; (3) FDB0, FDB0: permanently saved databases in a Flash ROM. In efficient
operation, the NE configuration data is saved in DRDB and SDB at the same time.
Backing up an NE database means backing up the NE configuration data from SDB to
FDB0 and FDB1. When an NE is restarted after power-down, the NE database is restored
in the following procedures: As the SDB data is lost due to power-down, the main control
restores the data first from DRDB. If the data in DRDB is also lost due to the exhaustion
of the battery, the data is restored from FDB0 or FDB1.
NE ID
An ID that indicates a managed device in the network. In the network, each NE has a
unique NE ID.
NE side
The NE configuration data saved on the SCC board of the equipment, which can be
uploaded to the network management system and then stored in databases on the network
management system NE side.
network address
On the Internet, addresses are based on the IP protocol, which uses a 32-bit code in the
IP header to identify host addresses.
Issue 02 (2013-08-10)
81
A Glossary
Network Control
Protocol
This is the program that switches the virtual circuit connections into place, implements
path control, and operates the Synchronous Data Link Control (SDLC) link.
Network diameter
The maximum of network bridges that the communication passes through between any
two terminal devices in the switched network.
Network entity
Network entity refers to the universal basic devices used to describe the functions and
structure of the transmission network, which considerably facilitates the description of
the network. The network entities include transmission object and sub-network.
network layer
The network layer is layer 3 of the seven-layer OSI model of computer networking. The
network layer provides routing and addressing so that two terminal systems are
interconnected. In addition, the network layer provides congestion control and traffic
control. In the TCP/IP protocol suite, the functions of the network layer are specified
and implemented by IP protocols. Therefore, the network layer is also called IP layer.
Network Management A system in charge of the operation, administration, and maintenance of a network.
System
network node interface The interface at a network node which is used to interconnect with another network node.
network segment
A part of an Ethernet or other network, on which all message traffic is common to all
nodes, that is, it is broadcast from one node on the segment and received by all others.
network service access A network address defined by ISO, through which entities on the network layer can
point
access OSI network services.
network storm
Network Time Protocol The Network Time Protocol (NTP) defines the time synchronization mechanism. It
synchronizes the time between the distributed time server and the client.
network unit layer
The logical layer that implements the configuration, failure and performance for a single
network element in the layered management architecture of the telecom network
management system.
NMS
NHOP
next-hop
NNI
Node Protection
A parameter of the FRR protection. It indicates that the bypass tunnel should be able to
protect the downstream node that is involved in the working tunnel and adjacent to the
PLR. The node cannot be a merge point, and the bypass tunnel should also be able to
protect the downstream link that is involved in the working tunnel and adjacent to the
PLR.
NPC
NRT
non-real-time
NSAP
NSF
NTP
Issue 02 (2013-08-10)
82
A Glossary
O
OAM
OAMPDU
ODF
OOF
open shortest path first A link-state, hierarchical interior gateway protocol (IGP) for network routing. Dijkstra's
algorithm is used to calculate the shortest path tree. It uses cost as its routing metric. A
link state database is constructed of the network topology which is identical on all routers
in the area.
Open Systems
Interconnection
operation log
operation,
administration and
maintenance
A group of network support functions that monitor and sustain segment operation,
activities that are concerned with, but not limited to, failure detection, notification,
location, and repairs that are intended to eliminate faults and keep a segment in an
operational state and support activities required to provide the services of a subscriber
access network to users/subscribers.
A device installed at the end of a fiber, optical source or receive unit. It is used to couple
the optical wave to the fiber when connected to another device of the same type. A
connector can either connect two fiber ends or connect a fiber end and a optical source
(or a detector).+
optical distribution
frame
optical fiber
OSI
OSPF
out of frame
Outloop
A method of looping back the input signals received at an port to an output port without
changing the structure of the signals.
overcurrent protection A circuit protection technology. When there is a great volume of traffic on a circuit and
the current is stronger than the protection threshold, the circuit is cut off after the circuit
protector timer expires.
overhead cabling
Issue 02 (2013-08-10)
Cables or fibers connect the cabinet with other equipment from the top of the cabinet.
83
A Glossary
P
P
A backbone device that is located in the service provider network. A P device is not
directly connected with the CE devices. The P devices only need the basic MPLS
forwarding capability and do not maintain information about a VPN.
P2P
packet loss
The discarding of data packets in a network when a device is overloaded and cannot
accept any incoming data at a given moment.
A MAN and WAN technology that provides point-to-point data connections. The POS
interface uses SDH/SONET as the physical layer protocol, and supports the transport of
packet data (such as IP packets) in MAN and WAN.
Packet rate
The number of bits or bytes passed within a specified time. It is expressed in bits/s or
bytes/s.
packet switching
parity
A method for character level error detection. An extra bit added to a string of bits, usually
a 7-bit ASCII character, so that the total number of bits 1 is odd or even (odd or even
parity). Both ends of a data transmission must use the same parity. When the transmitting
device frames a character, it counts the numbers of 1s in the frame and attaches the
appropriate parity bit. The recipient counts the 1s and, if there is parity error, may ask
for the data to be retransmitted.
pass-through
The action of transmitting the same information that is being received for any given
direction of transmission.
path layer
A layer within an SDH entity that supports the SDH based network transport services,
e.g. multiplexing, cross-connection, regeneration. The network element function is
modeled by managed objects.
PBS
PCB
PCI bus
PCI (Peripheral Component Interconnect) bus. A high performance bus, 32-bit or 64-bit
for interconnecting chips, expansion boards, and processor/memory subsystems.
PCR
PDH
PDU
PE
A parameter used to define the capacity of token bucket P, that is, the maximum burst
IP packet size when the information is transferred at the peak information rate. This
parameter must be larger than 0. It is recommended that this parameter should be not
less than the maximum length of the IP packet that might be forwarded.
Peak Information Rate. A traffic parameter, expressed in bit/s, whose value should be
not less than the committed information rate.
Peer
Issue 02 (2013-08-10)
84
A Glossary
penultimate hop
popping
per-hop behavior
Performance register
Performance register is the memory space for performance event counts, including 15min current performance register, 24-hour current performance register, 15-min history
performance register, 24-hour history performance register, UAT register and CSES
register. The object of performance event monitoring is the board functional module, so
every board functional module has a performance register. A performance register is
used to count the performance events taking place within a period of operation time, so
as to evaluate the quality of operation from the angle of statistics.
protection ground
phase-locked loop
A circuit that consists essentially of a phase detector which compares the frequency of
a voltage-controlled oscillator with that of an incoming carrier signal or referencefrequency generator; the output of the phase detector, after passing through a loop filter,
is fed back to the voltage-controlled oscillator to keep it exactly in phase with the
incoming or reference frequency.
PHB
PHP
physical layer
Physical layer is the Layer 1 in the Open System Interconnection (OSI) architecture; the
layer that provides services to transmit bits or groups of bits over a transmission link
between open systems and which entails electrical, mechanical and handshaking
physical link
The physical link refers to the link between two physical NEs. When the user creates
NEs or refreshes the device status, the system automatically creates the physical link
according to the topology structure information on the device. The physical link can
modify the remarks information. It cannot be deleted.
Ping Test
A test that is performed to send a data packet to the target IP address (a unique IP address
on the device on the network) to check whether the target host exists according to the
data packet of the same size returned from the target host.
PIR
plesiochronous digital
hierarchy
A multiplexing scheme of bit stuffing and byte interleaving. It multiplexes the minimum
rate 64 kit/s into the 2 Mbit/s, 34 Mbit/s, 140 Mbit/s, and 565 Mbit/s rates.
PLL
PLR
The ingress node of the bypass tunnel. The head-end node of a backup tunnel or a detour
tunnel.
point to multipoint
A communications network that provides a path from one location to multiple locations
(from one to many).
Issue 02 (2013-08-10)
85
A Glossary
A service between two terminal users. In P2P services, senders and recipients are
terminal users.
Point-to-Point Protocol A protocol on the data link layer, provides point-to-point transmission and encapsulates
data packets on the network layer. It is located in layer 2 of the IP protocol stack.
policy template
To define the calculation rules of a charging event, for example, rating, debiting and
accumulating. A policy template may contain the parameters to be instantiated. They
can be used when the attributes of the condition judgment, calculation method, and action
functions are carried out.
port forwarding
Port priority
The priority used when a port attaches tags to Layer 2 packets. Packets received on ports
with higher priorities are forwarded preferentially.
POS
power up
PPP
PPS
PQ
PQ
PRBS
PRC
Precision Time
Protocol
Preemption
During the process of establishing CR-LSP, if you cannot fine one path that satisfies
requirements, you can remove another established path and take up its bandwidth
resource. That is called preemption. CR-LSP check whether the path can be preempted
according to two priority features, that is, Setup Priority and Holding Priority.
Preemption is activated by the Resv message of RSVP-TE. Only when the priority of
Path1, which you want to set up, is higher than that of Path2, you can preempt the
bandwidth source of Path2 for Path1.
priority queue
A priority queue is an abstract data type in computer programming that supports the
following three operations: (1) InsertWithPriority: add an element to the queue with an
associated priority (2) GetNext: remove the element from the queue that has the highest
priority, and return it (also known as "PopElement(Off)", or "GetMinimum") (3)
PeekAtNext (optional): look at the element with highest priority without removing it
priority queuing
The Priority Queuing (PQ) is a queue scheduling algorithm based on the absolute priority.
According to the PQ algorithm, services of higher priorities are ensured with greater
bandwidth, lower latency, and less jitter. Packets of lower priorities must wait to be sent
till all packets of higher priorities are sent. In this manner, services of higher priorities
are handled earlier than others.
protection channels
The channels allocated to transport the working traffic during a switch event. When there
is a switch event, traffic on the affected working channels is bridged onto on the
protection channels.
Issue 02 (2013-08-10)
86
A Glossary
A bar connecting the PGND cable of the cabinet so that the cabinet and the earth are in
the same equipotential level.
protection ground
cable
A cable which connects the equipment and the protection groud bar. Usually, one half
of the cable is yellow; while the other half is green.
Protection path
Protection service
provider edge
A device that is located in the backbone network of the MPLS VPN structure. A PE is
responsible for VPN user management, establishment of LSPs between PEs, and
exchange of routing information between sites of the same VPN. During the process, a
PE performs the mapping and forwarding of packets between the private network and
the public channel. A PE can be a UPE, an SPE, or an NPE.
pseudo random binary A sequence that is random in a sense that the value of an element is independent of the
sequence
values of any of the other elements, similar to real random sequences.
pseudo wire emulation A type of end-to-end Layer 2 transmitting technology. It emulates the essential attributes
edge-to-edge
of a telecommunication service such as ATM, FR or Ethernet in a Packet Switched
Network (PSN). PWE3 also emulates the essential attributes of low speed Time Division
Multiplexed (TDM) circuit and SONET/SDH. The simulation approximates to the real
situation.
PSTN
PTMP
PTN
PTP
public switched
telephone network
Pulse per second, which, strictly speaking, is not a time synchronization signal. This is
because 1PPS provides only the "gauge" corresponding to the UTC second, but does not
provide the information about the day, month, or year. Therefore, 1PPS is used as the
reference for frequency synchronization. On certain occasions, 1PPS can also be used
on other interfaces for high precision timing.
PVP
PWE3
Q
QinQ
A layer 2 tunnel protocol based on IEEE 802.1Q encapsulation. It encapsulates the tag
of the user's private virtual local area network (VLAN) into the tag of the public VLAN.
The packet carries two layers of tags to travel through the backbone network of the
carrier. In this manner, the layer 2 virtual private network (VPN) is provided for the user.
QoS
Issue 02 (2013-08-10)
87
quality of service
A Glossary
R
R99
Release 1999
The network that provides the connection between CPEs and the CN. It isolates the CN
from wireless network.
radio frequency
radio network
controller
An equipment in the RNS which is in charge of controlling the use and the integrity of
the radio resources.
RAN
random early detection A packet loss algorithm used in congestion avoidance. It discards the packet according
to the specified higher limit and lower limit of a queue so that global TCP synchronization
resulted in traditional Tail-Drop can be prevented.
Rapid Spanning Tree
Protocol
An evolution of the Spanning Tree Protocol, providing for faster spanning tree
convergence after a topology change. The RSTP protocol is backward compatible with
the STP protocol.
rated current
RDI
Re-optimization
Real-time Transport Protocol (RTP) is a host-to-host protocol. It is used to deliver realtime services such as audio and video over the IP network.
The rt-VBR is intended for real-time applications, such as compressed voice over IP
(VoIP) and video conferencing. The rt-VBR is characterized by a peak cell rate (PCR),
sustained cell rate (SCR), and maximum burst size (MBS). You can expect the source
device to transmit in bursts and at a rate that varies with time.
Real-time Transport
Protocol
A type of host-to-host protocol used in real-time multimedia services such as Voice over
IP (VoIP) and video.
reboot
To start the system again. Programs or data will be reloaded to all boards.
RED
reference clock
A kind of stable and high-precision autonous clock providing frequencies for other clocks
for reference.
REI
Issue 02 (2013-08-10)
88
remote defect
indication
A Glossary
A signal transmitted at the first opportunity in the outgoing direction when a terminal
detects specific defects in the incoming signal.
remote error indication A remote error indication (REI) is sent upstream to signal an error condition. There are
two types of REI alarms: Remote error indication line (REI-L) is sent to the upstream
LTE when errors are detected in the B2 byte. Remote error indication path (REI-P) is
sent to the upstream PTE when errors are detected in the B3 byte.
remote maintenance
association end point
For the other devices in the same MA, their MEPs are called the Remote Maintenance
association End Points (RMEPs).
remote monitor
A widely used network management standard defined by the IETF, and it enhances the
MIB II standard greatly. It mainly functions to monitor the data traffic over a network
segment or the entire network. RMON is completely based on the SNMP architecture,
including the NMS and the Agent running on each network device.
Request For Comments A document in which a standard, a protocol, or other information pertaining to the
operation of the Internet is published. The RFC is actually issued, under the control of
the IAB, after discussion and serves as the standard. RFCs can be obtained from sources
such as InterNIC.
required Min Rx
interval
The minimum interval between received BFD control packets that the local system is
capable of supporting.
Resource Reservation
Protocol
The Resource Reservation Protocol (RSVP) is designed for Integrated Service and is
used to reserve resources on every node along a path. RSVP operates on the transport
layer; however, RSVP does not transport application data. RSVP is a network control
protocol like Internet Control Message Protocol (ICMP).
reverse pressure
A traffic control method. In telecommunication, when detecting that the transmit end
transmits a large volume of traffic, the receive end sends signals to ask the transmit end
to slow down the transmission rate.
RF
RFC
ring network
A type of network topology in which each node connects to exactly two other nodes,
forming a circular pathway for signals.
RIP
RMEP
RMON
RMRI
RNC
RoHS
rollback
Root alarm
An alarm directly caused by anomaly events or faults in the network. Some lower-level
alarms always accompany a root alarm.
Route restriction
The constraint conditions for calculating a route. When creating a trail, the user can
specify the explicit route and the NEs that the trail cannot pass. The explicit route and
the NEs are the constraints for calculating the route. The inevitable trail only functions
when the number of routes is calculated as 1. Double-click the NE icon can set the NE
as an NE that cannot be passed, and double-clicking it again can cancel the setting.
Issue 02 (2013-08-10)
89
A Glossary
Routing Information
Protocol
A simple routing protocol that is part of the TCP/IP protocol suite. It determines a route
based on the smallest hop count between source and destination. RIP is a distance vector
protocol that routinely broadcasts routing information to its neighboring routers and is
known to waste bandwidth.
routing policy
Routing policies are implemented to filter routing information, mainly through the
change of route properties.
routing protocol
A formula used by routers to determine the appropriate path onto which data should be
forwarded.
routing table
A table that stores and updates the locations (addresses) of network devices. Routers
regularly share routing table information to be up to date. A router relies on the
destination address and on the information in the table that gives the possible routes--in
hops or in number of jumps--between itself, intervening routers, and the destination.
Routing tables are updated frequently as new information is available.
RS232
RS422
The specification that defines the electrical characteristics of balanced voltage digital
interface circuits. The interface can change to RS232 via the hardware jumper and others
are the same as RS232.
RSTP
RSVP
rt-VBR
RTP
RTP
S
S-VLAN
service VLAN
S1 byte
In an SDH network, each network element traces step by step to the same clock reference
source through a specific clock synchronization path, thus realizing the synchronization
of the whole network. If a clock reference source traced by the NE is missing, this NE
will trace another clock reference source of a lower level. To implement protection
switching of clocks in the whole network, the NE must learn about clock quality
information of the clock reference source it traces. Therefore, ITU-T defines S1 byte to
transmit network synchronization status information. It uses the lower four bits of the
multiplex section overhead S1 byte to indicate 16 types of synchronization quality
grades. Auto protection switching of clocks in a synchronous network can be
implemented using S1 byte and a proper switching protocol.
SC
SCR
SD
SDH
SDP
Issue 02 (2013-08-10)
90
A Glossary
security alarm
security level
security log
Security logs record the security operations on the NMS, such as logging in to the server,
modifying the password, and exiting from the NMS server.
SEMF
sequence number
service data
The user and/or network information required for the normal functioning of service.
SETS
Setup Priority
The priority of the tunnel with respect to obtaining resources, ranging from 0 (indicates
the highest priority) to 7. It is used to determine whether the tunnel can preempt the
resources required by other backup tunnels.
SFP
shaping
The process of delaying packets within a traffic stream to cause it to conform to certain
defined traffic profile.
SHDSL
signal cable
Common signal cables cover the E1 cable, network cable, and other non-subscriber
signal cable.
signal degrade
A signal indicating the associated data has degraded in the sense that a degraded defect
(e.g., dDEG) condition is active.
signaling stream
Simple Network
Management Protocol
A network management protocol of TCP/IP. It enables remote users to view and modify
the management information of a network element. This protocol ensures the
transmission of management information between any two points. The polling
mechanism is adopted to provide basic function sets. According to SNMP, agents, which
can be hardware as well as software, can monitor the activities of various devices on the
network and report these activities to the network console workstation. Control
information about each device is maintained by a management information block.
Simple Traffic
Classification
Simple traffic classification (STC) organizes data packets into multiple priorities or
multiple service classes. A network administrator can set STC policies. An STC policy
can include the IP precedence or the DSCP value of an IP packet, the EXP value of an
MPLS packet, the ToS field in the IP packet header or the 802.1p value of a VLAN
packet.
single-ended switching A protection operation method which takes switching action only at the affected end of
the protected entity (e.g. "trail", "subnetwork connection"), in the case of a unidirectional
failure.
Issue 02 (2013-08-10)
91
A Glossary
A symmetric digital subscriber line technology developed from HDSL, SDSL, and
HDSL2, which is defined in ITU-T G.991.2. The SHDSL port is connected to the user
terminal through the plain telephone subscriber line and uses trellis coded pulse
amplitude modulation (TC-PAM) technology to transmit high-speed data and provide
the broadband access service.
Slicing
small form-factor
pluggable
SMB
sub-miniature B
Smooth upgrade
SNMP
SONET
Spanning Tree Protocol STP is a protocol that is used in the LAN to remove the loop. STP applies to the redundant
network to block some undesirable redundant paths through certain algorithms and prune
a loop network into a loop-free tree network.
SPE
SPF
SQN
square connector
SSM
SSMB
static ARP
A protocol that binds some IP addresses to a specified gateway. The packet of these IP
addresses must be forwarded through this gateway.
static route
A route that cannot adapt to the change of network topology. Operators must configure
it manually. When a network topology is simple, the network can work in the normal
state if only the static route is configured. It can improve network performance and ensure
bandwidth for important applications. Its disadvantage is as follows: When a network is
faulty or the topology changes, the static route does not change automatically. It must
be changed by the operators.
A static routing table is constructed manually by the system administrator using the route
command.
Statistical multiplexing A multiplexing technique whereby information from multiple logical channels can be
transmitted across a single physical channel. It dynamically allocates bandwidth only to
active input channels, to make better use of available bandwidth and allow more devices
to be connected than with other multiplexing techniques. Compare with TDM.
STP
subnet mask
The technique used by the IP protocol to determine which network segment packets are
destined for. The subnet mask is a binary pattern that is stored in the client machine,
server or router and is matched with the IP address.
Issue 02 (2013-08-10)
92
A Glossary
superstratum provider The SPE devices are core devices that are located within a VPLS full-meshed network.
edge
The UPE devices that are connected with the SPE devices are similar to the CE devices.
The PWs set up between the UPE devices and the SPE devices serve as the ACs of the
SPE devices. The SPE devices must learn the MAC addresses of all the sites on UPE
side and those of the UPE interfaces that are connected with the SPE. SPE is sometimes
called NPE.
Switching restoration
time
It refers to the period of time between the start of detecting and the moment when the
line is switched back to the original status after protection switching occurs in the MSP
sub-network.
Synchronization Status A message that carries quality levels of timing signals on a synchronous timing link.
Message
Nodes on an SDH network and a synchronization network acquire upstream clock
information through this message. Then the nodes can perform proper operations on their
clocks, such as tracing, switching, or converting to holdoff, and forward the
synchronization information to downstream nodes.
Synchronize Alarm
When synchronizing the alarms, the network management system checks the alarms in
the network management system database and the alarms in the NE. If they are
inconsistent, the alarms in the NE are uploaded to the network management system
database and overwrite the old ones.
synchronize NE time
To send the system time of the server of the network management system to NEs so as
to synchronize all NEs with the server.
synchronous digital
hierarchy
A transmission scheme that follows ITU-T G.707, G.708, and G.709. It defines the
transmission features of digital signals such as frame structure, multiplexing mode,
transmission rate level, and interface code. SDH is an important part of ISDN and BISDN. It interleaves the bytes of low-speed signals to multiplex the signals to high-speed
counterparts, and the line coding of scrambling is only used only for signals. SDH is
suitable for the fiber communication system with high speed and a large capacity since
it uses synchronous multiplexing and flexible mapping structure.
synchronous
equipment
management function
The SEMF converts performance data and implementation specific hardware alarms into
object-oriented messages for transmission over DCCs and/or a Q interface.
synchronous
equipment timing
source
The SETS function provides timing reference to the relevant component parts of
multiplexing equipment and represents the SDH network clement clock.
synchronous optical
network
Synchronous source
A clock providing timing services to connected network elements. This would include
clocks conforming to Recommendations G.811, G.812 and G.813.
SYSLOG
Syslog Service
Syslog service is used to manage the device to send the log information to the host. It is
used on the sending-information port.
system logging
System log tracks miscellaneous system events like startup, shutdown and events like
hardware and controller failures.
Issue 02 (2013-08-10)
93
A Glossary
T
Tail drop
A congestion management mechanism, in which packets arrive later are discarded when
the queue is full. This policy of discarding packets may result in network-wide
synchronization due to the TCP slow startup mechanism.
tangent rings
It is a concept in geometry. There is a public node between two ring networks. The public
node often brings in single-point failure.
TCH
TCP
TCP/IP
TDD
TDM
TE
Telecommunication
A protocol model defined by ITU-T for managing open systems in a communications
Management Network network. An architecture for management, including planning, provisioning, installation,
maintenance, operation and administration of telecommunications equipment, networks
and services.
threshold-crossing
throughput
The maximum transmission rate of the tested object (system, equipment, connection,
service type) when no packet is discarded. Throughput can be measured with bandwidth.
TIM
In Time Division Duplex (TDD) system, the uplink and downlink links use different
timeslots. They usually share the same frequency.
time division
multiplexing
A multiplexing technology. TDM divides the sampling cycle of a channel into time slots
(TSn, n=0, 1, 2, 3, ...), and the sampling value codes of multiple signals engross time
slots in a certain order, forming multiple multiplexing digital signals to be transmitted
over one channel.
Time Slot
Continuously repeating interval of time or a time period in which two devices are able
to interconnect.
time to live
A technique used in best-effort delivery systems to prevent packets that loop endlessly.
The TTL is set by the sender to the maximum time the packet is allowed to be in the
network. Each router in the network decrements the TTL field when the packet arrives,
and discards any packet if the TTL counter reaches zero.
timing loop
TM
TM
TMN
Issue 02 (2013-08-10)
94
A Glossary
token bucket algorithm The token bucket is a container for tokens. The capacity of a token bucket is limited, and
the number of tokens determines the traffic rate of permitted packets. The token bucket
polices the traffic. Users place the tokens into the bucket regularly according to the preset
rate. If the tokens in the bucket exceed the capacity, no tokens can be put in. Packets can
be forwarded when the bucket has tokens, otherwise they cannot be transferred till there
are new tokens in the bucket. This scheme adjusts the rate of packet input.
token ring
The IEEE 802.5 standard for a token-passing ring network with a star-configured
physical topology. Internally, signals travel around the network from one station to the
next in a ring. Physically, each station connects to a central hub called a multistation
access server.
tolerance
topology management
Topology Object
A basic element in the NMS topology view, which includes submap, node, connection,
and so on.
Topology view
A basic component for the human-machine interface. The topology view directly
displays the networking of a network as well as the alarm and communication statuses
of each network element and subnet. In this manner, the topology view reflects the basic
running conditions of the network.
ToS
ToS priority
A ToS sub-field (the bits 0 to 2 in the ToS field) in the ToS field of the IP packet header.
TPS
TPS protection
The equipment level protection that uses one standby tributary board to protect N
tributary boards. When a fault occurs on the working board, the SCC issues the switching
command, and the payload of the working board can be automatically switched over to
the specified protection board and the protection board takes over the job of the working
board. After the fault is cleared, the service is automatically switched to the original
board
TR
traffic channel
Indicates the channel that carries voice coding information or user data. Traffic channels
are classified into voice traffic channels and data traffic channels.
traffic classification
Traffic classification enables you to classify traffic into different classes with different
priorities according to some criteria. Each class of traffic has a specified quality of service
(QoS) in the entire network. In this way, different traffic packets can be treated
differently.
traffic engineering
A technology that is used to dynamically monitor the traffic of the network and the load
of the network elements, to adjust in real time the parameters such as traffic management
parameters, route parameters and resource restriction parameters, and to optimize the
utilization of network resources. The purpose is to prevent the congestion caused by
unbalanced loads.
Issue 02 (2013-08-10)
95
A Glossary
It is the traffic frame discard control. Two options are provided: enable and disable. It
indicates the means by which the NE discards cells when the network is congested. When
the frame discard mark is closed, the cells will be discarded at the cell level; when it is
opened, they will be discarded at the frame level. Here, "frame" refers to the AAL
protocol data unit.
traffic management
Traffic management refers to the process of monitoring user traffic on a network and
redistributing/rerouting it when necessary in order to ensure optimal network
performance
traffic policy
A full set of QoS policies formed by association of traffic classification and QoS actions.
trail termination source The trail termination source identifier (TTSI) of the LSP is used to uniquely identify an
identifier
LSP on a network.
transit
The group is transferred along the LSP consisting of a series of LSRs after the group is
labeled. The middle node is named Transit.
transit delay
The period from the time when a site starts to transmit a data frame to the time when the
site finishes the data frame transmission or to the time when all data frames are received
by the receiver.
Transmission Control
Protocol
The protocol within TCP/IP that governs the breakup of data messages into packets to
be sent via IP (Internet Protocol), and the reassembly and verification of the complete
messages from packets received by IP. A connection-oriented, reliable protocol (reliable
in the sense of ensuring error-free delivery), TCP corresponds to the transport layer in
the ISO/OSI reference model.
Transmission Control
Protocol/Internet
Protocol
Common name for the suite of protocols developed to support the construction of
worldwide internetworks.
transparent
transmission
A process during which the signaling protocol or data is not processed in the content but
encapsulated in the format for the processing of the next phase.
transport plane
tributary protection
switch
One or more Tributary Units, occupying fixed, defined positions in a higher order VCn payload is termed a Tributary Unit Group (TUG). TUGs are defined in such a way that
mixed capacity payloads made up of different size Tributary Units can be constructed
to increase flexibility of the transport network
trTCM
trunk cable
trunk line
TTL
TTSI
TU
tributary unit
TUG
Issue 02 (2013-08-10)
96
A Glossary
Tunnel
A channel on the packet switching network that transmits service traffic between PEs.
In VPN, a tunnel is an information transmission channel between two entities. The tunnel
ensures secure and transparent transmission of VPN information. In most cases, a tunnel
is an MPLS tunnel.
twisted pair
The trTCM meters an IP packet stream and marks its packets based on two rates, Peak
Information Rate (PIR) and Committed Information Rate (CIR), and their associated
burst sizes to be either green, yellow, or red. A packet is marked red if it exceeds the
PIR. Otherwise it is marked either yellow or green depending on whether it exceeds or
doesn't exceed the CIR.
type of service
A field in an IP packet (IP datagram) used for quality of service (QoS). The TOS field
has 8 bits in length, which is divided into five subfields.
U
U-VLAN
A VLAN attribute indicating that the current VLAN is a user VLAN of an M-VLAN.
Multicast services are copied from the M-VLAN to the user VLAN.
UAS
unavailable second
UAT
UBR
UBR+
UDP
unavailable time event A UAT event is reported when the monitored object generates 10 consecutive severely
errored seconds (SES) and the SESs begin to be included in the unavailable time. The
event will end when the bit error ratio per second is better than 10-3 within 10 consecutive
seconds.
underfloor cabling
The cables connected cabinets and other devices are routed underfloor.
UNI
unicast
UPC/NPC
Upper subrack
The subrack close to the top of the cabinet when a cabinet contains several subracks.
Upper threshold
UPS
usage parameter
control/network
parameter control
Issue 02 (2013-08-10)
97
User Datagram
Protocol
A Glossary
A TCP/IP standard protocol that allows an application program on one device to send a
datagram to an application program on another. User Datagram Protocol (UDP) uses IP
to deliver datagrams. UDP provides application programs with the unreliable
connectionless packet delivery service. Thus, UDP messages can be lost, duplicated,
delayed, or delivered out of order. UDP is used to try to transmit the data packet, that is,
the destination device does not actively confirm whether the correct data packet is
received.
user network interface The interface between user equipment and private or public network equipment (for
example, ATM switches).
User operation log
Record the operation of the user for the convenience of analysis and query.
V
V-NNI
V-UNI
One of the traffic classes used by ATM (Asynchronous Transfer Mode). Unlike a
permanent CBR (Constant Bit Rate) channel, a VBR data stream varies in bandwidth
and is better suited to non real time transfers than to real-time streams such as voice calls.
VBR
VC
VCC
VCCV
VCI
VCTRUNK
A virtual concatenation group applied in data service mapping, also called the internal
port of a data service processing board
virtual channel
Any logical connection in the ATM network. A VC is the basic unit of switching in the
ATM network uniquely identified by a virtual path identifier (VPI)/virtual channel
identifier (VCI) value. It is the channel on which ATM cells are transmitted by the
switching.
virtual channel
connection
The VC logical trail that carries data between two end points in an ATM network. A
logical grouping of multiple virtual channel connections into one virtual connection.
virtual channel
identifier
A 16-bit field in the header of an ATM cell. The VCI, together with the VPI, is used to
identify the next destination of a cell as it passes through a series of ATM switches on
its way to its destination.
virtual circuit
A logical grouping of two or more nodes which are not necessarily on the same physical
network segment but which share the same IP network number. This is often associated
with switched Ethernet.
Issue 02 (2013-08-10)
98
A Glossary
virtual path
A bundle of virtual channels, all of which are switched transparently across an ATM
network based on a common VPI.
The field in the ATM (Asynchronous Transfer Mode) cell header that identifies to which
VP (Virtual Path) the cell belongs.
A type of point-to-multipoint L2VPN service provided over the public network. VPLS
enables geographically isolated user sites to communicate with each other through the
MAN/WAN as if they are on the same LAN.
virtual private network A system configuration, where the subscriber is able to build a private network via
connections to different network switches that may include private network capabilities.
virtual private wire
service
A technology that bears Layer 2 services. VPWS emulates services such as ATM, FR,
Ethernet, low-speed TDM circuit, and SONET/SDH in a PSN.
VRF performs the function of establishing multiple virtual routing devices on one actual
routing device. That is, the L3 interfaces of the device are distributed to different VRFs,
performing the function of establishing multiple virtual route forwarding instances on
the device.
virtual switch instance An instance through which the physical access links of VPLS can be mapped to the
virtual links. Each VSI provides independent VPLS service. VSI has Ethernet bridge
function and can terminate PW.
virtual user-network
interface
VLAN
VLAN ID
Namely, it is the virtual LAN identifier. One Ethernet port can support 4K VLAN routes,
and one NE can support up to 8K VLAN routes.
VLAN mapping
A technology that enables user packets to be transmitted over the public network by
translating private VLAN tags into public VLAN tags. When user packets arrive at the
destination private network, VLAN mapping translates public VLAN tags back into
private VLAN tags. In this manner, user packets are correctly transmitted to the
destination.
One of the properties of the MST region, which describes the relationship between
VLANs and spanning tree instances.
VLL
voice over IP
An IP telephony term for a set of facilities used to manage the delivery of voice
information over the Internet. VoIP involves sending voice information in a digital form
in discrete packets rather than by using the traditional circuit-committed protocols of the
public switched telephone network (PSTN).
VoIP
VP
VPI
VPLS
VPN
VPWS
VRF
Issue 02 (2013-08-10)
99
VSI
A Glossary
W
WAN
Wander
The long-term variations of the significant instants of a digital signal from their ideal
position in time (where long-term implies that these variations are of frequency less than
10Hz).
wavelength
The distance between successive peaks or troughs in a periodic signal that is propagated
through space. Wavelength is symbolized by the Greek letter lambda and can be
calculated as speed divided by frequency.
wavelength division
multiplexing
A technology that utilizes the characteristics of broad bandwidth and low attenuation of
single mode optical fiber, uses multiple wavelengths as carriers, and allows multiple
channels to transmit simultaneously in a single fiber.
WDM
weighted random early A packet loss algorithm used for congestion avoidance. It can prevent the global TCP
detection
synchronization caused by traditional tail-drop. WRED is favorable for the high-priority
packet when calculating the packet loss ratio.
WFQ
A network composed of computers which are far away from each other which are
physically connected through specific protocols. WAN covers a broad area, such as a
province, a state or even a country.
winding pipe
Working path
WRED
wrong packets
X
X digital subscriber line A family of bandwidth-efficient modulation techniques, developed to achieve extremely
high data transfer rates over twisted- pair cables. While the letter "X" represents a
variable, DSL stands for "Digital Subscriber Line". XDSL techniques may offer several
benefits such as, capability to offer high-speed data services to customers, low cost by
using existing infrastructure and switching congestion relief caused by existing data
users.
xDSL
Issue 02 (2013-08-10)
100